Analysis

  • max time kernel
    106s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2025, 18:23

General

  • Target

    ALG_.exe

  • Size

    41KB

  • MD5

    46fd49191202386317facb5ac2157e2e

  • SHA1

    5a52d8e40e4602eead1cd84cf8e4a718bdf020e7

  • SHA256

    e3daf5a3dd5e01ab6f5ed2f7ac60fa80fc39f001b35d8345544109582b255e99

  • SHA512

    b121307ed2d5c395bf3181fc7e9fe2fdb7b853fc1abb72dbe83d3be4f352aff85ef43df6bcfa4e2908b20bd4293a34682b3481c5950aad69b0799a3e7ddce563

  • SSDEEP

    768:8scaIyIde8bH5M/BgwwuZaefWTjtKZKfgm3Eh2H:Tc1He862efWTJF7EoH

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1353428582617317427/6wfKFgsJQtu_LlNQm9f91lBzKCAbcj8s7GDl_5m_ej1_pdgZF56aGaBolzWErmqIoq1X

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\ALG_.exe
    "C:\Users\Admin\AppData\Local\Temp\ALG_.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Checks SCSI registry key(s)
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:5328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5328-0-0x00007FFD4B4D3000-0x00007FFD4B4D5000-memory.dmp

    Filesize

    8KB

  • memory/5328-1-0x0000000000C20000-0x0000000000C30000-memory.dmp

    Filesize

    64KB

  • memory/5328-2-0x00007FFD4B4D0000-0x00007FFD4BF91000-memory.dmp

    Filesize

    10.8MB

  • memory/5328-3-0x00007FFD4B4D0000-0x00007FFD4BF91000-memory.dmp

    Filesize

    10.8MB

  • memory/5328-7-0x00007FFD4B4D0000-0x00007FFD4BF91000-memory.dmp

    Filesize

    10.8MB