Analysis

  • max time kernel
    126s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2025, 18:01

General

  • Target

    ALG_.exe

  • Size

    41KB

  • MD5

    46fd49191202386317facb5ac2157e2e

  • SHA1

    5a52d8e40e4602eead1cd84cf8e4a718bdf020e7

  • SHA256

    e3daf5a3dd5e01ab6f5ed2f7ac60fa80fc39f001b35d8345544109582b255e99

  • SHA512

    b121307ed2d5c395bf3181fc7e9fe2fdb7b853fc1abb72dbe83d3be4f352aff85ef43df6bcfa4e2908b20bd4293a34682b3481c5950aad69b0799a3e7ddce563

  • SSDEEP

    768:8scaIyIde8bH5M/BgwwuZaefWTjtKZKfgm3Eh2H:Tc1He862efWTJF7EoH

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1353428582617317427/6wfKFgsJQtu_LlNQm9f91lBzKCAbcj8s7GDl_5m_ej1_pdgZF56aGaBolzWErmqIoq1X

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\ALG_.exe
    "C:\Users\Admin\AppData\Local\Temp\ALG_.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Checks SCSI registry key(s)
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:3168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3168-0-0x00007FF9FA953000-0x00007FF9FA955000-memory.dmp

    Filesize

    8KB

  • memory/3168-1-0x0000000000C50000-0x0000000000C60000-memory.dmp

    Filesize

    64KB

  • memory/3168-2-0x00007FF9FA950000-0x00007FF9FB411000-memory.dmp

    Filesize

    10.8MB

  • memory/3168-3-0x00007FF9FA953000-0x00007FF9FA955000-memory.dmp

    Filesize

    8KB

  • memory/3168-4-0x00007FF9FA950000-0x00007FF9FB411000-memory.dmp

    Filesize

    10.8MB