Analysis
-
max time kernel
30s -
max time network
28s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe
Resource
win10v2004-20250314-en
General
-
Target
a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe
-
Size
8.0MB
-
MD5
ddf3fd684f553b4686987ec5cf532c20
-
SHA1
085a5f8b6aa7eafaf8b7cd13e8aaf6756fba1db7
-
SHA256
a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542
-
SHA512
b5988a061e33f7a742bb42f55dce0145e1defbe7628819a2337349827408480625cb04eacade19ba2495ee366472cc33555ae227b7286b0c58ff909e322f47bc
-
SSDEEP
196608:OcwTiBknYhfr5QILXP8ZV3PpLsExwsJC4Ct99QTKu6yTL+b0X820iwvefJ:dwWCnYRr5QIXU/3PpLsacVH3TyXz08J
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/853156671664685077/8KUuRAI41xE7p329lIVcKihvvEa-30CxP9F9UkMsip1CErSnArWO8ypnl26upafpelAy
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions test.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools test.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion test.exe -
Executes dropped EXE 2 IoCs
pid Process 2832 test.exe 2840 Lunar_Builder.exe -
Loads dropped DLL 10 IoCs
pid Process 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 2840 Lunar_Builder.exe 2840 Lunar_Builder.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 11 discord.com 12 discord.com 13 discord.com 14 discord.com 10 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip4.seeip.org 8 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum test.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lunar_Builder.exe -
Checks SCSI registry key(s) 3 TTPs 1 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S test.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 test.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation test.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer test.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName test.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2832 test.exe Token: SeDebugPrivilege 2840 Lunar_Builder.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2840 Lunar_Builder.exe 2840 Lunar_Builder.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2832 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 30 PID 2208 wrote to memory of 2832 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 30 PID 2208 wrote to memory of 2832 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 30 PID 2208 wrote to memory of 2832 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 30 PID 2208 wrote to memory of 2840 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 32 PID 2208 wrote to memory of 2840 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 32 PID 2208 wrote to memory of 2840 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 32 PID 2208 wrote to memory of 2840 2208 a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe 32 PID 2832 wrote to memory of 3892 2832 test.exe 33 PID 2832 wrote to memory of 3892 2832 test.exe 33 PID 2832 wrote to memory of 3892 2832 test.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe"C:\Users\Admin\AppData\Local\Temp\a5e43e7a219d301589d65f7dc18997c5b346e34e7d92063f1ed1f10263d34542.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Public\Music\test.exe"C:\Users\Public\Music\test.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2832 -s 12643⤵PID:3892
-
-
-
C:\Users\Public\Music\Lunar_Builder.exe"C:\Users\Public\Music\Lunar_Builder.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a
-
Filesize
94KB
MD514ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b
-
Filesize
7.7MB
MD5c67a1736d52b895cac3146b6e7d43f81
SHA1b7b0151626c098ef2ac887732e90b76790200b5f
SHA2569ad27fa8bb7d8258fb1e572c94d107181ba2314a4db4d3222c3e0dc407493b45
SHA512d729a150a04f103e066f94bbc60ea99f5d51716862c88c19e6c7b65bd347bdafb8c0df12b829c929481ea3d0282f309bfe590ee7d0e011c94610b52df4bc3273
-
Filesize
41KB
MD541a0ce6435946c973c6dc624cf8e331a
SHA1587798a56c97b24a7ac09e41e471a5ba022faf0b
SHA25668eaf913650c3c9af5b9feb6f3720bf77166701bd6cf8fc4d44f9c0fae15ca62
SHA5122f44c7151dde13672f7a64ca8dfb030ca7081132385f646d990ca5cdfd4112cd6ebfc621eac93ddcb8df26a368c47d067c3f0b05a13e14f70a0cd2fdf60ea681