Analysis

  • max time kernel
    21s
  • max time network
    18s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-it
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-itlocale:it-itos:windows10-ltsc_2021-x64systemwindows
  • submitted
    31/03/2025, 22:46

General

  • Target

    test.exe

  • Size

    41KB

  • MD5

    1cdef1bb03b387ab03056679a76fbb9a

  • SHA1

    fcad7bf599054bfc1d5308575edf1b3f059b5740

  • SHA256

    62a2a9c372635344dee03d3e875ca555910cc8f95e139cf44e653f5c267a4350

  • SHA512

    c9d423cfe2d0ac05ec4f7163c1a1fcfa9776a100ac885bf6dff36542d4b37cf62511eeeb8c594fbf241a2212dd8336b366d3734af7d2fdf5ab65e4994c60d11b

  • SSDEEP

    768:gscaIyIde8bH5M/BgwJuZPeE7WTj5KZKfgm3EhWS:Xc1He86IeE7WT9F7EAS

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1356363803427737691/n_sUq8ti_BHeJHX3D-pQNlVax1pVJnbauSB8J9QNwlkD0hjVHeCGOM0i82aGyucFU3mG

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Mercurialgrabber family
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Checks SCSI registry key(s) 3 TTPs 1 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\test.exe
    "C:\Users\Admin\AppData\Local\Temp\test.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Checks SCSI registry key(s)
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:1160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1160-0-0x00007FFB94453000-0x00007FFB94455000-memory.dmp

    Filesize

    8KB

  • memory/1160-1-0x0000000000440000-0x0000000000450000-memory.dmp

    Filesize

    64KB

  • memory/1160-2-0x00007FFB94450000-0x00007FFB94F12000-memory.dmp

    Filesize

    10.8MB

  • memory/1160-3-0x00007FFB94450000-0x00007FFB94F12000-memory.dmp

    Filesize

    10.8MB

  • memory/1160-4-0x000000001B930000-0x000000001B970000-memory.dmp

    Filesize

    256KB

  • memory/1160-5-0x000000001B900000-0x000000001B90A000-memory.dmp

    Filesize

    40KB

  • memory/1160-6-0x000000001BD20000-0x000000001BE22000-memory.dmp

    Filesize

    1.0MB