Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
Mercurial.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Mercurial.exe
Resource
win10v2004-20240508-en
General
-
Target
Mercurial.exe
-
Size
3.2MB
-
MD5
a9477b3e21018b96fc5d2264d4016e65
-
SHA1
493fa8da8bf89ea773aeb282215f78219a5401b7
-
SHA256
890fd59af3370e2ce12e0d11916d1ad4ee9b9c267c434347dbed11e9572e8645
-
SHA512
66529a656865400fe37d40ae125a1d057f8be5aa17da80d367ebbe1a9dcea38f5174870d0dc5b56771f6ca5a13e2fad22d803f5357f3ef59a46e3bdf0cc5ee9c
-
SSDEEP
98304:5kjozJ9/im8XVBKl6t1buVfRhq+5tXzgCa/T:lzJpjS346t1bIfuq07
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 11 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/1944-6-0x0000000004E30000-0x0000000004E4C000-memory.dmp agile_net behavioral2/memory/1944-7-0x0000000004E60000-0x0000000004E80000-memory.dmp agile_net behavioral2/memory/1944-10-0x00000000050F0000-0x0000000005104000-memory.dmp agile_net behavioral2/memory/1944-9-0x00000000050E0000-0x00000000050F0000-memory.dmp agile_net behavioral2/memory/1944-8-0x00000000050B0000-0x00000000050D0000-memory.dmp agile_net behavioral2/memory/1944-11-0x0000000005100000-0x000000000516E000-memory.dmp agile_net behavioral2/memory/1944-13-0x00000000051C0000-0x00000000051F6000-memory.dmp agile_net behavioral2/memory/1944-12-0x0000000005180000-0x000000000519E000-memory.dmp agile_net behavioral2/memory/1944-15-0x0000000005220000-0x000000000522E000-memory.dmp agile_net behavioral2/memory/1944-14-0x0000000005200000-0x000000000520E000-memory.dmp agile_net behavioral2/memory/1944-16-0x0000000005B90000-0x0000000005CDA000-memory.dmp agile_net -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Mercurial.exepid process 1944 Mercurial.exe 1944 Mercurial.exe 1944 Mercurial.exe 1944 Mercurial.exe 1944 Mercurial.exe 1944 Mercurial.exe 1944 Mercurial.exe 1944 Mercurial.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Mercurial.exedescription pid process Token: SeDebugPrivilege 1944 Mercurial.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"C:\Users\Admin\AppData\Local\Temp\Mercurial.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3980,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=4172 /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1944-0-0x000000007507E000-0x000000007507F000-memory.dmpFilesize
4KB
-
memory/1944-1-0x00000000000E0000-0x000000000041A000-memory.dmpFilesize
3.2MB
-
memory/1944-2-0x0000000005460000-0x0000000005A04000-memory.dmpFilesize
5.6MB
-
memory/1944-3-0x0000000004EB0000-0x0000000004F42000-memory.dmpFilesize
584KB
-
memory/1944-4-0x0000000004E20000-0x0000000004E2A000-memory.dmpFilesize
40KB
-
memory/1944-5-0x0000000075070000-0x0000000075820000-memory.dmpFilesize
7.7MB
-
memory/1944-6-0x0000000004E30000-0x0000000004E4C000-memory.dmpFilesize
112KB
-
memory/1944-7-0x0000000004E60000-0x0000000004E80000-memory.dmpFilesize
128KB
-
memory/1944-10-0x00000000050F0000-0x0000000005104000-memory.dmpFilesize
80KB
-
memory/1944-9-0x00000000050E0000-0x00000000050F0000-memory.dmpFilesize
64KB
-
memory/1944-8-0x00000000050B0000-0x00000000050D0000-memory.dmpFilesize
128KB
-
memory/1944-11-0x0000000005100000-0x000000000516E000-memory.dmpFilesize
440KB
-
memory/1944-13-0x00000000051C0000-0x00000000051F6000-memory.dmpFilesize
216KB
-
memory/1944-12-0x0000000005180000-0x000000000519E000-memory.dmpFilesize
120KB
-
memory/1944-15-0x0000000005220000-0x000000000522E000-memory.dmpFilesize
56KB
-
memory/1944-14-0x0000000005200000-0x000000000520E000-memory.dmpFilesize
56KB
-
memory/1944-16-0x0000000005B90000-0x0000000005CDA000-memory.dmpFilesize
1.3MB
-
memory/1944-17-0x0000000005D40000-0x0000000005E56000-memory.dmpFilesize
1.1MB
-
memory/1944-18-0x00000000053A0000-0x00000000053D0000-memory.dmpFilesize
192KB
-
memory/1944-19-0x0000000008840000-0x0000000008848000-memory.dmpFilesize
32KB
-
memory/1944-20-0x0000000075070000-0x0000000075820000-memory.dmpFilesize
7.7MB
-
memory/1944-21-0x0000000075070000-0x0000000075820000-memory.dmpFilesize
7.7MB
-
memory/1944-22-0x0000000075070000-0x0000000075820000-memory.dmpFilesize
7.7MB
-
memory/1944-23-0x0000000075070000-0x0000000075820000-memory.dmpFilesize
7.7MB
-
memory/1944-24-0x000000007507E000-0x000000007507F000-memory.dmpFilesize
4KB
-
memory/1944-25-0x0000000075070000-0x0000000075820000-memory.dmpFilesize
7.7MB
-
memory/1944-26-0x0000000075070000-0x0000000075820000-memory.dmpFilesize
7.7MB
-
memory/1944-27-0x0000000075070000-0x0000000075820000-memory.dmpFilesize
7.7MB
-
memory/1944-28-0x0000000075070000-0x0000000075820000-memory.dmpFilesize
7.7MB
-
memory/1944-29-0x0000000075070000-0x0000000075820000-memory.dmpFilesize
7.7MB