Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    08-11-2021 05:27

General

  • Target

    2b66fc5047747e5f1e1f74dc864ddc07f530548fe1fc8b56394b780d233f317e.bin.exe

  • Size

    601KB

  • MD5

    c1f811c24052e66f78dae00108f5ce63

  • SHA1

    098f8ab6fa7d95780f0ca4e21e4754ea4c2672d0

  • SHA256

    2b66fc5047747e5f1e1f74dc864ddc07f530548fe1fc8b56394b780d233f317e

  • SHA512

    e7da37ec3bc62fdb7efa7d02c5e2d2b76e18949b568bda5f250ff3210570354f33b2bcc2ba9d93fb6438e5da2ce38819cba18ebac0650cb0e957905b7993185f

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Detected potential entity reuse from brand microsoft.
  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b66fc5047747e5f1e1f74dc864ddc07f530548fe1fc8b56394b780d233f317e.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\2b66fc5047747e5f1e1f74dc864ddc07f530548fe1fc8b56394b780d233f317e.bin.exe"
    1⤵
    • Checks computer location settings
    PID:2904
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:904
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:3444
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:588
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1700
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2864
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:8
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
      PID:1268
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2256
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:892
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:904
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
        PID:2904

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63

        MD5

        c7256110ca104643fcbd75d74a784740

        SHA1

        4b2442b51e68a94100337914ca8ea29a70487b21

        SHA256

        1328c2bbf4debbfbff1d8bb0ddd976b3ff3eb2ce5441120c64616e4f79d44c9c

        SHA512

        ded5502f92c7ef7ebb432e73286c83156307d82159b074a2e5a1547122e71a0ecbe45fcf5bc5cb929ebcee4d45931d3a859a393a119a646528d0cd6527a61282

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63

        MD5

        53747fe7041a2711a6912ee0e20c9ed3

        SHA1

        f262fbcb8871cc28aac1db8f1a0416e385ba2901

        SHA256

        7d55fc2e8fa39245b01c71cb62f87b3dce93e8e67cf92c0be4264aee563c9e6b

        SHA512

        9b2812945ca63e14c31e2f3ca526ae0946a3087fc291445832b1945150b2f9ca3e6f4af0a6c2f84b51e1b80206da9579aa5e80d97da0518519ab97098ffacdc9

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\Windows\3720402701\2274612954.pri

        MD5

        0db264b38ac3c5f6c140ba120a7fe72f

        SHA1

        51aa2330c597e84ed3b0d64bf6b73bf6b15f9d74

        SHA256

        2f6955b0f5277a7904c59e461bfa6b06c54fece0d7c11f27408fa7a281a4556d

        SHA512

        3534c243516cef5cee0540d5efd5cde1f378e127e6013b5e309a2e0be8393417bfe458706564b4b955f92132a51e2772c67f9fd90441476cc3512a5d9f910d84

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log

        MD5

        a81e3c6a387cfc1ec57678b2b6491aa9

        SHA1

        43bf9745f5815b73978295eaf205eb3adc21b124

        SHA256

        c600282eb604e9ac02ff2d779b01ad0888a36d5747b30f3d5dd5f84cc43db65c

        SHA512

        308fd5bd182215bd314f998165bb087db1eca0cc2ac9c68f0a0f4c7dfde97a038e5b053ef50dd5ddbecf55a05f92d031c0ad3ed8d4a1b9ec71b15964ffca201e

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk

        MD5

        1c8e1048cc23b2e0cf8a03cdc845df7e

        SHA1

        6dcd83b003f4d86ef4f71ecc6d556c0ac464c408

        SHA256

        eae9559fb41dbb99d77850a3a63fc3de7544a5f76fc20dd02481814d64a6631e

        SHA512

        122093ec7b93040b1ee7459f1a32100c846a872a450848d609b2dc318bedccab099c5535a1f84a3ca354402628762d52258f8aa5b0051e53443f26c176c21d72

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edb

        MD5

        872f2708fc9e362d31b93ec4d851305b

        SHA1

        8276d60e9a2f7b20226391269b1ec25dc291bfe1

        SHA256

        2380ed9ea5cab606ddf1bea417631c702c5373f6f6ccfd90e14fa553b267e464

        SHA512

        92d2ca4c4568a1fef539061b7d83fc93094efdf3a83e69d0ec1625e74e96e3df7b7981ebcbb899d5acf89d8094aca7925b36467c5932ad0fed09d6a6626e059b

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfm

        MD5

        e53c2ecae34c632e79aeacfff53775a1

        SHA1

        cf246ad291e9d00cf869b45d15070f82bacdbf1e

        SHA256

        1aba9db8ba85e23c6c265da78d62d0d94a7525b896185e8af606b7a26749a605

        SHA512

        ac3102698eeb33619f81eeee1f761d01b59d0c7f9da7b984ad801e1a3906bb9cd9748946da85343290cc1c77543eb3a4e660d6f11abc2bf5bf3a8df09e726198

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{C59BD7F9-03E3-4EA9-8CBC-AFA8CAF34AA7}.dat

        MD5

        c57d0d5f2c3cc273569a6a0bdeef3b78

        SHA1

        8f06e77e2d0f5b6442b2bfd360b30de4be2a8f9b

        SHA256

        6b8d823f8bd0833721866684b352c3c8ac6093c3188e36b1b8fd46372293be5f

        SHA512

        35aa4f73042a9cf2da3cda72aced1639009d1ee66111731b0b7c933019e38df4a91843eb1ffbe91ab9ba3a8d9c986446b55e866927b6624eb437aede91f17b32

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{134899A9-DA13-4CDC-A551-E40D5C2B62D8}.dat

        MD5

        012754a9771ee4139bdab7d71055396a

        SHA1

        8337090083833f085db9be8a7ebcdd7c2a257842

        SHA256

        c53f5b2a5a2f790ea78617c276dd307e33f3b2f3009dc67a3bb969f5f9bde6fc

        SHA512

        ada505cf899e28d01469e69e142a380088eac03f21d19f7e2e80c0e223a39019872041996179f0e2f1a0d0abb8eeb7401193ffa47f817d56ae495279fd420473

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\Microsoft\Windows\3720402701\2274612954.pri

        MD5

        0db264b38ac3c5f6c140ba120a7fe72f

        SHA1

        51aa2330c597e84ed3b0d64bf6b73bf6b15f9d74

        SHA256

        2f6955b0f5277a7904c59e461bfa6b06c54fece0d7c11f27408fa7a281a4556d

        SHA512

        3534c243516cef5cee0540d5efd5cde1f378e127e6013b5e309a2e0be8393417bfe458706564b4b955f92132a51e2772c67f9fd90441476cc3512a5d9f910d84

      • memory/2864-118-0x0000011B85F20000-0x0000011B85F30000-memory.dmp

        Filesize

        64KB