Resubmissions

09/05/2023, 17:51

230509-wfk5mafb5t 8

09/05/2023, 17:46

230509-wb98ysfb3x 7

08/05/2023, 22:53

230508-2vgcwaeh8s 7

Analysis

  • max time kernel
    315s
  • max time network
    322s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/05/2023, 17:51

General

  • Target

    online-changelog.url

  • Size

    90B

  • MD5

    f8fad72e09b701919104eb73901c8409

  • SHA1

    c811c70ea4cb0ce59da9a4c4bac2bb40720e3a16

  • SHA256

    a0a0922a3478e0fcb9b74a47a7a7967d7376a77a5c47f6089527c2961879a210

  • SHA512

    4b4c1cb3d27436faca0957f432b1bbd457070aff67263a4b12a9bf89ce037225674adb521f67caba30952fbd2f359be71010e0fa4171af88570fa2604c0cd5c5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\online-changelog.url
    1⤵
    • Checks computer location settings
    PID:5044
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4208
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:3812
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4932
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4884
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:3180
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:2596
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RIZDY293\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\DIBGJJ6M\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\Windows\3720402701\2219095117.pri

    Filesize

    207KB

    MD5

    e2b88765ee31470114e866d939a8f2c6

    SHA1

    e0a53b8511186ff308a0507b6304fb16cabd4e1f

    SHA256

    523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e

    SHA512

    462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d

  • memory/4208-120-0x000001BC67A20000-0x000001BC67A30000-memory.dmp

    Filesize

    64KB

  • memory/4208-136-0x000001BC68300000-0x000001BC68310000-memory.dmp

    Filesize

    64KB

  • memory/4208-157-0x000001BC67F50000-0x000001BC67F51000-memory.dmp

    Filesize

    4KB

  • memory/4208-159-0x000001BC67FD0000-0x000001BC67FD2000-memory.dmp

    Filesize

    8KB

  • memory/4208-161-0x000001BC6C760000-0x000001BC6C762000-memory.dmp

    Filesize

    8KB

  • memory/4208-162-0x000001BC6C780000-0x000001BC6C782000-memory.dmp

    Filesize

    8KB

  • memory/4208-283-0x000001BC6F790000-0x000001BC6F791000-memory.dmp

    Filesize

    4KB

  • memory/4208-282-0x000001BC6F780000-0x000001BC6F781000-memory.dmp

    Filesize

    4KB

  • memory/4884-224-0x000001BEDCE30000-0x000001BEDCF30000-memory.dmp

    Filesize

    1024KB

  • memory/4884-238-0x000001BEDE300000-0x000001BEDE400000-memory.dmp

    Filesize

    1024KB

  • memory/4884-204-0x000001BEDADB0000-0x000001BEDADB2000-memory.dmp

    Filesize

    8KB

  • memory/4884-206-0x000001BEDADD0000-0x000001BEDADD2000-memory.dmp

    Filesize

    8KB

  • memory/4884-208-0x000001BEDADF0000-0x000001BEDADF2000-memory.dmp

    Filesize

    8KB

  • memory/4884-200-0x000001BEDAD50000-0x000001BEDAD52000-memory.dmp

    Filesize

    8KB

  • memory/4884-227-0x000001BEDD7C0000-0x000001BEDD8C0000-memory.dmp

    Filesize

    1024KB

  • memory/4884-229-0x000001BEDD8E0000-0x000001BEDD9E0000-memory.dmp

    Filesize

    1024KB

  • memory/4884-231-0x000001BEDDB00000-0x000001BEDDC00000-memory.dmp

    Filesize

    1024KB

  • memory/4884-233-0x000001BEDDC00000-0x000001BEDDD00000-memory.dmp

    Filesize

    1024KB

  • memory/4884-236-0x000001BEDE200000-0x000001BEDE300000-memory.dmp

    Filesize

    1024KB

  • memory/4884-202-0x000001BEDAD90000-0x000001BEDAD92000-memory.dmp

    Filesize

    8KB

  • memory/4884-240-0x000001BEDE500000-0x000001BEDE600000-memory.dmp

    Filesize

    1024KB

  • memory/4884-241-0x000001BEDE500000-0x000001BEDE600000-memory.dmp

    Filesize

    1024KB

  • memory/4884-245-0x000001BEDFF40000-0x000001BEE0040000-memory.dmp

    Filesize

    1024KB

  • memory/4884-247-0x000001BEDDFF0000-0x000001BEDDFF2000-memory.dmp

    Filesize

    8KB

  • memory/4884-198-0x000001BEDACA0000-0x000001BEDACA2000-memory.dmp

    Filesize

    8KB

  • memory/4884-196-0x000001BEDAC80000-0x000001BEDAC82000-memory.dmp

    Filesize

    8KB

  • memory/4884-194-0x000001BEDAC60000-0x000001BEDAC62000-memory.dmp

    Filesize

    8KB

  • memory/4884-192-0x000001BEDAB50000-0x000001BEDAB52000-memory.dmp

    Filesize

    8KB

  • memory/4884-190-0x000001BEDA9E0000-0x000001BEDA9E2000-memory.dmp

    Filesize

    8KB