Resubmissions

10/05/2023, 14:58

230510-scd1csgf92 7

10/05/2023, 14:51

230510-r8a3xagf59 8

10/05/2023, 14:39

230510-r1lvfage97 7

Analysis

  • max time kernel
    237s
  • max time network
    237s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/05/2023, 14:39

General

  • Target

    online-changelog.url

  • Size

    90B

  • MD5

    f8fad72e09b701919104eb73901c8409

  • SHA1

    c811c70ea4cb0ce59da9a4c4bac2bb40720e3a16

  • SHA256

    a0a0922a3478e0fcb9b74a47a7a7967d7376a77a5c47f6089527c2961879a210

  • SHA512

    4b4c1cb3d27436faca0957f432b1bbd457070aff67263a4b12a9bf89ce037225674adb521f67caba30952fbd2f359be71010e0fa4171af88570fa2604c0cd5c5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\online-changelog.url
    1⤵
    • Checks computer location settings
    PID:4228
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2052
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:1628
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3520
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1308
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:2104
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:3496
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2100

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6FGHNCOX\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\3TM4W20T\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\Windows\3720402701\2219095117.pri

    Filesize

    207KB

    MD5

    e2b88765ee31470114e866d939a8f2c6

    SHA1

    e0a53b8511186ff308a0507b6304fb16cabd4e1f

    SHA256

    523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e

    SHA512

    462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d

  • memory/1308-203-0x000002A3BEAB0000-0x000002A3BEAB2000-memory.dmp

    Filesize

    8KB

  • memory/1308-222-0x000002A3C0D00000-0x000002A3C0E00000-memory.dmp

    Filesize

    1024KB

  • memory/1308-245-0x000002A3C1BF0000-0x000002A3C1BF2000-memory.dmp

    Filesize

    8KB

  • memory/1308-187-0x000002A3BE810000-0x000002A3BE812000-memory.dmp

    Filesize

    8KB

  • memory/1308-189-0x000002A3BE830000-0x000002A3BE832000-memory.dmp

    Filesize

    8KB

  • memory/1308-191-0x000002A3BE940000-0x000002A3BE942000-memory.dmp

    Filesize

    8KB

  • memory/1308-193-0x000002A3BE960000-0x000002A3BE962000-memory.dmp

    Filesize

    8KB

  • memory/1308-195-0x000002A3BE9A0000-0x000002A3BE9A2000-memory.dmp

    Filesize

    8KB

  • memory/1308-197-0x000002A3BEA50000-0x000002A3BEA52000-memory.dmp

    Filesize

    8KB

  • memory/1308-199-0x000002A3BEA70000-0x000002A3BEA72000-memory.dmp

    Filesize

    8KB

  • memory/1308-201-0x000002A3BEA90000-0x000002A3BEA92000-memory.dmp

    Filesize

    8KB

  • memory/1308-238-0x000002A3C2300000-0x000002A3C2400000-memory.dmp

    Filesize

    1024KB

  • memory/1308-205-0x000002A3BEAD0000-0x000002A3BEAD2000-memory.dmp

    Filesize

    8KB

  • memory/1308-237-0x000002A3C2300000-0x000002A3C2400000-memory.dmp

    Filesize

    1024KB

  • memory/1308-224-0x000002A3C1600000-0x000002A3C1700000-memory.dmp

    Filesize

    1024KB

  • memory/1308-225-0x000002A3C1840000-0x000002A3C1940000-memory.dmp

    Filesize

    1024KB

  • memory/1308-227-0x000002A3C1940000-0x000002A3C1A40000-memory.dmp

    Filesize

    1024KB

  • memory/1308-229-0x000002A3C1D00000-0x000002A3C1E00000-memory.dmp

    Filesize

    1024KB

  • memory/1308-233-0x000002A3C2000000-0x000002A3C2100000-memory.dmp

    Filesize

    1024KB

  • memory/1308-235-0x000002A3C2100000-0x000002A3C2200000-memory.dmp

    Filesize

    1024KB

  • memory/2052-158-0x000002CF7C7C0000-0x000002CF7C7C2000-memory.dmp

    Filesize

    8KB

  • memory/2052-117-0x000002CF7BD20000-0x000002CF7BD30000-memory.dmp

    Filesize

    64KB

  • memory/2052-159-0x000002CF7C7F0000-0x000002CF7C7F2000-memory.dmp

    Filesize

    8KB

  • memory/2052-156-0x000002CF7C270000-0x000002CF7C272000-memory.dmp

    Filesize

    8KB

  • memory/2052-154-0x000002CF7AEE0000-0x000002CF7AEE1000-memory.dmp

    Filesize

    4KB

  • memory/2052-283-0x000002CF7F8C0000-0x000002CF7F8C1000-memory.dmp

    Filesize

    4KB

  • memory/2052-282-0x000002CF7F8B0000-0x000002CF7F8B1000-memory.dmp

    Filesize

    4KB

  • memory/2052-133-0x000002CF7C600000-0x000002CF7C610000-memory.dmp

    Filesize

    64KB