Resubmissions

10-05-2023 14:58

230510-scd1csgf92 7

10-05-2023 14:51

230510-r8a3xagf59 8

10-05-2023 14:39

230510-r1lvfage97 7

Analysis

  • max time kernel
    210s
  • max time network
    207s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-05-2023 14:51

General

  • Target

    online-changelog.url

  • Size

    90B

  • MD5

    f8fad72e09b701919104eb73901c8409

  • SHA1

    c811c70ea4cb0ce59da9a4c4bac2bb40720e3a16

  • SHA256

    a0a0922a3478e0fcb9b74a47a7a7967d7376a77a5c47f6089527c2961879a210

  • SHA512

    4b4c1cb3d27436faca0957f432b1bbd457070aff67263a4b12a9bf89ce037225674adb521f67caba30952fbd2f359be71010e0fa4171af88570fa2604c0cd5c5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\online-changelog.url
    1⤵
    • Checks computer location settings
    PID:2508
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2804
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:3720
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1708
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4840
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:1080
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:308
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:5008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IV9H23MJ\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DomainSuggestions\en-US.1

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\Windows\3720402701\2219095117.pri

    Filesize

    207KB

    MD5

    e2b88765ee31470114e866d939a8f2c6

    SHA1

    e0a53b8511186ff308a0507b6304fb16cabd4e1f

    SHA256

    523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e

    SHA512

    462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d

  • memory/1708-164-0x00007FFC9EFB3000-0x00007FFC9EFB4000-memory.dmp

    Filesize

    4KB

  • memory/2804-121-0x000001DCFD520000-0x000001DCFD530000-memory.dmp

    Filesize

    64KB

  • memory/2804-137-0x000001DCFDE00000-0x000001DCFDE10000-memory.dmp

    Filesize

    64KB

  • memory/2804-158-0x000001DCFDAC0000-0x000001DCFDAC1000-memory.dmp

    Filesize

    4KB

  • memory/2804-160-0x000001DCFDB00000-0x000001DCFDB02000-memory.dmp

    Filesize

    8KB

  • memory/2804-162-0x000001DCFE090000-0x000001DCFE092000-memory.dmp

    Filesize

    8KB

  • memory/2804-163-0x000001DCFE180000-0x000001DCFE182000-memory.dmp

    Filesize

    8KB

  • memory/2804-282-0x000001DC86380000-0x000001DC86381000-memory.dmp

    Filesize

    4KB

  • memory/2804-281-0x000001DC86370000-0x000001DC86371000-memory.dmp

    Filesize

    4KB

  • memory/4840-214-0x000001AB21960000-0x000001AB21962000-memory.dmp

    Filesize

    8KB

  • memory/4840-232-0x000001AB24000000-0x000001AB24100000-memory.dmp

    Filesize

    1024KB

  • memory/4840-210-0x000001AB21920000-0x000001AB21922000-memory.dmp

    Filesize

    8KB

  • memory/4840-212-0x000001AB21940000-0x000001AB21942000-memory.dmp

    Filesize

    8KB

  • memory/4840-206-0x000001AB21900000-0x000001AB21902000-memory.dmp

    Filesize

    8KB

  • memory/4840-224-0x000001AB23100000-0x000001AB23200000-memory.dmp

    Filesize

    1024KB

  • memory/4840-226-0x000001AB23B00000-0x000001AB23C00000-memory.dmp

    Filesize

    1024KB

  • memory/4840-228-0x000001AB23D00000-0x000001AB23E00000-memory.dmp

    Filesize

    1024KB

  • memory/4840-230-0x000001AB23E00000-0x000001AB23F00000-memory.dmp

    Filesize

    1024KB

  • memory/4840-208-0x000001AB21810000-0x000001AB21812000-memory.dmp

    Filesize

    8KB

  • memory/4840-234-0x000001AB24300000-0x000001AB24400000-memory.dmp

    Filesize

    1024KB

  • memory/4840-236-0x000001AB24400000-0x000001AB24500000-memory.dmp

    Filesize

    1024KB

  • memory/4840-238-0x000001AB24600000-0x000001AB24700000-memory.dmp

    Filesize

    1024KB

  • memory/4840-240-0x000001AB24600000-0x000001AB24700000-memory.dmp

    Filesize

    1024KB

  • memory/4840-246-0x000001AB25F70000-0x000001AB25F72000-memory.dmp

    Filesize

    8KB

  • memory/4840-204-0x000001AB21850000-0x000001AB21852000-memory.dmp

    Filesize

    8KB

  • memory/4840-202-0x000001AB21830000-0x000001AB21832000-memory.dmp

    Filesize

    8KB

  • memory/4840-196-0x000001AB215F0000-0x000001AB215F2000-memory.dmp

    Filesize

    8KB

  • memory/4840-194-0x000001AB212F0000-0x000001AB212F2000-memory.dmp

    Filesize

    8KB

  • memory/4840-192-0x000001AB212D0000-0x000001AB212D2000-memory.dmp

    Filesize

    8KB