Analysis

  • max time kernel
    41s
  • max time network
    45s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/08/2023, 20:17

General

  • Target

    Fn Cheetos(2).zip

  • Size

    26KB

  • MD5

    21d1df958a3e4f257e05e850070a87bd

  • SHA1

    9f00717bd864958b3c8ca9e7666f120029af114b

  • SHA256

    868236b1d2af78d95d70b48ecbaff46082e9e268693300e4fcc367ed78e90893

  • SHA512

    3690a17034d230c5334c1b35b285330182517165fb15d5e369ba28473b9981bdbecdca726c1937b33924e41ea979d5ed2dc40315a2883f4db68a12378d8fa7c2

  • SSDEEP

    768:G1bOx6gd0EOv6Wo3DZsaJuaS8Ud5571/EEFq:Gq6LV6WkD2Gufd5N1/EEFq

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\Fn Cheetos(2).zip"
    1⤵
      PID:4224
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5080
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:1060
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      PID:4500
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4928
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2184

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF7C94B78D671CD477.TMP

      Filesize

      16KB

      MD5

      d9c35e971c3232e4818392a9b466268a

      SHA1

      44dd2f3950556ab6ce62de5334c729d16ffd4799

      SHA256

      33e601f404fe9e1a63450330b66c82bd73ace8c43d5d7225a211502d47530e15

      SHA512

      3612669271e06c992fdc1980149059b6f698eb1b8f7c5570d5fb588790e2d8ea5ff3a12b1a48e02760ff974238c820fe794b5823136ada099ff3dc2a47adc366

    • memory/5080-117-0x00000161DEB20000-0x00000161DEB30000-memory.dmp

      Filesize

      64KB

    • memory/5080-133-0x00000161DF000000-0x00000161DF010000-memory.dmp

      Filesize

      64KB

    • memory/5080-152-0x00000161DF260000-0x00000161DF262000-memory.dmp

      Filesize

      8KB

    • memory/5080-179-0x00000161E35A0000-0x00000161E35A2000-memory.dmp

      Filesize

      8KB

    • memory/5080-182-0x00000161DF2D0000-0x00000161DF2D1000-memory.dmp

      Filesize

      4KB

    • memory/5080-186-0x00000161DF100000-0x00000161DF101000-memory.dmp

      Filesize

      4KB