Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/08/2023, 18:43

General

  • Target

    http://Epoctopoc.net

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://Epoctopoc.net"
    1⤵
      PID:4912
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1920
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4532
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2808
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3376
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3940
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1976
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      PID:208
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:3532
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4460
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4672
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2092
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4444
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:5048

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\28X31ZC2\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\ED2Z72K3\favicon[1].png

      Filesize

      7KB

      MD5

      9e3fe8db4c9f34d785a3064c7123a480

      SHA1

      0f77f9aa982c19665c642fa9b56b9b20c44983b6

      SHA256

      4d755ac02a070a1b4bb1b6f1c88ab493440109a8ac1e314aaced92f94cdc98e9

      SHA512

      20d8b416bd34f3d80a77305c6fcd597e9c2d92ab1db3f46ec5ac84f5cc6fb55dfcdccd03ffdc5d5de146d0add6d19064662ac3c83a852f3be8b8f650998828d1

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\O1S06Q8E\favicon[1].ico

      Filesize

      4KB

      MD5

      da597791be3b6e732f0bc8b20e38ee62

      SHA1

      1125c45d285c360542027d7554a5c442288974de

      SHA256

      5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

      SHA512

      d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\Q1ISWGJV\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFC817F4B886DA3F34.TMP

      Filesize

      20KB

      MD5

      4dee79b2d6abedc44157a4540e1ed07f

      SHA1

      1bc62c2c7f8734db951fe74cf4075b5c7ceada09

      SHA256

      b71c99b097f1cf608525b867c7ab33cbf340c67348966b48e02649981307cea3

      SHA512

      2a6c98672263f4f56874f24983a7bc7b2a90f610592994524b4e7c254ea51e8463b83aaa6654600d7980387f5f6764edea3e88066143d6ef6a6b6f731174f653

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63

      Filesize

      1KB

      MD5

      7e29d6af731e4c76cd85cf6ffe96ccdf

      SHA1

      fc578d2fd4e98240983d29b15cdadcbdf184f9ab

      SHA256

      e2e62bc3a34de7098f546612135ffc444368e2f6f4b072e04090065c3345426f

      SHA512

      7af640747e6562781299e30e9f5348b286b617a30177ee016280e60934c28163624e3b73e0f1116fc9e7f8511ca2fa3520e61215072b9c1fdf87bec81c583989

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63

      Filesize

      404B

      MD5

      e372b6ef5ef12ec5a163cae75af30624

      SHA1

      d870b4006b65477ef406dbd8269ddae26f1b8eb3

      SHA256

      f92a5f02b9569c5ccb626222dde9d80710ecc167f17fef244364b36d82c15e2c

      SHA512

      f4dc167c6f711c5d78cc31625a4e5fac403f96bc02f3c5bbcc0172a86476c8026d755410f0cdff90daebbbee24d95d1334eb11b67874c7888ced316fe4f73ba5

    • memory/1920-16-0x000001B413300000-0x000001B413310000-memory.dmp

      Filesize

      64KB

    • memory/1920-35-0x000001B411DD0000-0x000001B411DD2000-memory.dmp

      Filesize

      8KB

    • memory/1920-0-0x000001B412B20000-0x000001B412B30000-memory.dmp

      Filesize

      64KB

    • memory/1920-140-0x000001B419190000-0x000001B419191000-memory.dmp

      Filesize

      4KB

    • memory/1920-141-0x000001B4191A0000-0x000001B4191A1000-memory.dmp

      Filesize

      4KB

    • memory/3940-51-0x000001DBEFAB0000-0x000001DBEFAB2000-memory.dmp

      Filesize

      8KB

    • memory/3940-59-0x000001DBF0C00000-0x000001DBF0C02000-memory.dmp

      Filesize

      8KB

    • memory/3940-61-0x000001DBF0C20000-0x000001DBF0C22000-memory.dmp

      Filesize

      8KB

    • memory/3940-63-0x000001DBF0C40000-0x000001DBF0C42000-memory.dmp

      Filesize

      8KB

    • memory/3940-48-0x000001DBEFA80000-0x000001DBEFA82000-memory.dmp

      Filesize

      8KB

    • memory/3940-53-0x000001DBEFAD0000-0x000001DBEFAD2000-memory.dmp

      Filesize

      8KB

    • memory/4460-442-0x0000016260D30000-0x0000016260D50000-memory.dmp

      Filesize

      128KB

    • memory/4460-407-0x00000162612D0000-0x00000162612F0000-memory.dmp

      Filesize

      128KB

    • memory/4460-509-0x000001624F070000-0x000001624F080000-memory.dmp

      Filesize

      64KB

    • memory/4460-510-0x000001624F070000-0x000001624F080000-memory.dmp

      Filesize

      64KB

    • memory/4460-511-0x000001624F070000-0x000001624F080000-memory.dmp

      Filesize

      64KB

    • memory/4460-512-0x000001624F070000-0x000001624F080000-memory.dmp

      Filesize

      64KB

    • memory/4460-514-0x000001624F070000-0x000001624F080000-memory.dmp

      Filesize

      64KB

    • memory/4460-515-0x000001624F070000-0x000001624F080000-memory.dmp

      Filesize

      64KB

    • memory/4460-517-0x000001624F070000-0x000001624F080000-memory.dmp

      Filesize

      64KB

    • memory/4460-519-0x000001624F070000-0x000001624F080000-memory.dmp

      Filesize

      64KB

    • memory/4460-520-0x000001624F070000-0x000001624F080000-memory.dmp

      Filesize

      64KB

    • memory/4460-521-0x000001624F070000-0x000001624F080000-memory.dmp

      Filesize

      64KB

    • memory/4460-522-0x000001624F070000-0x000001624F080000-memory.dmp

      Filesize

      64KB

    • memory/4460-246-0x0000016260340000-0x0000016260360000-memory.dmp

      Filesize

      128KB

    • memory/4460-543-0x000001624F070000-0x000001624F080000-memory.dmp

      Filesize

      64KB

    • memory/4460-544-0x000001624F070000-0x000001624F080000-memory.dmp

      Filesize

      64KB