Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-08-2023 15:04

General

  • Target

    Launcher/NovaLauncher.exe

  • Size

    149KB

  • MD5

    3ab8bb4b8a880d1eeab5a703b397c97b

  • SHA1

    0919d29602e3c51efa232f69f6891116c840c7eb

  • SHA256

    1b559687e555d6a3d13ba3a32cba23df5932ba16c6df594a6ca9ac6b30462f3e

  • SHA512

    2747dbf1a6c9292fc5eea06d81202a0534a5fb22ec12f91affb7f204df53c4d9a9ab03f73373001b0940762e4418b2645a93fc27635443780612d0f44996294a

  • SSDEEP

    3072:28vbzyQ6Y1YXrbNK+3FNxacPEMk6aRQAcTWG:2szAXNK+3FVGRQTTW

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Detected potential entity reuse from brand microsoft.
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Launcher\NovaLauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\Launcher\NovaLauncher.exe"
    1⤵
      PID:780
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4516
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4864
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:164
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2092
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:876
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:5052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WK479IGQ\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\EFREWE70\dotnet.microsoft[1].xml

      Filesize

      13B

      MD5

      c1ddea3ef6bbef3e7060a1a9ad89e4c5

      SHA1

      35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

      SHA256

      b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

      SHA512

      6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\DR9FLBT8\favicon[1].ico

      Filesize

      16KB

      MD5

      12e3dac858061d088023b2bd48e2fa96

      SHA1

      e08ce1a144eceae0c3c2ea7a9d6fbc5658f24ce5

      SHA256

      90cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21

      SHA512

      c5030c55a855e7a9e20e22f4c70bf1e0f3c558a9b7d501cfab6992ac2656ae5e41b050ccac541efa55f9603e0d349b247eb4912ee169d44044271789c719cd01

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\DWOMHWCD\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\bat1feg\imagestore.dat

      Filesize

      17KB

      MD5

      b4e0acdbc945122e68e28c7d3b2597d8

      SHA1

      783e150c9bb46435546ab2f8810c953d49e67761

      SHA256

      a56f3a7420bfe2ace945abe9680a8dcffa0e7beb29b89aa9b4c81423d071d13f

      SHA512

      999a6ff5fca0f5321bf840a67823682a66cc2459ff4727b362f5b64dfcc5433ad48bf4432acba6a5ffbc7efac9dc7e0cb5e274ba468d4679bf20cb360e4d5ef4

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\9NUXJW3N\windowsdesktop-runtime-6.0.21-win-x64[1].exe

      Filesize

      112KB

      MD5

      93fb1c1f283d6cf2301bb69efa19322d

      SHA1

      0edb5ccb7f4da8703e438cce001b565dccf7fbf3

      SHA256

      ef68735f646751f6a2e2508fc824bc03016e2d6cc9a9f3bac8b93815edf061f9

      SHA512

      ebc77e92895268d3bae84cc17ff02d77d235eb50f33051a28829f2643a26c5c2aa8fabd7a256dc380200c7f0d5d12c10b9b8581858c07d8fd533e1fe208ba934

    • memory/876-156-0x0000026A618E0000-0x0000026A618E2000-memory.dmp

      Filesize

      8KB

    • memory/876-238-0x0000026A628A0000-0x0000026A629A0000-memory.dmp

      Filesize

      1024KB

    • memory/876-150-0x0000026A61860000-0x0000026A61862000-memory.dmp

      Filesize

      8KB

    • memory/876-152-0x0000026A61A00000-0x0000026A61B00000-memory.dmp

      Filesize

      1024KB

    • memory/876-153-0x0000026A618C0000-0x0000026A618C2000-memory.dmp

      Filesize

      8KB

    • memory/876-159-0x0000026A618F0000-0x0000026A618F2000-memory.dmp

      Filesize

      8KB

    • memory/876-300-0x0000026A4B6F0000-0x0000026A4B6F2000-memory.dmp

      Filesize

      8KB

    • memory/876-163-0x0000026A61B10000-0x0000026A61B12000-memory.dmp

      Filesize

      8KB

    • memory/876-205-0x0000026A623A0000-0x0000026A624A0000-memory.dmp

      Filesize

      1024KB

    • memory/876-146-0x0000026A61840000-0x0000026A61842000-memory.dmp

      Filesize

      8KB

    • memory/876-63-0x0000026A4BAB0000-0x0000026A4BAB2000-memory.dmp

      Filesize

      8KB

    • memory/876-276-0x0000026A5CCA0000-0x0000026A5CCC0000-memory.dmp

      Filesize

      128KB

    • memory/876-58-0x0000026A4BA60000-0x0000026A4BA62000-memory.dmp

      Filesize

      8KB

    • memory/876-61-0x0000026A4BA90000-0x0000026A4BA92000-memory.dmp

      Filesize

      8KB

    • memory/4516-258-0x0000023CD5220000-0x0000023CD5221000-memory.dmp

      Filesize

      4KB

    • memory/4516-257-0x0000023CD5210000-0x0000023CD5211000-memory.dmp

      Filesize

      4KB

    • memory/4516-0-0x0000023CCE420000-0x0000023CCE430000-memory.dmp

      Filesize

      64KB

    • memory/4516-35-0x0000023CCE900000-0x0000023CCE902000-memory.dmp

      Filesize

      8KB

    • memory/4516-16-0x0000023CCE800000-0x0000023CCE810000-memory.dmp

      Filesize

      64KB