Resubmissions

25/03/2024, 13:44

240325-q1zwmahg25 1

30/01/2024, 18:38

240130-w984jscadp 1

16/12/2023, 06:33

231216-hbmwrscbg4 10

16/12/2023, 06:32

231216-halx3scbg2 1

29/11/2023, 11:21

231129-nf7pmafg82 1

29/11/2023, 11:20

231129-nfv1tsfg79 5

26/11/2023, 08:21

231126-j9fqsafg43 7

15/11/2023, 08:37

231115-kjdzyagd3v 8

08/11/2023, 14:49

231108-r7gt3adf67 1

02/11/2023, 11:19

231102-nex4ssah71 10

Analysis

  • max time kernel
    51s
  • max time network
    53s
  • platform
    windows10-1703_x64
  • resource
    win10-20230831-en
  • resource tags

    arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/09/2023, 10:01

General

  • Target

    http://t.me/excellent_stalcraft

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://t.me/excellent_stalcraft"
    1⤵
      PID:3688
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3068
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4148
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3668
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5028
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2112
    • C:\Windows\system32\osk.exe
      "C:\Windows\system32\osk.exe"
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4036
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x3e8
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1348
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2420
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2104
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2028
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2512
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0 /state0:0xa3a94855 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:5044
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
        PID:5088
      • C:\Windows\system32\browser_broker.exe
        C:\Windows\system32\browser_broker.exe -Embedding
        1⤵
          PID:2192

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\X5WK894C\edgecompatviewlist[1].xml

          Filesize

          74KB

          MD5

          d4fc49dc14f63895d997fa4940f24378

          SHA1

          3efb1437a7c5e46034147cbbc8db017c69d02c31

          SHA256

          853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

          SHA512

          cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\C9ZJA1WK\favicon-32x32[1].png

          Filesize

          1KB

          MD5

          16a75c7824b5223b8e22864354e9e33f

          SHA1

          2c35e76ebe2d8002369d582b32bd70374552c574

          SHA256

          7f3e38478d53875c1f35d67fc035067274bacf9df8285889ad04fb143dfdddd8

          SHA512

          bd09744894646081e02b9e730c68c82354e3907c419578bdcb45d52c99d909d78ee084c8948b99d14ac6c8dfb343c9eb9197af039c5ac99d356440efd10a4ee8

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\FNN0WRW2\website_icon[1].svg

          Filesize

          1KB

          MD5

          02f7553e1ac3129cd1c4d0442b5a0f81

          SHA1

          0dd8634450681fe1a2d0c1e5b02d6d0954e2772d

          SHA256

          0019255c610cb0843c524d7995905fa5201651fcc393846bee8414f0610097f5

          SHA512

          ac141a5648a3a22ceb295de8ecc6823f53d2a453316cd591dde888715344a60694316e1b85a5ceec72af62e34cc3d01768b020e5dfd5e0cb9916ec975ba4318e

        • memory/2112-131-0x000002522AC00000-0x000002522AC02000-memory.dmp

          Filesize

          8KB

        • memory/2112-135-0x000002522AC40000-0x000002522AC42000-memory.dmp

          Filesize

          8KB

        • memory/2112-66-0x0000025219320000-0x0000025219322000-memory.dmp

          Filesize

          8KB

        • memory/2112-113-0x00000252193F0000-0x00000252193F2000-memory.dmp

          Filesize

          8KB

        • memory/2112-117-0x000002522A0F0000-0x000002522A0F2000-memory.dmp

          Filesize

          8KB

        • memory/2112-119-0x000002522A3F0000-0x000002522A3F2000-memory.dmp

          Filesize

          8KB

        • memory/2112-124-0x000002522AD00000-0x000002522AD02000-memory.dmp

          Filesize

          8KB

        • memory/2112-127-0x000002522AD30000-0x000002522AD32000-memory.dmp

          Filesize

          8KB

        • memory/2112-129-0x000002522AD40000-0x000002522AD42000-memory.dmp

          Filesize

          8KB

        • memory/2112-215-0x000002522BB90000-0x000002522BB92000-memory.dmp

          Filesize

          8KB

        • memory/2112-133-0x000002522AC20000-0x000002522AC22000-memory.dmp

          Filesize

          8KB

        • memory/2112-64-0x0000025218FF0000-0x0000025218FF2000-memory.dmp

          Filesize

          8KB

        • memory/2112-137-0x000002522AC60000-0x000002522AC62000-memory.dmp

          Filesize

          8KB

        • memory/2112-162-0x000002522B200000-0x000002522B300000-memory.dmp

          Filesize

          1024KB

        • memory/2112-174-0x000002522B340000-0x000002522B342000-memory.dmp

          Filesize

          8KB

        • memory/2112-176-0x000002522B350000-0x000002522B352000-memory.dmp

          Filesize

          8KB

        • memory/2112-192-0x000002522AF40000-0x000002522AF42000-memory.dmp

          Filesize

          8KB

        • memory/2112-61-0x0000025218FC0000-0x0000025218FC2000-memory.dmp

          Filesize

          8KB

        • memory/3068-210-0x0000014EEF1C0000-0x0000014EEF1C1000-memory.dmp

          Filesize

          4KB

        • memory/3068-209-0x0000014EEF1B0000-0x0000014EEF1B1000-memory.dmp

          Filesize

          4KB

        • memory/3068-0-0x0000014EE8420000-0x0000014EE8430000-memory.dmp

          Filesize

          64KB

        • memory/3068-35-0x0000014EE85D0000-0x0000014EE85D2000-memory.dmp

          Filesize

          8KB

        • memory/3068-16-0x0000014EE8C00000-0x0000014EE8C10000-memory.dmp

          Filesize

          64KB