Resubmissions

06-09-2023 16:22

230906-tvcqpahe78 4

31-03-2023 03:52

230331-efcd2shh3s 6

31-03-2023 03:06

230331-dlw5zagd55 10

Analysis

  • max time kernel
    3s
  • max time network
    13s
  • platform
    windows10-1703_x64
  • resource
    win10-20230831-en
  • resource tags

    arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-09-2023 16:22

General

  • Target

    https://epsilone.online

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://epsilone.online"
    1⤵
      PID:4256
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4520
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:1864
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3756
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2256
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2748

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2748-48-0x000002822F840000-0x000002822F842000-memory.dmp
      Filesize

      8KB

    • memory/2748-51-0x000002822F890000-0x000002822F892000-memory.dmp
      Filesize

      8KB

    • memory/2748-53-0x000002822F8B0000-0x000002822F8B2000-memory.dmp
      Filesize

      8KB

    • memory/2748-75-0x0000028240E30000-0x0000028240E32000-memory.dmp
      Filesize

      8KB

    • memory/2748-79-0x0000028240E50000-0x0000028240E52000-memory.dmp
      Filesize

      8KB

    • memory/2748-81-0x0000028240E70000-0x0000028240E72000-memory.dmp
      Filesize

      8KB

    • memory/2748-83-0x0000028240E90000-0x0000028240E92000-memory.dmp
      Filesize

      8KB

    • memory/2748-85-0x0000028240EB0000-0x0000028240EB2000-memory.dmp
      Filesize

      8KB

    • memory/2748-87-0x0000028240ED0000-0x0000028240ED2000-memory.dmp
      Filesize

      8KB

    • memory/4520-0-0x00000179EFD20000-0x00000179EFD30000-memory.dmp
      Filesize

      64KB

    • memory/4520-16-0x00000179F0600000-0x00000179F0610000-memory.dmp
      Filesize

      64KB

    • memory/4520-35-0x00000179F0110000-0x00000179F0112000-memory.dmp
      Filesize

      8KB