Analysis

  • max time kernel
    27s
  • max time network
    24s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-es
  • resource tags

    arch:x64arch:x86image:win10-20231020-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    24-10-2023 01:58

General

  • Target

    https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b,8d23fb3,492093b&p1=interserver-zlmbra.azurefd.net/

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b,8d23fb3,492093b&p1=interserver-zlmbra.azurefd.net/"
    1⤵
      PID:4392
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3576
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2844
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3876
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:664
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2588
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4388

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\ZKSMBFVH\favicon[1].ico

      Filesize

      1KB

      MD5

      8c7d1c14e4b9c42f07bd6b800d93b806

      SHA1

      87e49826ffb3bc1ddac38feebb6bb98eaef568b2

      SHA256

      1afd891aacc433e75265e3ddc9cb4fc63b88259977811384426c535037711637

      SHA512

      cd34625876aaf6e8e3cb6da2a9277bab3375cb3515bc701d3a3a05796557c39e442f33c66ae056501c49a810b172a7f6f9c7a32f0b4000ce8472d14ba3e4f41b

    • memory/2588-119-0x00000193B13C0000-0x00000193B13C2000-memory.dmp

      Filesize

      8KB

    • memory/2588-72-0x000001939FCF0000-0x000001939FCF2000-memory.dmp

      Filesize

      8KB

    • memory/2588-121-0x00000193B13E0000-0x00000193B13E2000-memory.dmp

      Filesize

      8KB

    • memory/2588-125-0x00000193B1AC0000-0x00000193B1AC2000-memory.dmp

      Filesize

      8KB

    • memory/2588-123-0x00000193B1AA0000-0x00000193B1AA2000-memory.dmp

      Filesize

      8KB

    • memory/2588-111-0x00000193B0700000-0x00000193B0720000-memory.dmp

      Filesize

      128KB

    • memory/2588-112-0x00000193B1340000-0x00000193B1342000-memory.dmp

      Filesize

      8KB

    • memory/2588-115-0x00000193B1370000-0x00000193B1372000-memory.dmp

      Filesize

      8KB

    • memory/2588-117-0x00000193B13B0000-0x00000193B13B2000-memory.dmp

      Filesize

      8KB

    • memory/2588-160-0x00000193B08D0000-0x00000193B08D2000-memory.dmp

      Filesize

      8KB

    • memory/2588-67-0x000001939FCA0000-0x000001939FCA2000-memory.dmp

      Filesize

      8KB

    • memory/2588-156-0x00000193B0730000-0x00000193B0732000-memory.dmp

      Filesize

      8KB

    • memory/2588-70-0x000001939FCD0000-0x000001939FCD2000-memory.dmp

      Filesize

      8KB

    • memory/2588-130-0x00000193B1AD0000-0x00000193B1AD2000-memory.dmp

      Filesize

      8KB

    • memory/2588-136-0x00000193B1EF0000-0x00000193B1EF2000-memory.dmp

      Filesize

      8KB

    • memory/2588-154-0x00000193B0720000-0x00000193B0722000-memory.dmp

      Filesize

      8KB

    • memory/3576-148-0x000002E6321F0000-0x000002E6321F1000-memory.dmp

      Filesize

      4KB

    • memory/3576-16-0x000002E62C240000-0x000002E62C250000-memory.dmp

      Filesize

      64KB

    • memory/3576-147-0x000002E6321E0000-0x000002E6321E1000-memory.dmp

      Filesize

      4KB

    • memory/3576-35-0x000002E62C0A0000-0x000002E62C0A2000-memory.dmp

      Filesize

      8KB

    • memory/3576-0-0x000002E62BA20000-0x000002E62BA30000-memory.dmp

      Filesize

      64KB