Analysis

  • max time kernel
    156s
  • max time network
    164s
  • platform
    windows10-1703_x64
  • resource
    win10-20231025-en
  • resource tags

    arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/11/2023, 16:07

General

  • Target

    http://mediolanum.agrfactory.com

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://mediolanum.agrfactory.com"
    1⤵
      PID:1456
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1332
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2896
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:932
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4664
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4416
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4136
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
        PID:4584
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        PID:4396

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

              Filesize

              4KB

              MD5

              1bfe591a4fe3d91b03cdf26eaacd8f89

              SHA1

              719c37c320f518ac168c86723724891950911cea

              SHA256

              9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

              SHA512

              02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TH18OIKZ\edgecompatviewlist[1].xml

              Filesize

              74KB

              MD5

              d4fc49dc14f63895d997fa4940f24378

              SHA1

              3efb1437a7c5e46034147cbbc8db017c69d02c31

              SHA256

              853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

              SHA512

              cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\9IIAEVS4\px[1].js

              Filesize

              346B

              MD5

              f84f931c0dd37448e03f0dabf4e4ca9f

              SHA1

              9c2c50edcf576453ccc07bf65668bd23c76e8663

              SHA256

              5c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584

              SHA512

              afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\57UC6KJM\ww1.agrfactory[1].xml

              Filesize

              548B

              MD5

              9d648ae813520bd6204ffebf6a114419

              SHA1

              055ddb16d4fe9759f4c5be9705bbc1dc226ff9a6

              SHA256

              abf72779754a6fdcab4f8d6f89f14133c946e45fa5f2cd6defc964d117a32846

              SHA512

              6cea89d1cacec6daf2ef699b2bb71a2aa14c4a13877428095dc279cd0396815e9511c30bb1fca776c7fed2b45d55c5161b9cd38d4f3da06aed09aac864a1e70d

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\8142WVGP\suggestions[1].en-US

              Filesize

              17KB

              MD5

              5a34cb996293fde2cb7a4ac89587393a

              SHA1

              3c96c993500690d1a77873cd62bc639b3a10653f

              SHA256

              c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

              SHA512

              e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

            • memory/1332-1-0x000001F4AF200000-0x000001F4AF210000-memory.dmp

              Filesize

              64KB

            • memory/1332-17-0x000001F4AFA00000-0x000001F4AFA10000-memory.dmp

              Filesize

              64KB

            • memory/1332-36-0x000001F4B3CC0000-0x000001F4B3CC2000-memory.dmp

              Filesize

              8KB

            • memory/1332-0-0x00007FF95BF10000-0x00007FF95BF41000-memory.dmp

              Filesize

              196KB

            • memory/4416-108-0x0000021C36120000-0x0000021C36140000-memory.dmp

              Filesize

              128KB

            • memory/4416-112-0x0000021C36160000-0x0000021C36180000-memory.dmp

              Filesize

              128KB

            • memory/4416-101-0x0000021C360E0000-0x0000021C36100000-memory.dmp

              Filesize

              128KB

            • memory/4416-102-0x0000021C360E0000-0x0000021C36100000-memory.dmp

              Filesize

              128KB

            • memory/4416-103-0x0000021C36100000-0x0000021C36120000-memory.dmp

              Filesize

              128KB

            • memory/4416-104-0x0000021C36100000-0x0000021C36120000-memory.dmp

              Filesize

              128KB

            • memory/4416-105-0x0000021C36100000-0x0000021C36120000-memory.dmp

              Filesize

              128KB

            • memory/4416-106-0x0000021C36120000-0x0000021C36140000-memory.dmp

              Filesize

              128KB

            • memory/4416-107-0x0000021C36120000-0x0000021C36140000-memory.dmp

              Filesize

              128KB

            • memory/4416-68-0x0000021422700000-0x0000021422800000-memory.dmp

              Filesize

              1024KB

            • memory/4416-110-0x0000021C36140000-0x0000021C36160000-memory.dmp

              Filesize

              128KB

            • memory/4416-109-0x0000021C36140000-0x0000021C36160000-memory.dmp

              Filesize

              128KB

            • memory/4416-111-0x0000021C36140000-0x0000021C36160000-memory.dmp

              Filesize

              128KB

            • memory/4416-100-0x0000021C360E0000-0x0000021C36100000-memory.dmp

              Filesize

              128KB

            • memory/4416-113-0x0000021C36160000-0x0000021C36180000-memory.dmp

              Filesize

              128KB

            • memory/4416-114-0x0000021C36160000-0x0000021C36180000-memory.dmp

              Filesize

              128KB

            • memory/4416-115-0x0000021C36180000-0x0000021C361A0000-memory.dmp

              Filesize

              128KB

            • memory/4416-116-0x0000021C36180000-0x0000021C361A0000-memory.dmp

              Filesize

              128KB

            • memory/4416-117-0x0000021C36180000-0x0000021C361A0000-memory.dmp

              Filesize

              128KB

            • memory/4416-119-0x0000021C361A0000-0x0000021C361C0000-memory.dmp

              Filesize

              128KB

            • memory/4416-120-0x0000021C361A0000-0x0000021C361C0000-memory.dmp

              Filesize

              128KB

            • memory/4416-122-0x0000021C361C0000-0x0000021C361E0000-memory.dmp

              Filesize

              128KB

            • memory/4416-123-0x0000021C361C0000-0x0000021C361E0000-memory.dmp

              Filesize

              128KB

            • memory/4416-66-0x0000021C348E0000-0x0000021C348E2000-memory.dmp

              Filesize

              8KB

            • memory/4416-55-0x0000021C241E0000-0x0000021C241E2000-memory.dmp

              Filesize

              8KB

            • memory/4416-53-0x0000021C24180000-0x0000021C24182000-memory.dmp

              Filesize

              8KB

            • memory/4416-51-0x0000021C24160000-0x0000021C24162000-memory.dmp

              Filesize

              8KB