Analysis

  • max time kernel
    124s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20231023-en
  • resource tags

    arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-11-2023 21:53

General

  • Target

    http://www.pornhub.com

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://www.pornhub.com"
    1⤵
      PID:780
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4260
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:668
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1184
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3216
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2480
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3756
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4484
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4044
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      1⤵
        PID:2696

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YZUNXYOV\edgecompatviewlist[1].xml

        Filesize

        74KB

        MD5

        d4fc49dc14f63895d997fa4940f24378

        SHA1

        3efb1437a7c5e46034147cbbc8db017c69d02c31

        SHA256

        853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

        SHA512

        cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5OL1IBQK\mg_modal-1.0.0[1].js

        Filesize

        4KB

        MD5

        71210b4d7f304374c5140bb6f0d79e8b

        SHA1

        6b3f4c004fe4155814e6bf8a25c34a383de090c1

        SHA256

        9d94bc6bfd22f5b7b591d8658b951acf061276c4017cff57efc6f6d0ab03302b

        SHA512

        273f74c8e9c001e7d8a17016f668b2a8f06ec02af33c5f701d963078674ecd50e7e3f07ba8fb7136872c37ea9713cbfe04fa9e627802217784821a06791e49e2

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5OL1IBQK\ph-icons[1].css

        Filesize

        11KB

        MD5

        35c3eb9d4ed7aa44a4ee866fe55d0248

        SHA1

        3a8f2e2f842f3bba3c8bf5705206bd5474da0f43

        SHA256

        a981a5d378c12be05cc2866509989e6dd72de8df5696d7cdd84dfc9cefc68f63

        SHA512

        30ce8f61c40110e1b1e0f583065efd583e113b0b651717f710f39342655e2c5838ec23b83a61e932ccec7cdd59da519185bf1b453b2d232b7c7fff0c3d50d2e2

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\5OL1IBQK\playlist-base[1].css

        Filesize

        25KB

        MD5

        f93aada01a90ee113cebe31bdcc7f1da

        SHA1

        e841de6bd33f2bd01c00d41d9622b6b664f693b5

        SHA256

        f046f20ac2c79c7a0361a0d2c4dcfa4f31a77fc2f1d86fa4d0a71134e63a0bda

        SHA512

        2c3d5b1e81eadd2d01ee5a311e03be6d63fe51b5bd403c7290321722693d11f97c017842ea9f2b92ac39b896bd140737de4f2d0f748772b044030a85610e70bf

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\BIL7CS2K\www.pornhub[1].xml

        Filesize

        13B

        MD5

        c1ddea3ef6bbef3e7060a1a9ad89e4c5

        SHA1

        35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

        SHA256

        b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

        SHA512

        6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\21FFUMTC\favicon[1].ico

        Filesize

        1KB

        MD5

        bf5b6c805abb9d242e0eefe8f85e9253

        SHA1

        7430ff53470894ca5d22d074c1569efc3b72b95d

        SHA256

        edff483f89d1eeef57d191848be78a7f52313af079c116bf714a0f5d5b57e9c5

        SHA512

        b653e0840beab0200a3b97c5edeaf3145d2c1b8425d844f464e9aa2d61c1f51253b1e760e095e5086244415a864ed31673dd85290ac04841095d68a74ab2e19c

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF16AE7D4D13045CF0.TMP

        Filesize

        40KB

        MD5

        8bd5a4ecbdff814a0518e56f1c709750

        SHA1

        917a7dcd0806f5ff26637aa751470d6e1286ad38

        SHA256

        73e847dfcca12327c88f148ac0737c320c751fbe23282e1d2bc22ed95d749ef4

        SHA512

        518d430efb37b464ca37574542c23280ca3226bb65532cfc38f8995f725ff032a3eb95a91ec29fbc0892acb9c435515ec239fa49a059b8dbe3778f9ee29c2d91

      • memory/2480-383-0x000001FEC82B0000-0x000001FEC83B0000-memory.dmp

        Filesize

        1024KB

      • memory/2480-498-0x000001FEC29F0000-0x000001FEC2AF0000-memory.dmp

        Filesize

        1024KB

      • memory/2480-216-0x000001FEC4110000-0x000001FEC4112000-memory.dmp

        Filesize

        8KB

      • memory/2480-228-0x000001FEC3CA0000-0x000001FEC3CC0000-memory.dmp

        Filesize

        128KB

      • memory/2480-74-0x000001FEC29E0000-0x000001FEC29E2000-memory.dmp

        Filesize

        8KB

      • memory/2480-249-0x000001FEC4A00000-0x000001FEC4B00000-memory.dmp

        Filesize

        1024KB

      • memory/2480-72-0x000001FEC2920000-0x000001FEC2922000-memory.dmp

        Filesize

        8KB

      • memory/2480-355-0x000001FEC4230000-0x000001FEC4232000-memory.dmp

        Filesize

        8KB

      • memory/2480-358-0x000001FEC4350000-0x000001FEC4352000-memory.dmp

        Filesize

        8KB

      • memory/2480-363-0x000001FEC46C0000-0x000001FEC46C2000-memory.dmp

        Filesize

        8KB

      • memory/2480-367-0x000001FEC4B60000-0x000001FEC4B62000-memory.dmp

        Filesize

        8KB

      • memory/2480-370-0x000001FEC4BE0000-0x000001FEC4BE2000-memory.dmp

        Filesize

        8KB

      • memory/2480-377-0x000001FEC59E0000-0x000001FEC5AE0000-memory.dmp

        Filesize

        1024KB

      • memory/2480-642-0x000001FEB20B0000-0x000001FEB20C0000-memory.dmp

        Filesize

        64KB

      • memory/2480-407-0x000001FEC82B0000-0x000001FEC83B0000-memory.dmp

        Filesize

        1024KB

      • memory/2480-409-0x000001FEC82B0000-0x000001FEC83B0000-memory.dmp

        Filesize

        1024KB

      • memory/2480-70-0x000001FEC2900000-0x000001FEC2902000-memory.dmp

        Filesize

        8KB

      • memory/2480-132-0x000001FEC3320000-0x000001FEC3340000-memory.dmp

        Filesize

        128KB

      • memory/2480-505-0x000001FEC62E0000-0x000001FEC62E2000-memory.dmp

        Filesize

        8KB

      • memory/2480-511-0x000001FEC8180000-0x000001FEC8182000-memory.dmp

        Filesize

        8KB

      • memory/2480-514-0x000001FEC8190000-0x000001FEC8192000-memory.dmp

        Filesize

        8KB

      • memory/2480-520-0x000001FEC81A0000-0x000001FEC81A2000-memory.dmp

        Filesize

        8KB

      • memory/2480-641-0x000001FEB20B0000-0x000001FEB20C0000-memory.dmp

        Filesize

        64KB

      • memory/2480-640-0x000001FEB20B0000-0x000001FEB20C0000-memory.dmp

        Filesize

        64KB

      • memory/2480-69-0x000001FEB2490000-0x000001FEB24B0000-memory.dmp

        Filesize

        128KB

      • memory/2480-636-0x000001FEB20B0000-0x000001FEB20C0000-memory.dmp

        Filesize

        64KB

      • memory/2480-637-0x000001FEB20B0000-0x000001FEB20C0000-memory.dmp

        Filesize

        64KB

      • memory/2480-638-0x000001FEB20B0000-0x000001FEB20C0000-memory.dmp

        Filesize

        64KB

      • memory/2480-639-0x000001FEB20B0000-0x000001FEB20C0000-memory.dmp

        Filesize

        64KB

      • memory/4260-571-0x0000022FAE670000-0x0000022FAE671000-memory.dmp

        Filesize

        4KB

      • memory/4260-570-0x0000022FAE660000-0x0000022FAE661000-memory.dmp

        Filesize

        4KB

      • memory/4260-0-0x0000022FA7520000-0x0000022FA7530000-memory.dmp

        Filesize

        64KB

      • memory/4260-35-0x0000022FA7AC0000-0x0000022FA7AC2000-memory.dmp

        Filesize

        8KB

      • memory/4260-16-0x0000022FA7F00000-0x0000022FA7F10000-memory.dmp

        Filesize

        64KB