Resubmissions

10/01/2024, 15:12

240110-sln7paafc8 4

10/01/2024, 15:10

240110-sj53eshgaq 1

Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/01/2024, 15:12

General

  • Target

    http://info.isd-service.de/go/11/5OQE6QJ4-5NP3NGLP-5NP3NGR1-12BOF1.html

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://info.isd-service.de/go/11/5OQE6QJ4-5NP3NGLP-5NP3NGR1-12BOF1.html"
    1⤵
      PID:4280
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4892
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2320
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4312
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4708
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4828
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:1092
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4360
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4164
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:932
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
        PID:4296

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\B0IRSMYL\forms.office[1].xml

        Filesize

        13B

        MD5

        c1ddea3ef6bbef3e7060a1a9ad89e4c5

        SHA1

        35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

        SHA256

        b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

        SHA512

        6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

      • memory/4828-151-0x000001C9AB4F0000-0x000001C9AB4F2000-memory.dmp

        Filesize

        8KB

      • memory/4828-295-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-64-0x000001C9A8E80000-0x000001C9A8E82000-memory.dmp

        Filesize

        8KB

      • memory/4828-62-0x000001C9A8E60000-0x000001C9A8E62000-memory.dmp

        Filesize

        8KB

      • memory/4828-60-0x000001C9A8E40000-0x000001C9A8E42000-memory.dmp

        Filesize

        8KB

      • memory/4828-83-0x000001C9A9770000-0x000001C9A9870000-memory.dmp

        Filesize

        1024KB

      • memory/4828-80-0x000001C9A9710000-0x000001C9A9730000-memory.dmp

        Filesize

        128KB

      • memory/4828-100-0x000001C9A9E00000-0x000001C9A9E20000-memory.dmp

        Filesize

        128KB

      • memory/4828-278-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-111-0x000001C9AA900000-0x000001C9AAA00000-memory.dmp

        Filesize

        1024KB

      • memory/4828-294-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-119-0x000001C9AA0F0000-0x000001C9AA0F2000-memory.dmp

        Filesize

        8KB

      • memory/4828-123-0x000001C9AB440000-0x000001C9AB442000-memory.dmp

        Filesize

        8KB

      • memory/4828-132-0x000001C9A9FE0000-0x000001C9A9FE2000-memory.dmp

        Filesize

        8KB

      • memory/4828-129-0x000001C9A9F90000-0x000001C9A9F92000-memory.dmp

        Filesize

        8KB

      • memory/4828-279-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-281-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-280-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-109-0x000001C9A9BA0000-0x000001C9A9BC0000-memory.dmp

        Filesize

        128KB

      • memory/4828-293-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-292-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-291-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-290-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-289-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-288-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-287-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-286-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-285-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-284-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-283-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4828-282-0x000001C9986B0000-0x000001C9986C0000-memory.dmp

        Filesize

        64KB

      • memory/4892-35-0x000002CEDF0F0000-0x000002CEDF0F2000-memory.dmp

        Filesize

        8KB

      • memory/4892-0-0x000002CEE1D20000-0x000002CEE1D30000-memory.dmp

        Filesize

        64KB

      • memory/4892-16-0x000002CEE2600000-0x000002CEE2610000-memory.dmp

        Filesize

        64KB