Resubmissions

21/02/2024, 15:01

240221-sd6f1aac39 10

Analysis

  • max time kernel
    85s
  • max time network
    109s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/02/2024, 15:01

General

  • Target

    https://drive.google.com/file/d/1r5JBu0uvjRMGGdqYEHta_E-920jYH4qL/view

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 39 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://drive.google.com/file/d/1r5JBu0uvjRMGGdqYEHta_E-920jYH4qL/view"
    1⤵
      PID:2756
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1704
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • NTFS ADS
      PID:5012
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1292
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1620
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3188
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
        PID:2696
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:5108
        • C:\Windows\system32\OpenWith.exe
          C:\Windows\system32\OpenWith.exe -Embedding
          1⤵
          • Modifies registry class
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4644
          • C:\Program Files\VideoLAN\VLC\vlc.exe
            "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Temp1_Squidward950.zip\SquidwardTentacles.pth"
            2⤵
              PID:4572

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0YZH0870\edgecompatviewlist[1].xml

                  Filesize

                  74KB

                  MD5

                  d4fc49dc14f63895d997fa4940f24378

                  SHA1

                  3efb1437a7c5e46034147cbbc8db017c69d02c31

                  SHA256

                  853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                  SHA512

                  cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\HSPGVV92\drive.google[1].xml

                  Filesize

                  13B

                  MD5

                  c1ddea3ef6bbef3e7060a1a9ad89e4c5

                  SHA1

                  35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

                  SHA256

                  b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

                  SHA512

                  6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\4ZT7HBN4\drive_2020q4_32dp[1].png

                  Filesize

                  831B

                  MD5

                  916c9bcccf19525ad9d3cd1514008746

                  SHA1

                  9ccce6978d2417927b5150ffaac22f907ff27b6e

                  SHA256

                  358e814139d3ed8469b36935a071be6696ccad7dd9bdbfdb80c052b068ae2a50

                  SHA512

                  b73c1a81997abe12dba4ae1fa38f070079448c3798e7161c9262ccba6ee6a91e8a243f0e4888c8aef33ce1cf83818fc44c85ae454a522a079d08121cd8628d00

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\5VZ2SH11\drive_2022q3_32dp[1].png

                  Filesize

                  1KB

                  MD5

                  c66f20f2e39eb2f6a0a4cdbe0d955e5f

                  SHA1

                  575ef086ce461e0ef83662e3acb3c1a789ebb0a8

                  SHA256

                  2ab9cd0ffdddf7bf060620ae328fe626bfa2c004739adedb74ec894faf9bee31

                  SHA512

                  b9c44a2113fb078d83e968dc0af2e78995bb6dd4ca25abff31e9ab180849c5de3036b69931cca295ac64155d5b168b634e35b7699f3fe65d4a30e9058a2639bd

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\Z7B9VAVD\suggestions[1].en-US

                  Filesize

                  17KB

                  MD5

                  5a34cb996293fde2cb7a4ac89587393a

                  SHA1

                  3c96c993500690d1a77873cd62bc639b3a10653f

                  SHA256

                  c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                  SHA512

                  e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Squidward950.zip

                  Filesize

                  15.2MB

                  MD5

                  8a1c76c259af980bb34c1e6fd1271057

                  SHA1

                  5a3c672f2f91129458a0e5e0362780ca07830648

                  SHA256

                  aa0006a87b5d0894cb810cd75a9f4cd69027d499cfcb75a1c8aa68ed0edd7046

                  SHA512

                  4b29e73f5ea240e1c03df79000307d58030edf242cc98341a122e089ed72d098080b7b55f06ac78401ccaba671af5c4da46dd3bd24a74d2585c8c2dc626efc8d

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Squidward950.zip

                  Filesize

                  17.6MB

                  MD5

                  b19e60eb1967e2480069576d4cd1fc11

                  SHA1

                  852557c31c614f7468762cdddb45aacbb8a476bb

                  SHA256

                  f8b5a5ba2078ed1db1064ad60b0748f7cfa3e36c2d928764119d3c61aa4dd6c0

                  SHA512

                  76f29b6dbd9cae2b15e2f92caf1c8d2d7657f62ec3b8c4771349b3e61ea4d6434fa19aed6f001648bfb0594d704126c5159dc799bf90de0d03fdfbf7b8e96472

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\Squidward950.zip.7s7g0v3.partial

                  Filesize

                  4.4MB

                  MD5

                  d500ace66bac408a9125364b61590538

                  SHA1

                  5bf1ce8e742499e26072aa8d9e5102eae2292159

                  SHA256

                  483f9fb54e5ab1dac949a448a2135c2d5a007d745f15469863087b52f860806c

                  SHA512

                  86092faedf5245cc49f7dd96ac34e05023135a15be0f98f9086d7132755386d4ffbc43d05d97d0ada22d73972cde968de93f6ef9cd52832e4bf2a9c3f86aa244

                • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\8R2UDOLY\Squidward950[1].zip

                  Filesize

                  1.1MB

                  MD5

                  1a0df2842846f2663cf2bc25a80db781

                  SHA1

                  c3b5bbf8333376da852307ee0b7c6a2e0f65dac2

                  SHA256

                  38252cf32a502bb0966a9dfa1831ef556a936b2e881baadf8e84ef8e2f63f6e5

                  SHA512

                  9fd26ecfc5524898fcd3d9f335e55e9250ba4b2717f64099b539e74e978d8028d53ca39e82c8b349a6e4520c6a15a899c6aeda668df4a60e7fb846810c77287e

                • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

                  Filesize

                  506B

                  MD5

                  6b4516b582a30b7f002c08a7331bb09d

                  SHA1

                  5a4063c2fa47ff862b1ae2a45d4b355a847697e5

                  SHA256

                  d69edcca56a5310c2dede95a844a6fe2773b44cc9c504bc435ec4d4e0dbf1e71

                  SHA512

                  2c80b996df947a31d1ba2a372a67f85f0afb3b3b36b8c088ded6d08890ba59adcd90efc292f7a5764f4fe879587786fdfd34c651f8b896cc29376813afd8feb0

                • memory/1704-128-0x000001F6C4810000-0x000001F6C4811000-memory.dmp

                  Filesize

                  4KB

                • memory/1704-129-0x000001F6C4820000-0x000001F6C4821000-memory.dmp

                  Filesize

                  4KB

                • memory/1704-0-0x000001F6BD600000-0x000001F6BD610000-memory.dmp

                  Filesize

                  64KB

                • memory/1704-35-0x000001F6BDAF0000-0x000001F6BDAF2000-memory.dmp

                  Filesize

                  8KB

                • memory/1704-16-0x000001F6BDC00000-0x000001F6BDC10000-memory.dmp

                  Filesize

                  64KB

                • memory/3188-292-0x000002ABD5B60000-0x000002ABD5B62000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-332-0x000002ABD6A80000-0x000002ABD6A82000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-285-0x000002ABD4E50000-0x000002ABD4E52000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-289-0x000002ABD5570000-0x000002ABD5572000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-250-0x000002ABD4060000-0x000002ABD4062000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-296-0x000002ABD5BE0000-0x000002ABD5BE2000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-300-0x000002ABD5BF0000-0x000002ABD5BF2000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-304-0x000002ABD5EF0000-0x000002ABD5EF2000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-307-0x000002ABD5F10000-0x000002ABD5F12000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-311-0x000002ABD6190000-0x000002ABD6192000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-314-0x000002ABD61B0000-0x000002ABD61B2000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-324-0x000002ABD61F0000-0x000002ABD61F2000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-328-0x000002ABD6A30000-0x000002ABD6A33000-memory.dmp

                  Filesize

                  12KB

                • memory/3188-282-0x000002ABD4AF0000-0x000002ABD4AF2000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-340-0x000002ABD6AE0000-0x000002ABD6AE2000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-343-0x000002ABD6B00000-0x000002ABD6B02000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-346-0x000002ABD6B20000-0x000002ABD6B22000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-244-0x000002ABD3FC0000-0x000002ABD3FC2000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-241-0x000002ABD3DC0000-0x000002ABD3DC2000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-180-0x000002ABD3B20000-0x000002ABD3B22000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-167-0x000002ABD56A0000-0x000002ABD57A0000-memory.dmp

                  Filesize

                  1024KB

                • memory/3188-157-0x000002ABD56A0000-0x000002ABD57A0000-memory.dmp

                  Filesize

                  1024KB

                • memory/3188-133-0x000002ABDC520000-0x000002ABDC540000-memory.dmp

                  Filesize

                  128KB

                • memory/3188-93-0x000002ABD1870000-0x000002ABD1872000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-90-0x000002ABD1830000-0x000002ABD1832000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-86-0x000002ABD1C30000-0x000002ABD1C32000-memory.dmp

                  Filesize

                  8KB

                • memory/3188-79-0x000002ABD18C0000-0x000002ABD18E0000-memory.dmp

                  Filesize

                  128KB