Analysis

  • max time kernel
    3s
  • max time network
    50s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-02-2024 12:00

General

  • Target

    https://nitrocodes.vercell.app

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://nitrocodes.vercell.app"
    1⤵
      PID:1908
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4712
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2840
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      PID:2768
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5068
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:836

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\J8BQJS3R\recaptcha__en[1].js

      Filesize

      491KB

      MD5

      3e528c5bd4e8985f914f84bc5f86df5f

      SHA1

      34104ea645a6789dd9cb58c264e20ed6855ea1de

      SHA256

      e51e616d124133b0fb24968469097a4d311b972f78455143d940703ea0639ba6

      SHA512

      c59a1d40f649446f33ff0ff3fa9a8e997d3cff10f968d35226ba08bb91c9013ae937460cf2dab0888848abe1b693d4377fbd6904e3e03360b15035a8c3e9bc97

    • memory/836-81-0x0000023975EB0000-0x0000023975EB2000-memory.dmp

      Filesize

      8KB

    • memory/836-76-0x0000023975A60000-0x0000023975A80000-memory.dmp

      Filesize

      128KB

    • memory/836-77-0x0000023975CD0000-0x0000023975CD2000-memory.dmp

      Filesize

      8KB

    • memory/836-79-0x0000023975CF0000-0x0000023975CF2000-memory.dmp

      Filesize

      8KB

    • memory/836-83-0x0000023975ED0000-0x0000023975ED2000-memory.dmp

      Filesize

      8KB

    • memory/836-147-0x0000023976600000-0x0000023976620000-memory.dmp

      Filesize

      128KB

    • memory/836-167-0x0000023977A00000-0x0000023977B00000-memory.dmp

      Filesize

      1024KB

    • memory/836-169-0x0000023977B00000-0x0000023977C00000-memory.dmp

      Filesize

      1024KB

    • memory/836-275-0x0000023977B00000-0x0000023977C00000-memory.dmp

      Filesize

      1024KB

    • memory/4712-35-0x000001D1AB210000-0x000001D1AB212000-memory.dmp

      Filesize

      8KB

    • memory/4712-0-0x000001D1AAF20000-0x000001D1AAF30000-memory.dmp

      Filesize

      64KB

    • memory/4712-16-0x000001D1AB800000-0x000001D1AB810000-memory.dmp

      Filesize

      64KB