Analysis

  • max time kernel
    24s
  • max time network
    24s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-03-2024 16:51

General

  • Target

    https://steamcommujity.com/gift/282074578456094565045783477

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://steamcommujity.com/gift/282074578456094565045783477"
    1⤵
      PID:4928
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4392
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:1856
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3976
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3384
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4620
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1452

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\ITEL0I14\jquery-ui[1].js
      Filesize

      458KB

      MD5

      c811575fd210af968e09caa681917b9b

      SHA1

      0bf0ff43044448711b33453388c3a24d99e6cc9c

      SHA256

      d2f0522008bff05c6434e48ac8f11f7464331436a4d5d96a14a058a81a75c82e

      SHA512

      d2234d9e8dcc96bca55fafb83bb327f87c29ae8433fc296c48be3ef8c9a21a0a4305e14823e75416951eecd6221f56fbbb8c89d44b244a27be7b6bea310f2fd1

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\X8D1B6RX\jquery.min[1].js
      Filesize

      86KB

      MD5

      220afd743d9e9643852e31a135a9f3ae

      SHA1

      88523924351bac0b5d560fe0c5781e2556e7693d

      SHA256

      0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a

      SHA512

      6e722fce1e8553be592b1a741972c7f5b7b0cdafce230e9d2d587d20283482881c96660682e4095a5f14df45a96ec193a9b222030c53b1b7bbe8312b2eae440d

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\DOMStore\LMDTABZV\www.bing[1].xml
      Filesize

      2KB

      MD5

      8c9a0e1993a9641b04291d1852d8de12

      SHA1

      ff3c28b19d6a6794fd54f05de7522f01cddc7e94

      SHA256

      393ded4b34817a986a9279884d1b68bfe747c79a77b15b6b4376fe314a9cef3f

      SHA512

      8f5c06a70b4e06dfa3845980a6fcb26372eaae025e51f89ea31418e17a57510f3ee7021273b42bb6e223919943bf6034fe00b9b1f73a69ee85444ebb6dee7e66

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
      Filesize

      4KB

      MD5

      1bfe591a4fe3d91b03cdf26eaacd8f89

      SHA1

      719c37c320f518ac168c86723724891950911cea

      SHA256

      9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

      SHA512

      02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

    • memory/1452-265-0x000001E6F33D0000-0x000001E6F33F0000-memory.dmp
      Filesize

      128KB

    • memory/4392-0-0x0000025208320000-0x0000025208330000-memory.dmp
      Filesize

      64KB

    • memory/4392-16-0x0000025208700000-0x0000025208710000-memory.dmp
      Filesize

      64KB

    • memory/4392-35-0x00000252085D0000-0x00000252085D2000-memory.dmp
      Filesize

      8KB

    • memory/4620-139-0x000002A51CC80000-0x000002A51CC82000-memory.dmp
      Filesize

      8KB

    • memory/4620-153-0x000002A51CF00000-0x000002A51CF02000-memory.dmp
      Filesize

      8KB

    • memory/4620-133-0x000002A51CC40000-0x000002A51CC42000-memory.dmp
      Filesize

      8KB

    • memory/4620-136-0x000002A51CC60000-0x000002A51CC62000-memory.dmp
      Filesize

      8KB

    • memory/4620-126-0x000002A51CBC0000-0x000002A51CBC2000-memory.dmp
      Filesize

      8KB

    • memory/4620-142-0x000002A51CCA0000-0x000002A51CCA2000-memory.dmp
      Filesize

      8KB

    • memory/4620-146-0x000002A51CCC0000-0x000002A51CCC2000-memory.dmp
      Filesize

      8KB

    • memory/4620-149-0x000002A51CEF0000-0x000002A51CEF2000-memory.dmp
      Filesize

      8KB

    • memory/4620-157-0x000002A51CF10000-0x000002A51CF12000-memory.dmp
      Filesize

      8KB

    • memory/4620-130-0x000002A51CBE0000-0x000002A51CBE2000-memory.dmp
      Filesize

      8KB

    • memory/4620-160-0x000002A51CF30000-0x000002A51CF32000-memory.dmp
      Filesize

      8KB

    • memory/4620-165-0x000002A51CF50000-0x000002A51CF52000-memory.dmp
      Filesize

      8KB

    • memory/4620-167-0x000002A51CF60000-0x000002A51CF62000-memory.dmp
      Filesize

      8KB

    • memory/4620-169-0x000002A51CF70000-0x000002A51CF72000-memory.dmp
      Filesize

      8KB

    • memory/4620-199-0x000002A50A110000-0x000002A50A112000-memory.dmp
      Filesize

      8KB

    • memory/4620-66-0x000002A509DF0000-0x000002A509DF2000-memory.dmp
      Filesize

      8KB

    • memory/4620-64-0x000002A509DD0000-0x000002A509DD2000-memory.dmp
      Filesize

      8KB

    • memory/4620-61-0x000002A509DA0000-0x000002A509DA2000-memory.dmp
      Filesize

      8KB