Analysis

  • max time kernel
    28s
  • max time network
    17s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-03-2024 14:57

General

  • Target

    XZRTyg.html

  • Size

    514B

  • MD5

    d6db6d1f7b963845dc16bd6e1147f817

  • SHA1

    9ea5b1de140e9851aa5b0eb7c57281db2175abc6

  • SHA256

    247b9d17e39ee3a7972c1e094b7703b9c94f0004009acb46b06a90513c15ba83

  • SHA512

    b80b3530be7c2aa5e89815f5aedafcd178a405ad511da85047a1557a149be75c919eb22fa34f33ac972ead1aa0ab5995b1c77db1298d4e6b324acefdcdd03d06

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "C:\Users\Admin\AppData\Local\Temp\XZRTyg.html"
    1⤵
      PID:3988
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4868
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3512
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1004
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2156
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4932

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF9E5724F746166854.TMP

      Filesize

      16KB

      MD5

      c78e99ef0043f77dc4533437bc7dbedc

      SHA1

      528e8ea12863bc456860d5da3010fc1e28ff558c

      SHA256

      ea730786a8906848225150044f15eca3719cbc4fe2a9ebec14fc19be8348c6ae

      SHA512

      47271f34966f7f0664bf3761aaa5f0a3ac15250ba351a1c77c76a1158075aa60580df92ece4dd2300a24192852b1f810d0af3f76f422818243b044160da16b5c

    • memory/4868-0-0x000001B5A0320000-0x000001B5A0330000-memory.dmp

      Filesize

      64KB

    • memory/4868-16-0x000001B5A0B00000-0x000001B5A0B10000-memory.dmp

      Filesize

      64KB

    • memory/4868-35-0x000001B59F5F0000-0x000001B59F5F2000-memory.dmp

      Filesize

      8KB

    • memory/4868-73-0x000001B5A0710000-0x000001B5A0712000-memory.dmp

      Filesize

      8KB

    • memory/4868-76-0x000001B5A04D0000-0x000001B5A04D1000-memory.dmp

      Filesize

      4KB

    • memory/4868-80-0x000001B59F5E0000-0x000001B59F5E1000-memory.dmp

      Filesize

      4KB

    • memory/4932-53-0x00000267E5C60000-0x00000267E5C62000-memory.dmp

      Filesize

      8KB

    • memory/4932-58-0x00000267E5CD0000-0x00000267E5CD2000-memory.dmp

      Filesize

      8KB

    • memory/4932-56-0x00000267E5CB0000-0x00000267E5CB2000-memory.dmp

      Filesize

      8KB