Analysis

  • max time kernel
    52s
  • max time network
    43s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29-03-2024 16:44

General

  • Target

    https://steamcommunivy.com/gjft/738135

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://steamcommunivy.com/gjft/738135"
    1⤵
      PID:3808
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4916
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4348
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3532
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3344
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3776
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:1544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      4KB

      MD5

      1bfe591a4fe3d91b03cdf26eaacd8f89

      SHA1

      719c37c320f518ac168c86723724891950911cea

      SHA256

      9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

      SHA512

      02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\OBUH2B2B\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\LLXO54NP\0a86aaf2866e3d5a80fdd2f0b7a3aaa3dc12e19ad2ab[1].css

      Filesize

      75KB

      MD5

      d75bc33f0e1f113e13918a1574bed89e

      SHA1

      ce9524469a86d2cf429390d9a2b09151906f16f5

      SHA256

      c2815908a70bff8204d9c9dc034dd649f3f560a90112b11ddd5e0e53583bd39c

      SHA512

      151a8dfee28aaf232ed27150be0fd259b3c31f176187caf59ba231d067db9a6886bdf62e9bc73632cedd001847d7168fa2ad598e71b315385f547f899ec7361f

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\LLXO54NP\jquery.min[1].js

      Filesize

      86KB

      MD5

      220afd743d9e9643852e31a135a9f3ae

      SHA1

      88523924351bac0b5d560fe0c5781e2556e7693d

      SHA256

      0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a

      SHA512

      6e722fce1e8553be592b1a741972c7f5b7b0cdafce230e9d2d587d20283482881c96660682e4095a5f14df45a96ec193a9b222030c53b1b7bbe8312b2eae440d

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RPEKC1A5\0f48547ccbdacf78e7450e99722e2fed386f233cd0c2[1].css

      Filesize

      20KB

      MD5

      76b1bdbafa76a16eb077711e0852240f

      SHA1

      4eeaffc1d6645d958efdf93b127bd345134bdee0

      SHA256

      e72bfd5b2451298de330b65ffbf950c8f830c5d373435f26fce733e1264bef5d

      SHA512

      fa7e4606b736edfc15d42e00dc83e8e4ee20b8b79cd7c10b393d29ad220afb75fcad5b959b51fb37c74ee9970ebf80cd7a75d7e4e8be1bfa8ec3e79d2aca4cd1

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RPEKC1A5\fc0041b9984cfb96199a4f42c76fb4cbc457e4fda690[1].css

      Filesize

      11KB

      MD5

      dacb80dabfaebd8b5c696ca29bddd59e

      SHA1

      d10bdeb6162bb0591b13799eac711d320958d1c5

      SHA256

      6a13129c52b4af929efe3e1fddeceb315a4f8038ad01c469f8d45d5c19483ac9

      SHA512

      dc812155362dd80a49c903dd65953594c0c75b665425616f203ff77e78499174eb400d9ebbec5b670a46b81c316f166eeed202e6b965f0f02587a49f2ada61f7

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RSNNZBDR\1a6bef86257c07d7e07b85641118b2fedb31579d25b4[1].css

      Filesize

      19KB

      MD5

      2727c215f1b26015043511e9735a46f7

      SHA1

      7d1dc9acca9b896d0e880973e33e339188fab602

      SHA256

      dbdcded3c4261a3c9d79cb3cf9e641744ad1f2db504690f3a1a06f6b3893dda4

      SHA512

      dc048227b3c80caf9ba2193d2f58af19745e1c4efb893ed742a8b54c25509072186c9141aa963e0454bbb91dcb3945ff3862ac09cc12471d5e9a357246104708

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RSNNZBDR\9163dadfe9962ca7c511914f32060f3a0a5f78c31413[1].css

      Filesize

      10KB

      MD5

      2113b6560d12d0fbaafcb9b964364591

      SHA1

      781afbd9b39e0ccfd8f6a5d906a48639b62105e0

      SHA256

      02ed5fedd4d231fd7599d828707a1af9728f3dd33876047b5b045c1cec3f5d02

      SHA512

      78c3d3d5056ca06dfb66cfad0820de44b947859b4f886e21ecc6700ba31ee9b7f51faf45d100e6ae591147382cbf18c79c8b9d42ab2dcd93e4318227bd404a8e

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\W4H2N6J6\298035e114611f1452a0d3aa6e86352e1ab512824c98[1].css

      Filesize

      5KB

      MD5

      8e61ebf5e7099224faae3ee61be0e439

      SHA1

      433ff93ebd0872fdb8750569824684eaee0dace1

      SHA256

      f653dbf761adb689f70bdfbc792ae65192e95b544d7e66dce483a4931b4c58e3

      SHA512

      f3a2c5b1471952950aebb30f6da4fdac54eafa8b5fdd66ca3d44171b0eec17a309460f15b22af8cec00da1703b89367db2348b12f0501c0f3ae3d3599040a741

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\W4H2N6J6\jquery-ui[1].js

      Filesize

      458KB

      MD5

      c811575fd210af968e09caa681917b9b

      SHA1

      0bf0ff43044448711b33453388c3a24d99e6cc9c

      SHA256

      d2f0522008bff05c6434e48ac8f11f7464331436a4d5d96a14a058a81a75c82e

      SHA512

      d2234d9e8dcc96bca55fafb83bb327f87c29ae8433fc296c48be3ef8c9a21a0a4305e14823e75416951eecd6221f56fbbb8c89d44b244a27be7b6bea310f2fd1

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\PHVV6MOP\favicon[1].ico

      Filesize

      37KB

      MD5

      231913fdebabcbe65f4b0052372bde56

      SHA1

      553909d080e4f210b64dc73292f3a111d5a0781f

      SHA256

      9f890a9debcdfccc339149a7943be9aff9e4c9203c2fa37d5671a5b2c88503ad

      SHA512

      7b11b709968c5a52b9b60189fb534f5df56912417243820e9d1c00c97f4bd6d0835f2cdf574d0c36ecb32dbbf5fc397324df54f7fdf9e1b062b5dbda2c02e919

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\nork3fi\imagestore.dat

      Filesize

      46KB

      MD5

      6875cd7d57e5e7dfb1b79ee85607cd4e

      SHA1

      4905dbd10dfe62e858c0e33d8ef65785f0bbffaa

      SHA256

      5f18b69a0c175d191a1c35e2d89ddb2e267c891ac59862e90c03d5564df92199

      SHA512

      e9f234c70a5504a216e24ed0a9c57c440ca7b7b5cac2472e89fffa0ec375a3b67385a02a0c7b0c400b261e1c1b612eda724e296585bbff13cd8a347cf09daece

    • memory/3776-244-0x0000019C739B0000-0x0000019C739B2000-memory.dmp

      Filesize

      8KB

    • memory/3776-251-0x0000019C73950000-0x0000019C73952000-memory.dmp

      Filesize

      8KB

    • memory/3776-184-0x0000019C73DF0000-0x0000019C73E10000-memory.dmp

      Filesize

      128KB

    • memory/3776-208-0x0000019C752E0000-0x0000019C753E0000-memory.dmp

      Filesize

      1024KB

    • memory/3776-92-0x0000019C721F0000-0x0000019C721F2000-memory.dmp

      Filesize

      8KB

    • memory/3776-89-0x0000019C725E0000-0x0000019C725E2000-memory.dmp

      Filesize

      8KB

    • memory/3776-226-0x0000019C76580000-0x0000019C76680000-memory.dmp

      Filesize

      1024KB

    • memory/3776-237-0x0000019C738D0000-0x0000019C738D2000-memory.dmp

      Filesize

      8KB

    • memory/3776-95-0x0000019C72510000-0x0000019C72512000-memory.dmp

      Filesize

      8KB

    • memory/3776-172-0x0000019C73CB0000-0x0000019C73CD0000-memory.dmp

      Filesize

      128KB

    • memory/3776-261-0x0000019C73960000-0x0000019C73962000-memory.dmp

      Filesize

      8KB

    • memory/3776-265-0x0000019C73970000-0x0000019C73972000-memory.dmp

      Filesize

      8KB

    • memory/3776-276-0x0000019C74190000-0x0000019C74192000-memory.dmp

      Filesize

      8KB

    • memory/3776-280-0x0000019C738F0000-0x0000019C738F2000-memory.dmp

      Filesize

      8KB

    • memory/3776-139-0x0000019C739E0000-0x0000019C739E2000-memory.dmp

      Filesize

      8KB

    • memory/4916-311-0x00000136717F0000-0x00000136717F1000-memory.dmp

      Filesize

      4KB

    • memory/4916-312-0x0000013671EB0000-0x0000013671EB1000-memory.dmp

      Filesize

      4KB

    • memory/4916-0-0x000001366B020000-0x000001366B030000-memory.dmp

      Filesize

      64KB

    • memory/4916-35-0x000001366C470000-0x000001366C472000-memory.dmp

      Filesize

      8KB

    • memory/4916-16-0x000001366B400000-0x000001366B410000-memory.dmp

      Filesize

      64KB