Analysis

  • max time kernel
    11s
  • max time network
    9s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-04-2024 11:11

General

  • Target

    http://heylink.me/Exoticgirlshow

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://heylink.me/Exoticgirlshow"
    1⤵
      PID:4404
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2148
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2704
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2068
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4164
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2984
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4784

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\7UADUTPW\favicon_dark[1].ico

      Filesize

      76KB

      MD5

      bd027ef46351dedbd80c44d67f8bfadd

      SHA1

      d735487fb1cdc416af791eef43697b144d8ac8f3

      SHA256

      3f119e16b4dfb3a900e84e0c43a2fdd10ac6d49d6f9ae8369b3efc7441c98850

      SHA512

      18640db45c13c94919cd2d342ddbb852790daf9045606496407ffedba731d65ab96e7a6bb63aab3f03b053f0b181f725cf385c77e9f9d5eedbf7910e1c4d45cc

    • memory/2148-0-0x0000019B67D20000-0x0000019B67D30000-memory.dmp

      Filesize

      64KB

    • memory/2148-16-0x0000019B68100000-0x0000019B68110000-memory.dmp

      Filesize

      64KB

    • memory/2148-35-0x0000019B67FB0000-0x0000019B67FB2000-memory.dmp

      Filesize

      8KB

    • memory/2148-420-0x0000019B6EAC0000-0x0000019B6EAC1000-memory.dmp

      Filesize

      4KB

    • memory/2148-418-0x0000019B6EAB0000-0x0000019B6EAB1000-memory.dmp

      Filesize

      4KB

    • memory/2984-221-0x00000216EAEE0000-0x00000216EAEE2000-memory.dmp

      Filesize

      8KB

    • memory/2984-254-0x00000216EBA10000-0x00000216EBA30000-memory.dmp

      Filesize

      128KB

    • memory/2984-219-0x00000216EAEC0000-0x00000216EAEC2000-memory.dmp

      Filesize

      8KB

    • memory/2984-227-0x00000216EB370000-0x00000216EB372000-memory.dmp

      Filesize

      8KB

    • memory/2984-225-0x00000216EB350000-0x00000216EB352000-memory.dmp

      Filesize

      8KB

    • memory/2984-223-0x00000216EB340000-0x00000216EB342000-memory.dmp

      Filesize

      8KB

    • memory/2984-214-0x00000216E8780000-0x00000216E8782000-memory.dmp

      Filesize

      8KB

    • memory/2984-236-0x00000216E7F00000-0x00000216E8000000-memory.dmp

      Filesize

      1024KB

    • memory/2984-252-0x00000216EB870000-0x00000216EB970000-memory.dmp

      Filesize

      1024KB

    • memory/2984-216-0x00000216E87C0000-0x00000216E87C2000-memory.dmp

      Filesize

      8KB

    • memory/2984-260-0x00000216E7A10000-0x00000216E7A12000-memory.dmp

      Filesize

      8KB

    • memory/2984-263-0x00000216E7B40000-0x00000216E7B42000-memory.dmp

      Filesize

      8KB

    • memory/2984-265-0x00000216E7B50000-0x00000216E7B52000-memory.dmp

      Filesize

      8KB

    • memory/2984-269-0x00000216E7BF0000-0x00000216E7BF2000-memory.dmp

      Filesize

      8KB

    • memory/2984-272-0x00000216E7C10000-0x00000216E7C12000-memory.dmp

      Filesize

      8KB

    • memory/2984-55-0x00000216D6520000-0x00000216D6522000-memory.dmp

      Filesize

      8KB

    • memory/2984-58-0x00000216D6550000-0x00000216D6552000-memory.dmp

      Filesize

      8KB

    • memory/2984-60-0x00000216D6570000-0x00000216D6572000-memory.dmp

      Filesize

      8KB