Resubmissions

16/04/2024, 07:46

240416-jl8rnacf97 4

Analysis

  • max time kernel
    27s
  • max time network
    24s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/04/2024, 07:46

General

  • Target

    https://www.toneden.io/jeff-flix/post/discord-nitro-generator-made-by-jeff-flix

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://www.toneden.io/jeff-flix/post/discord-nitro-generator-made-by-jeff-flix"
    1⤵
      PID:3612
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3632
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3636
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5080
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:64
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1592

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\QDT5IN6A\favicon[1].png

            Filesize

            1KB

            MD5

            4850bce0ba7f582c01c337f1aea253d7

            SHA1

            0e66b53f0e581c3b077fefc43607719ee9ff67c1

            SHA256

            6bd7cc4af4d2d9d3ffab4786eafc0b16c149c28e9ec8be9a7901316ba915c8ff

            SHA512

            355ff836baac03d44f5af7a6bf70b835440ffccb25ce9b94ac8797c721feba770d23edb0ac6529ad01a22ae521280b82c96e9a948f454ce422b731b686a44f48

          • memory/1592-99-0x0000020DB7D10000-0x0000020DB7D30000-memory.dmp

            Filesize

            128KB

          • memory/1592-64-0x0000020DB6BA0000-0x0000020DB6BA2000-memory.dmp

            Filesize

            8KB

          • memory/1592-66-0x0000020DB6BC0000-0x0000020DB6BC2000-memory.dmp

            Filesize

            8KB

          • memory/1592-68-0x0000020DB6BE0000-0x0000020DB6BE2000-memory.dmp

            Filesize

            8KB

          • memory/1592-100-0x0000020DB7DF0000-0x0000020DB7E10000-memory.dmp

            Filesize

            128KB

          • memory/1592-101-0x0000020DB8090000-0x0000020DB80B0000-memory.dmp

            Filesize

            128KB

          • memory/1592-104-0x0000020DB8300000-0x0000020DB8400000-memory.dmp

            Filesize

            1024KB

          • memory/1592-188-0x0000020DBB220000-0x0000020DBB240000-memory.dmp

            Filesize

            128KB

          • memory/3632-35-0x000001D25F3B0000-0x000001D25F3B2000-memory.dmp

            Filesize

            8KB

          • memory/3632-0-0x000001D25EE20000-0x000001D25EE30000-memory.dmp

            Filesize

            64KB

          • memory/3632-212-0x000001D265F30000-0x000001D265F31000-memory.dmp

            Filesize

            4KB

          • memory/3632-213-0x000001D265F40000-0x000001D265F41000-memory.dmp

            Filesize

            4KB

          • memory/3632-16-0x000001D25F200000-0x000001D25F210000-memory.dmp

            Filesize

            64KB