Analysis

  • max time kernel
    29s
  • max time network
    27s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18-04-2024 13:28

General

  • Target

    https://www.1337x.to/torrent/1306606/Left-4-Dead-2-v2-1-4-0-AutoUpdate-Multilanguage-No-Steam-OrangeBox/

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://www.1337x.to/torrent/1306606/Left-4-Dead-2-v2-1-4-0-AutoUpdate-Multilanguage-No-Steam-OrangeBox/"
    1⤵
      PID:2128
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2376
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4808
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4196
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4420
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4492

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\F8KKZACU\favicon[1].ico
      Filesize

      1KB

      MD5

      769362362d52b0cfc3271ecb6dec43fb

      SHA1

      9df2439bce4e08d28c14c37cd2f74fc678465b23

      SHA256

      7d524db2f0ca2d20b89f7f197110cb9a5bbaea45b19939dc6e30dc366d20eb61

      SHA512

      62c7afcbc6499babcd062345d95c845818d68645f82f7b19c553a28af906e47b944b591c90797ffd13d0a508dcefd230ad7cc7c23ec3d00af30df2b9c1b1d9ff

    • memory/2376-0-0x000001FB3C220000-0x000001FB3C230000-memory.dmp
      Filesize

      64KB

    • memory/2376-16-0x000001FB3CB00000-0x000001FB3CB10000-memory.dmp
      Filesize

      64KB

    • memory/2376-35-0x000001FB3B4B0000-0x000001FB3B4B2000-memory.dmp
      Filesize

      8KB

    • memory/2376-114-0x000001FB43300000-0x000001FB43301000-memory.dmp
      Filesize

      4KB

    • memory/2376-113-0x000001FB42EF0000-0x000001FB42EF1000-memory.dmp
      Filesize

      4KB

    • memory/4492-66-0x000001A56A0A0000-0x000001A56A0A2000-memory.dmp
      Filesize

      8KB

    • memory/4492-68-0x000001A56A0C0000-0x000001A56A0C2000-memory.dmp
      Filesize

      8KB

    • memory/4492-70-0x000001A56A0E0000-0x000001A56A0E2000-memory.dmp
      Filesize

      8KB

    • memory/4492-72-0x000001A56A300000-0x000001A56A302000-memory.dmp
      Filesize

      8KB

    • memory/4492-74-0x000001A56A3C0000-0x000001A56A3C2000-memory.dmp
      Filesize

      8KB

    • memory/4492-78-0x000001A56A3E0000-0x000001A56A3E2000-memory.dmp
      Filesize

      8KB