Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-05-2024 15:04

General

  • Target

    x64/Release/net6.0-windows/WpfApp1.exe

  • Size

    146KB

  • MD5

    e54d0f9f1142680972a8eba9b3925b9d

  • SHA1

    2ee0ac858e7b5dee03ea42fe78f71068e4f88d14

  • SHA256

    9b8597eac0d22891e3ecf4cf287822d4cda4ed3fda60bf98f04948f6611cf2be

  • SHA512

    02f00e17ccc84623bc32927401b46251038b830f0b41b058cb22462beb24e2d7219e19ac1aa4afb51ef1e04aa800c3c999b59e71fc94a3868c74c4f6ff16564a

  • SSDEEP

    3072:7czkitvo4BpYN/6mBPry8TXROLdW5m4mURh9OOGj0k9:7A4NCmBPry/N2VOOe

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x64\Release\net6.0-windows\WpfApp1.exe
    "C:\Users\Admin\AppData\Local\Temp\x64\Release\net6.0-windows\WpfApp1.exe"
    1⤵
    • Checks computer location settings
    PID:3660
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2108
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4812
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3536
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2476
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:3752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V28C7N3J\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\IKXBIF4Z\dotnet.microsoft[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\IKXBIF4Z\dotnet.microsoft[1].xml

    Filesize

    84B

    MD5

    a38a6408f3ece8729bf07eb9ed15488a

    SHA1

    5080d29c5df51afc912041a7fd23834797b16aaa

    SHA256

    92089b5f835c25cebb2596f9049034d3e28b637d02aee0eba467c0278ca3a1ab

    SHA512

    4ac1f43bf7623c73f6a7c2fbd97bae554cf78d3482fcc549dba14ce4951eaf3f571876293f2ea439fcfb374ccfc53a0855a5b1672a6c8c0962109c8f7a558d8a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\EM27FZX4\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\XR2NQND7\windowsdesktop-runtime-6.0.29-win-x64[1].exe

    Filesize

    32KB

    MD5

    e7e5e020afdb72c33d7a22a21692da1c

    SHA1

    8643892a4be4ad9f9f6d0bce5c5a1cfb47437805

    SHA256

    3e4ac1cf49dd7a857b23066e8e87495a461c94f87d99331c6a7969b19a365db5

    SHA512

    39cc721ecceab2531a47389e72234804375f4a55be15babe8189d9154f356f78711284bc05e3c70a6a902edd5b09bac8dfddf999b94c93fa3c0f3dce12af7fe4

  • memory/2108-0-0x000001A1E8E20000-0x000001A1E8E30000-memory.dmp

    Filesize

    64KB

  • memory/2108-16-0x000001A1E8F20000-0x000001A1E8F30000-memory.dmp

    Filesize

    64KB

  • memory/2108-364-0x000001A1F1200000-0x000001A1F1201000-memory.dmp

    Filesize

    4KB

  • memory/2108-365-0x000001A1F1210000-0x000001A1F1211000-memory.dmp

    Filesize

    4KB

  • memory/2108-35-0x000001A1E60D0000-0x000001A1E60D2000-memory.dmp

    Filesize

    8KB

  • memory/3752-207-0x0000023ABCB00000-0x0000023ABCC00000-memory.dmp

    Filesize

    1024KB

  • memory/3752-274-0x0000023AC2760000-0x0000023AC2780000-memory.dmp

    Filesize

    128KB

  • memory/3752-169-0x0000023AC1180000-0x0000023AC1182000-memory.dmp

    Filesize

    8KB

  • memory/3752-61-0x0000023AAAAA0000-0x0000023AAAAA2000-memory.dmp

    Filesize

    8KB

  • memory/3752-243-0x0000023AC28A0000-0x0000023AC29A0000-memory.dmp

    Filesize

    1024KB

  • memory/3752-58-0x0000023AAAA70000-0x0000023AAAA72000-memory.dmp

    Filesize

    8KB

  • memory/3752-273-0x0000023AC2760000-0x0000023AC2780000-memory.dmp

    Filesize

    128KB

  • memory/3752-171-0x0000023AC1190000-0x0000023AC1192000-memory.dmp

    Filesize

    8KB

  • memory/3752-173-0x0000023AC11B0000-0x0000023AC11B2000-memory.dmp

    Filesize

    8KB

  • memory/3752-332-0x0000023AC1F90000-0x0000023AC1F92000-memory.dmp

    Filesize

    8KB

  • memory/3752-167-0x0000023AC1160000-0x0000023AC1162000-memory.dmp

    Filesize

    8KB

  • memory/3752-165-0x0000023AC1140000-0x0000023AC1142000-memory.dmp

    Filesize

    8KB

  • memory/3752-163-0x0000023AC1120000-0x0000023AC1122000-memory.dmp

    Filesize

    8KB

  • memory/3752-63-0x0000023AAAAC0000-0x0000023AAAAC2000-memory.dmp

    Filesize

    8KB