Resubmissions

16-05-2024 16:15

240516-tqjy7sdb56 1

16-05-2024 16:14

240516-tpwxdacg5z 7

16-05-2024 16:13

240516-tpggpacg3x 1

16-05-2024 16:12

240516-tnvypada57 4

Analysis

  • max time kernel
    28s
  • max time network
    17s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-05-2024 16:12

General

  • Target

    http://selin.id

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://selin.id"
    1⤵
      PID:420
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1252
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4684
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2780
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3860
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3600

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\VVFPT1H9\jquery.min[1].js

      Filesize

      83KB

      MD5

      2f6b11a7e914718e0290410e85366fe9

      SHA1

      69bb69e25ca7d5ef0935317584e6153f3fd9a88c

      SHA256

      05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

      SHA512

      0d40bccaa59fedecf7243d63b33c42592541d0330fefc78ec81a4c6b9689922d5b211011ca4be23ae22621cce4c658f52a1552c92d7ac3615241eb640f8514db

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      4KB

      MD5

      1bfe591a4fe3d91b03cdf26eaacd8f89

      SHA1

      719c37c320f518ac168c86723724891950911cea

      SHA256

      9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

      SHA512

      02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      338B

      MD5

      32e700f75d8e99f9deb845bc8232aa1d

      SHA1

      7615da2e1869d49f60bce76f7486783a0b0e936c

      SHA256

      a6463275ae57207e78a4a864aa759892fbca361cf8940a7651ebdbdaaa346a8e

      SHA512

      3dd4ee53a0c09670f5e6592caa06a5be4c5755af85b974d31dc66e05445ff3e3652f246e509123adc964052cadc52d291cbf1c264a32e2ac681d17ea2d9150db

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\6KWJ2WN4\EXlG7k6[1].png

      Filesize

      1KB

      MD5

      462e1a745cc549db3e42d0d05b6d845a

      SHA1

      344e537897ba791f9d8e4d9c8b420ce0658cd34e

      SHA256

      a08cfe88a64bad3b1eecc75da92f63a424ed298e8e893dd5a11387b06284d343

      SHA512

      39dc08c460b2aca2ddc104fa2152036b9ed839e30ce7a648c3fe7684333149a145ee9c0c71cf826ddee74aff2bc8051afbe25351b2e30f2ac7b10123a1be28af

    • memory/1252-0-0x000001463B520000-0x000001463B530000-memory.dmp

      Filesize

      64KB

    • memory/1252-35-0x000001463A7A0000-0x000001463A7A2000-memory.dmp

      Filesize

      8KB

    • memory/1252-388-0x0000014641D10000-0x0000014641D11000-memory.dmp

      Filesize

      4KB

    • memory/1252-387-0x0000014641D00000-0x0000014641D01000-memory.dmp

      Filesize

      4KB

    • memory/1252-16-0x000001463B620000-0x000001463B630000-memory.dmp

      Filesize

      64KB

    • memory/3600-220-0x000001D76B810000-0x000001D76B830000-memory.dmp

      Filesize

      128KB

    • memory/3600-264-0x000001D76B280000-0x000001D76B282000-memory.dmp

      Filesize

      8KB

    • memory/3600-56-0x000001D769A00000-0x000001D769A02000-memory.dmp

      Filesize

      8KB

    • memory/3600-58-0x000001D769AC0000-0x000001D769AC2000-memory.dmp

      Filesize

      8KB

    • memory/3600-255-0x000001D76B2E0000-0x000001D76B2E2000-memory.dmp

      Filesize

      8KB

    • memory/3600-261-0x000001D76B330000-0x000001D76B332000-memory.dmp

      Filesize

      8KB

    • memory/3600-268-0x000001D76B410000-0x000001D76B412000-memory.dmp

      Filesize

      8KB

    • memory/3600-266-0x000001D76B390000-0x000001D76B392000-memory.dmp

      Filesize

      8KB

    • memory/3600-270-0x000001D76B490000-0x000001D76B492000-memory.dmp

      Filesize

      8KB

    • memory/3600-108-0x000001D759800000-0x000001D759900000-memory.dmp

      Filesize

      1024KB

    • memory/3600-272-0x000001D76B570000-0x000001D76B572000-memory.dmp

      Filesize

      8KB

    • memory/3600-304-0x000001D769A40000-0x000001D769A42000-memory.dmp

      Filesize

      8KB

    • memory/3600-310-0x000001D769A50000-0x000001D769A52000-memory.dmp

      Filesize

      8KB

    • memory/3600-316-0x000001D769A60000-0x000001D769A62000-memory.dmp

      Filesize

      8KB

    • memory/3600-54-0x000001D7595E0000-0x000001D7595E2000-memory.dmp

      Filesize

      8KB

    • memory/3600-49-0x000001D759800000-0x000001D759900000-memory.dmp

      Filesize

      1024KB

    • memory/3600-50-0x000001D759800000-0x000001D759900000-memory.dmp

      Filesize

      1024KB