Analysis

  • max time kernel
    318s
  • max time network
    875s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-06-2024 13:53

General

  • Target

    http://Google.com

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://Google.com"
    1⤵
      PID:1260
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1280
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4404
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1556
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4508
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1664
    • C:\Windows\System32\DataExchangeHost.exe
      C:\Windows\System32\DataExchangeHost.exe -Embedding
      1⤵
        PID:4440
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\UnpublishGroup.vbs"
        1⤵
          PID:5324
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:4840
          • C:\Windows\system32\msg.exe
            msg * balls
            2⤵
              PID:4480

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\79LPO21U\OTTGHUL1.js

            Filesize

            258KB

            MD5

            5f3ed7df6cd373bae65cf825143275ac

            SHA1

            704adeadd1b92b26b876d84bf3a8fced60e4b4f9

            SHA256

            46a7ffd177e209282c18260e5db6c345a2a9f136b35145a454591de780d96612

            SHA512

            229139297fd0247bfc2a73676d4b5e02da6ae08dfd7e50acbf0fb51e4bfdd4054d35131b2df53aef3d9c619285533eda8959109fe3dd8e89dfd2e33ab09dbc61

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\TTSWREZE\m=Wt6vjf,hhhU8,FCpbqb,WhJNk[1].js

            Filesize

            3KB

            MD5

            25ddbdbdd57de0900b03534adaf51fdf

            SHA1

            7d39069f8176635f59f122746dcbf8d718d9e992

            SHA256

            f1755aed9bf87190c259e12ddf71354a3ee135e0cbb127e29c5ead426a4051ba

            SHA512

            2080232482b6680b34bf05ea4a3321d87ac12961485f983611a564212620bc531aa93752cd9bf4097fce047af64fae326c2d6118029cfcba5b98e751236c96f2

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\TTSWREZE\m=_b,_tp[1].js

            Filesize

            184KB

            MD5

            37b752a84acd1f3f6f9035eb4982376e

            SHA1

            0446b7b85447051219ea446e2cb4816e7e392a37

            SHA256

            4b2cf9183626e1c0a9a0ae7a26297680c6fdea16a05e73e43a829ae5a3fd191a

            SHA512

            7c4b2bafc844ba935e8646d605df72601059ff602e67aae27ef3cecf0d3dad804bd360422a5a2b0de8bdd482dbfbfe5b327532a9d1c50aa2892d1a2ff878d902

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UF7HWPIA\m=RqjULd[2].js

            Filesize

            18KB

            MD5

            0c1da526ac6e4c129e4e66cea8a537d5

            SHA1

            a11e9fd2b45245ccae62f3154e58fe0ce3d96ab7

            SHA256

            f29b31afa33e8f72862df43fc6cb53fa77c5d989b699e4eb1131d508f9d107b4

            SHA512

            80ef8277d3994878a806592367135fdeb3800101149d6ea821b046d768a6d02b37c9c0e8f3c4c5113252a01daa5eab42c540d3e7d6a57f2e6fae508bff029198

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\UWLFE2GR\m=bm51tf[1].js

            Filesize

            1KB

            MD5

            e1171842aa769ecf213f450255d03d05

            SHA1

            5444523e6466dc48cb5e7bcd1b5e88ec3640d478

            SHA256

            5fae936a3e8ee57fb2de320e34a227e4fb2de6f7ae16880a5f9ffac0134f3118

            SHA512

            e735f76659d566a1b70825bafa76f8c8fd17c07938fce6cbc55d6b92a47b2bd92422284393b810609f57a45fb76a8906ca19ef4df19e5eae7746fe3014ee0450

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\VMDT14EN\favicon[1].ico

            Filesize

            5KB

            MD5

            f3418a443e7d841097c714d69ec4bcb8

            SHA1

            49263695f6b0cdd72f45cf1b775e660fdc36c606

            SHA256

            6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

            SHA512

            82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF0DE1F7001C358CCF.TMP

            Filesize

            16KB

            MD5

            18847cd5a3e2e28369d96e37a58b5468

            SHA1

            0a4923f969f1507a90d81e09c287c068735fb892

            SHA256

            2dd01b847a1276207d9d74a733a6801ef20ad8cf612cd74accf073d670b44c22

            SHA512

            a42affefcde083af9d11df8c039baa74efe677f80009b02607c29b573b5b0c2301a6eeb3acc40dc66c495e368a0cf3ac9373c71145eebc2bdc389d9e8ffa5728

          • memory/1280-0-0x0000021870D20000-0x0000021870D30000-memory.dmp

            Filesize

            64KB

          • memory/1280-16-0x0000021870E20000-0x0000021870E30000-memory.dmp

            Filesize

            64KB

          • memory/1280-35-0x000002186E2F0000-0x000002186E2F2000-memory.dmp

            Filesize

            8KB

          • memory/1280-165-0x0000021877B20000-0x0000021877B21000-memory.dmp

            Filesize

            4KB

          • memory/1280-166-0x0000021877B30000-0x0000021877B31000-memory.dmp

            Filesize

            4KB

          • memory/1664-130-0x00000288E18C0000-0x00000288E18C2000-memory.dmp

            Filesize

            8KB

          • memory/1664-186-0x00000288E4600000-0x00000288E4700000-memory.dmp

            Filesize

            1024KB

          • memory/1664-87-0x00000288E1120000-0x00000288E1122000-memory.dmp

            Filesize

            8KB

          • memory/1664-85-0x00000288E10E0000-0x00000288E10E2000-memory.dmp

            Filesize

            8KB

          • memory/1664-93-0x00000288E1350000-0x00000288E1352000-memory.dmp

            Filesize

            8KB

          • memory/1664-95-0x00000288E15B0000-0x00000288E15B2000-memory.dmp

            Filesize

            8KB

          • memory/1664-89-0x00000288E1130000-0x00000288E1132000-memory.dmp

            Filesize

            8KB

          • memory/1664-80-0x00000288E1900000-0x00000288E1920000-memory.dmp

            Filesize

            128KB

          • memory/1664-185-0x00000288E4600000-0x00000288E4700000-memory.dmp

            Filesize

            1024KB

          • memory/1664-91-0x00000288E1330000-0x00000288E1332000-memory.dmp

            Filesize

            8KB

          • memory/1664-241-0x00000288E2BE0000-0x00000288E2BE2000-memory.dmp

            Filesize

            8KB

          • memory/1664-244-0x00000288E2C90000-0x00000288E2C92000-memory.dmp

            Filesize

            8KB

          • memory/1664-311-0x00000288D0190000-0x00000288D01A0000-memory.dmp

            Filesize

            64KB

          • memory/1664-312-0x00000288D0190000-0x00000288D01A0000-memory.dmp

            Filesize

            64KB

          • memory/1664-70-0x00000280CE800000-0x00000280CE900000-memory.dmp

            Filesize

            1024KB

          • memory/1664-66-0x00000288E0A30000-0x00000288E0A32000-memory.dmp

            Filesize

            8KB

          • memory/1664-68-0x00000288E0AF0000-0x00000288E0AF2000-memory.dmp

            Filesize

            8KB

          • memory/1664-64-0x00000288E0A10000-0x00000288E0A12000-memory.dmp

            Filesize

            8KB

          • memory/4508-44-0x000001B69D100000-0x000001B69D200000-memory.dmp

            Filesize

            1024KB

          • memory/4508-43-0x000001B69D100000-0x000001B69D200000-memory.dmp

            Filesize

            1024KB