Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-es
  • resource tags

    arch:x64arch:x86image:win10-20240404-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    05-06-2024 18:56

General

  • Target

    LICENSES.chromium.html

  • Size

    8.7MB

  • MD5

    fcb299831276a7c8bdeb036142da1c25

  • SHA1

    bf6990abb92ab627b7f2e7aecbd5a58b86d2e09a

  • SHA256

    6daa3cd398e5380222c6b6bdb4d66a4b4273d4bb74d6bf53495a5722f03ac0dc

  • SHA512

    1e31ac0b6836d24488e32d04b5028ac2a9e00ebd8e29aaf742d9e0cdb50d5a9d4f7bcc3919b22a793552d31aaed2104415268f14e903754bf25a86510fbc98c9

  • SSDEEP

    24576:RQQa6NA6P5dWWSmwRFXe1vmfpV6k626D6b62vCuApj:RWfTF0

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html"
    1⤵
      PID:4160
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4640
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2816
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1364
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4420
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4424
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:1424
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VSH5XF98\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\GPU367N5\suggestions[1].es-ES

      Filesize

      18KB

      MD5

      e2749896090665aeb9b29bce1a591a75

      SHA1

      59e05283e04c6c0252d2b75d5141ba62d73e9df9

      SHA256

      d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7

      SHA512

      c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5

    • memory/4420-44-0x0000023CB8DC0000-0x0000023CB8EC0000-memory.dmp

      Filesize

      1024KB

    • memory/4424-223-0x0000021AA7B00000-0x0000021AA7C00000-memory.dmp

      Filesize

      1024KB

    • memory/4424-220-0x0000021AA7B00000-0x0000021AA7C00000-memory.dmp

      Filesize

      1024KB

    • memory/4424-97-0x0000021AA6B90000-0x0000021AA6C90000-memory.dmp

      Filesize

      1024KB

    • memory/4424-121-0x0000021AA6D90000-0x0000021AA6E90000-memory.dmp

      Filesize

      1024KB

    • memory/4424-157-0x0000021AA7320000-0x0000021AA7420000-memory.dmp

      Filesize

      1024KB

    • memory/4424-169-0x0000021AA7520000-0x0000021AA7620000-memory.dmp

      Filesize

      1024KB

    • memory/4424-181-0x0000021AA7520000-0x0000021AA7620000-memory.dmp

      Filesize

      1024KB

    • memory/4424-205-0x0000021AA7720000-0x0000021AA7820000-memory.dmp

      Filesize

      1024KB

    • memory/4424-222-0x0000021AA7B00000-0x0000021AA7C00000-memory.dmp

      Filesize

      1024KB

    • memory/4424-212-0x0000021AA7A00000-0x0000021AA7B00000-memory.dmp

      Filesize

      1024KB

    • memory/4424-221-0x0000021AA7B00000-0x0000021AA7C00000-memory.dmp

      Filesize

      1024KB

    • memory/4424-72-0x0000021AA5D30000-0x0000021AA5E30000-memory.dmp

      Filesize

      1024KB

    • memory/4424-219-0x0000021AA7B00000-0x0000021AA7C00000-memory.dmp

      Filesize

      1024KB

    • memory/4424-218-0x0000021AA7A00000-0x0000021AA7B00000-memory.dmp

      Filesize

      1024KB

    • memory/4424-217-0x0000021AA7A00000-0x0000021AA7B00000-memory.dmp

      Filesize

      1024KB

    • memory/4424-216-0x0000021AA7A00000-0x0000021AA7B00000-memory.dmp

      Filesize

      1024KB

    • memory/4424-215-0x0000021AA7A00000-0x0000021AA7B00000-memory.dmp

      Filesize

      1024KB

    • memory/4424-214-0x0000021AA7A00000-0x0000021AA7B00000-memory.dmp

      Filesize

      1024KB

    • memory/4424-213-0x0000021AA7A00000-0x0000021AA7B00000-memory.dmp

      Filesize

      1024KB

    • memory/4640-16-0x00000265AED20000-0x00000265AED30000-memory.dmp

      Filesize

      64KB

    • memory/4640-35-0x00000265ADEA0000-0x00000265ADEA2000-memory.dmp

      Filesize

      8KB

    • memory/4640-0-0x00000265AEC20000-0x00000265AEC30000-memory.dmp

      Filesize

      64KB