Resubmissions

06/06/2024, 15:38

240606-s22sqaga4s 4

06/06/2024, 15:37

240606-s2n7maga31 6

Analysis

  • max time kernel
    1799s
  • max time network
    1796s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/06/2024, 15:38

General

  • Target

    https://urlr.me/fNv2q

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://urlr.me/fNv2q"
    1⤵
      PID:4880
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4108
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:1348
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4916
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4128
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4660
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:836
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4992
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:204
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2052
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2988
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:5720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      4KB

      MD5

      1bfe591a4fe3d91b03cdf26eaacd8f89

      SHA1

      719c37c320f518ac168c86723724891950911cea

      SHA256

      9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

      SHA512

      02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XCFODRP5\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\2V53MIUH\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\2DY675D0\api[1].js

      Filesize

      41KB

      MD5

      f6007cb110ce15c23cfca98e03b6b4eb

      SHA1

      92c89977e153e734eea9b216f24b6fed0338a390

      SHA256

      501fdae7d28ee240c58efc632f3cab3dd94f59fb94fbf8f149a6269ade5dcf27

      SHA512

      9318896d9a489647809dc00b3ac096bb2da7f4d206b295f7bded5540c7e7111d22de1b195bbb7cfbb23c4ee732a1855cefe223c4178201e9186d4a083c4b837a

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      bd8ab302c2a4f71ae273d638a185fc5e

      SHA1

      518f300d427a642ad45dacec31e75bb6570439fe

      SHA256

      bc8d69eef1cf73c1b2900dfa80bb9aae47c428bfbad4f901fef599717be5f98b

      SHA512

      5645af08e5dbf5933455cb4ea38924db39dc3a4ea9be768bbe3076eba2075ccaf1223b395efa150d5496cc615ba708bbfac31ccfbe5c07be6f2fad03cb01a986

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

      Filesize

      1KB

      MD5

      9e6dc44082c409b8b5eefdba6d3be389

      SHA1

      9ee313565cf16d99ca0e613151130f128362540c

      SHA256

      cac59f8bda0bf338d613d43beaffba52800803df00efcdda77304a9072214816

      SHA512

      b49786260d7d5d5c8cd5f9b40a95fe3c3a989ef451eac80c54ba08b4b8fc4bd7d80046d023ec3c72e13d5c1e099936b64704f0bda0c15892febb59aaa5c4c8e5

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

      Filesize

      724B

      MD5

      8202a1cd02e7d69597995cabbe881a12

      SHA1

      8858d9d934b7aa9330ee73de6c476acf19929ff6

      SHA256

      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

      SHA512

      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      1b2a271cc8d559e96ab7e41b96f8a064

      SHA1

      e1847f8806a025c92f9f1c110293ecc5bda75769

      SHA256

      d61aa1c7203427ca4c7b1889555e92d8290cee8d9a793c84c8bc03f40374bdf4

      SHA512

      0334e30804386fb4f4114d7fd90982ad37520a2bf49c229abdf62793a092dceb7f7b4b2401552f0457ca7f0c9d6671ea798fb75f24999991438d94d675b47145

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

      Filesize

      408B

      MD5

      22285227119546793d7c9360a0bddc8f

      SHA1

      375ca17864242b646df6164a4fb9152a5581fb40

      SHA256

      04dcbadda27313d63a50eb1e83f40b4e2654af5f224ac630a8bc16105ee5491a

      SHA512

      e4353b0a0f703db5c18e2bf1514b769f639ae8a9eb27b8786192e94640bd8c40624878c93019c7b0f88687bad2dfd81477c19d7ab38ec2e18ca1e50158cdbc18

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

      Filesize

      392B

      MD5

      2aaba05665741dd70344295ac811e7ca

      SHA1

      c4cf2147f868ee644e45f4d7ffea3feb68c55f89

      SHA256

      e512a5a6affd2674fb99ef7c77a46872f4ba95ea97f69526bcf433e986f08bdd

      SHA512

      0a7570466f4de35d98c2a7be617db3ed2700ce8b66f129dc0ca1b56b32f0230e21d0ffffea385ba33498552298c6ddce858fae6ef1ebda38429f1d3397253175

    • memory/2052-1132-0x000002093D320000-0x000002093D330000-memory.dmp

      Filesize

      64KB

    • memory/2052-500-0x000002093D4C0000-0x000002093D5C0000-memory.dmp

      Filesize

      1024KB

    • memory/2052-525-0x000002094DB40000-0x000002094DB60000-memory.dmp

      Filesize

      128KB

    • memory/2052-976-0x000002093D4C0000-0x000002093D5C0000-memory.dmp

      Filesize

      1024KB

    • memory/2052-1133-0x000002093D320000-0x000002093D330000-memory.dmp

      Filesize

      64KB

    • memory/2052-1134-0x000002093D320000-0x000002093D330000-memory.dmp

      Filesize

      64KB

    • memory/2052-1135-0x000002093D320000-0x000002093D330000-memory.dmp

      Filesize

      64KB

    • memory/2988-543-0x0000028D32100000-0x0000028D32200000-memory.dmp

      Filesize

      1024KB

    • memory/2988-701-0x0000029545300000-0x0000029545400000-memory.dmp

      Filesize

      1024KB

    • memory/4108-307-0x0000011165C30000-0x0000011165C31000-memory.dmp

      Filesize

      4KB

    • memory/4108-0-0x000001115D820000-0x000001115D830000-memory.dmp

      Filesize

      64KB

    • memory/4108-306-0x0000011165C20000-0x0000011165C21000-memory.dmp

      Filesize

      4KB

    • memory/4108-16-0x000001115D920000-0x000001115D930000-memory.dmp

      Filesize

      64KB

    • memory/4108-35-0x000001115C9F0000-0x000001115C9F2000-memory.dmp

      Filesize

      8KB

    • memory/4128-43-0x0000022AB59C0000-0x0000022AB5AC0000-memory.dmp

      Filesize

      1024KB

    • memory/4660-85-0x0000020DA7CA0000-0x0000020DA7CC0000-memory.dmp

      Filesize

      128KB

    • memory/4660-96-0x0000020DA80D0000-0x0000020DA80D2000-memory.dmp

      Filesize

      8KB

    • memory/4660-70-0x0000020DA78E0000-0x0000020DA78E2000-memory.dmp

      Filesize

      8KB

    • memory/4660-72-0x0000020DA7A00000-0x0000020DA7A02000-memory.dmp

      Filesize

      8KB

    • memory/4660-74-0x0000020DA7AC0000-0x0000020DA7AC2000-memory.dmp

      Filesize

      8KB

    • memory/4660-67-0x0000020D97500000-0x0000020D97600000-memory.dmp

      Filesize

      1024KB

    • memory/4660-100-0x0000020DA8BD0000-0x0000020DA8BD2000-memory.dmp

      Filesize

      8KB

    • memory/4660-98-0x0000020DA84E0000-0x0000020DA84E2000-memory.dmp

      Filesize

      8KB

    • memory/4660-118-0x0000020DA7CE0000-0x0000020DA7D00000-memory.dmp

      Filesize

      128KB