Analysis

  • max time kernel
    12s
  • max time network
    7s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-06-2024 09:50

General

  • Target

    http://gigabite.com

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://gigabite.com"
    1⤵
      PID:2584
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4316
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3640
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4840
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5052
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4972
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2240

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\NRO4RTBR\www.afternic[1].xml

      Filesize

      13B

      MD5

      c1ddea3ef6bbef3e7060a1a9ad89e4c5

      SHA1

      35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

      SHA256

      b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

      SHA512

      6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\YUVAOZR6\android-chrome-192x192[1].png

      Filesize

      10KB

      MD5

      bf2f8717ce9660bca1ee028b1ed83809

      SHA1

      d05ae8cca85f063b609569ccf37ecf52fd9faf3e

      SHA256

      152b16fb5c002113f5559b46dcc2798f4fe3d0af6729c06c3fd18e4976731e57

      SHA512

      d9a152ebc6df435d7cc72b6851f18ae88b54bb0c5aa3ee786de512735925711d646e76b7ae80ece75e1d74d3cadab2e4cd7c146373219378653d0098bf8a74b2

    • memory/4316-0-0x0000017D5EB20000-0x0000017D5EB30000-memory.dmp

      Filesize

      64KB

    • memory/4316-16-0x0000017D5EC20000-0x0000017D5EC30000-memory.dmp

      Filesize

      64KB

    • memory/4316-35-0x0000017D5BF30000-0x0000017D5BF32000-memory.dmp

      Filesize

      8KB

    • memory/4316-283-0x0000017D65160000-0x0000017D65161000-memory.dmp

      Filesize

      4KB

    • memory/4316-284-0x0000017D65170000-0x0000017D65171000-memory.dmp

      Filesize

      4KB

    • memory/4972-156-0x0000027BA15F0000-0x0000027BA15F2000-memory.dmp

      Filesize

      8KB

    • memory/4972-76-0x0000027B906A0000-0x0000027B906A2000-memory.dmp

      Filesize

      8KB

    • memory/4972-167-0x0000027BA3270000-0x0000027BA3272000-memory.dmp

      Filesize

      8KB

    • memory/4972-164-0x0000027BA2FF0000-0x0000027BA2FF2000-memory.dmp

      Filesize

      8KB

    • memory/4972-162-0x0000027BA2FD0000-0x0000027BA2FD2000-memory.dmp

      Filesize

      8KB

    • memory/4972-160-0x0000027BA2F50000-0x0000027BA2F52000-memory.dmp

      Filesize

      8KB

    • memory/4972-158-0x0000027BA1AF0000-0x0000027BA1AF2000-memory.dmp

      Filesize

      8KB

    • memory/4972-219-0x0000027BA4200000-0x0000027BA4300000-memory.dmp

      Filesize

      1024KB

    • memory/4972-78-0x0000027B906C0000-0x0000027B906C2000-memory.dmp

      Filesize

      8KB

    • memory/4972-80-0x0000027B906E0000-0x0000027B906E2000-memory.dmp

      Filesize

      8KB

    • memory/4972-69-0x0000027B90A00000-0x0000027B90B00000-memory.dmp

      Filesize

      1024KB

    • memory/5052-45-0x0000014ABEB00000-0x0000014ABEC00000-memory.dmp

      Filesize

      1024KB