Resubmissions

29/06/2024, 21:50

240629-1p9a2azhpn 4

29/06/2024, 21:48

240629-1n4zxszhmj 4

Analysis

  • max time kernel
    33s
  • max time network
    34s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29/06/2024, 21:48

General

  • Target

    1256726492650668213.html

  • Size

    4KB

  • MD5

    5b6a5753805fee9510580a01cf1afd92

  • SHA1

    aa2a26b917cc974775c04a7fbc2770e7d558b748

  • SHA256

    2b370d3766266fb594ae567bc0ff3345eda9bc889c60961fd5946529d514103f

  • SHA512

    123732b2c1d907075064808532f69a6ecf833f882998b4ee6b0e4817fcc4dc2cfe4ae30d4f2b5b69cdbd1eba3c39c44d46a4e83c62c1e7a9466edfff5acad803

  • SSDEEP

    96:yUpHWOfRr8L56e5hNvtdLXe5GaZfIo9vnx/IJ:ycH3Rr8Tlu39Xdnx/0

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "C:\Users\Admin\AppData\Local\Temp\1256726492650668213.html"
    1⤵
      PID:3040
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4908
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3364
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:880
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2244
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3728
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:436
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3868
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
        PID:2928
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        PID:2752

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFA0A420558877C525.TMP

        Filesize

        16KB

        MD5

        43c70041468d40f0650b7a369222935b

        SHA1

        2cb6bf902e92767c6b70c690335836f0300f1020

        SHA256

        957d6ed1aef4235abeda5aa0c8c2e2fca20a36879fb6c49e8b5dec7c26ca8a22

        SHA512

        35a2a26b52c77a85dad02c545b48f9c51655a2a813fa8bd97cf33c9216149219526840f633e2a4329b6d418cf0f20090d68ebc2be40fa47b0b8a559f26c47080

      • memory/2244-43-0x0000020583680000-0x0000020583780000-memory.dmp

        Filesize

        1024KB

      • memory/3728-56-0x0000022272B40000-0x0000022272B42000-memory.dmp

        Filesize

        8KB

      • memory/3728-58-0x0000022272B60000-0x0000022272B62000-memory.dmp

        Filesize

        8KB

      • memory/3728-60-0x0000022272B80000-0x0000022272B82000-memory.dmp

        Filesize

        8KB

      • memory/3868-87-0x000001C406100000-0x000001C406200000-memory.dmp

        Filesize

        1024KB

      • memory/3868-140-0x000001C416D30000-0x000001C416D50000-memory.dmp

        Filesize

        128KB

      • memory/3868-135-0x000001C4168A0000-0x000001C4168C0000-memory.dmp

        Filesize

        128KB

      • memory/4908-35-0x00000267E66E0000-0x00000267E66E2000-memory.dmp

        Filesize

        8KB

      • memory/4908-16-0x00000267E9220000-0x00000267E9230000-memory.dmp

        Filesize

        64KB

      • memory/4908-185-0x00000267E8390000-0x00000267E8392000-memory.dmp

        Filesize

        8KB

      • memory/4908-188-0x00000267E82F0000-0x00000267E82F1000-memory.dmp

        Filesize

        4KB

      • memory/4908-192-0x00000267E63F0000-0x00000267E63F1000-memory.dmp

        Filesize

        4KB

      • memory/4908-1-0x00000267E9130000-0x00000267E9140000-memory.dmp

        Filesize

        64KB