Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-07-2024 06:51

General

  • Target

    https://app.loxo.co/agencies/14959/email_tracking/click?id=177411026&url=https%3A%2F%2Fcalendly.com%2Fallenw777

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://app.loxo.co/agencies/14959/email_tracking/click?id=177411026&url=https%3A%2F%2Fcalendly.com%2Fallenw777"
    1⤵
      PID:4684
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:652
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2760
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3712
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2240
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2348
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3244
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2932
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2456
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:3592

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E49JWOHD\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\PXKUCEFM\booking-885b5744[1].js

      Filesize

      1.7MB

      MD5

      678fa49bf6add9316a9db29c3732f429

      SHA1

      c50d75232721a6e2842d2c0df6ae723c6702a682

      SHA256

      7b5baf087be46bb9e835c27b23dc06a2063e614b5d8159769ef0256e23f977fe

      SHA512

      e11233b5105b509643ba092c15b749c22942e2c8e7481b3dd2e9d7e3cd3c2e696a62c28bdc89d7f700308120cac22dc32a0f4ac1a80cacd02a9eb01053fbf049

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\PXKUCEFM\booking-95bc3fa3[1].css

      Filesize

      457KB

      MD5

      d9323eb4d0bd8a106ae246e5fb62bd35

      SHA1

      55a78f5ad9c8f0cd098f4abafadc473bb945e27a

      SHA256

      c04650d577b7ff2676ca7c58a79dc0fe9a9a280cde385e1f080d7aee0904222c

      SHA512

      b821c896bf0cf9eaea8773990c5c3d4c16bbd644742cb992edc3fa111c30dcad5716a858b9d2e524c076233f6721c8e768bf4494c9e02545efa901835e6b1caf

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\PXKUCEFM\booking-runtime-8514f75a[1].js

      Filesize

      4KB

      MD5

      112e60e7af96c52008abeb4f324b7b6c

      SHA1

      c8293f187ca058b2751d7b0c9e4e55458e6b9833

      SHA256

      0d69289110e4df8edfec72f0e351af73df510f37d8c79b83c0d8a67d11e2655c

      SHA512

      c6a21e8abc3bea2fdf3cbb2d1eb44b0ebf36133c1a8c4c14ab9c4de31c5999084a475264c1242ec530c31b24a4a782011f3771269d61102382c15c2adbb1ada4

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      4KB

      MD5

      1bfe591a4fe3d91b03cdf26eaacd8f89

      SHA1

      719c37c320f518ac168c86723724891950911cea

      SHA256

      9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

      SHA512

      02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\BU4SGAUV\favicon[1].ico

      Filesize

      758B

      MD5

      84cc977d0eb148166481b01d8418e375

      SHA1

      00e2461bcd67d7ba511db230415000aefbd30d2d

      SHA256

      bbf8da37d92138cc08ffeec8e3379c334988d5ae99f4415579999bfbbb57a66c

      SHA512

      f47a507077f9173fb07ec200c2677ba5f783d645be100f12efe71f701a74272a98e853c4fab63740d685853935d545730992d0004c9d2fe8e1965445cab509c3

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\RUKV4CIT\favicon-bfb0492a754bdf44a0a58b969963f44235653cca09a1c0110309c1e03077e368[1].ico

      Filesize

      1KB

      MD5

      cdb7798a9d7236abfd2859a8746609a4

      SHA1

      c8c25b2ab1f0cce135a01172faaa688d129c7e2e

      SHA256

      bfb0492a754bdf44a0a58b969963f44235653cca09a1c0110309c1e03077e368

      SHA512

      19464667b28f16f4eeabe19ae1404683f3794a276b1e8411cefff4700d30d50db116845600d50e5a88e162018c8a81992092b3ecd0a78169992e16f9a02d31ce

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\ZRLD9PS3\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\QD78KLFH\allenw777[1].htm

      Filesize

      3KB

      MD5

      696b5c063baac2c79aec6033d8a868d8

      SHA1

      165e0f1dc1dbd85b19831c349c523f9ebdaf26e3

      SHA256

      52afed7d15fc9de6744de668bce4424adbf73552e9082b668046275669b8dc14

      SHA512

      c12a9fcc7b1b379cf6400b7c5761e691fba58efc2eec96777b6881228a5b19cd8ca5cb81488055ba6b5a41033daf18e0dae8fca5f55c358f6659392eb7aa4490

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

      Filesize

      717B

      MD5

      822467b728b7a66b081c91795373789a

      SHA1

      d8f2f02e1eef62485a9feffd59ce837511749865

      SHA256

      af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

      SHA512

      bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61

      Filesize

      299B

      MD5

      5ae8478af8dd6eec7ad4edf162dd3df1

      SHA1

      55670b9fd39da59a9d7d0bb0aecb52324cbacc5a

      SHA256

      fe42ac92eae3b2850370b73c3691ccf394c23ab6133de39f1697a6ebac4bedca

      SHA512

      a5ed33ecec5eecf5437c14eba7c65c84b6f8b08a42df7f18c8123ee37f6743b0cf8116f4359efa82338b244b28938a6e0c8895fcd7f7563bf5777b7d8ee86296

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

      Filesize

      192B

      MD5

      00cb4c982fb2c555bf31ba5971afedd3

      SHA1

      dd182a7d62064fa724f493e7673198ee4f4719b2

      SHA256

      b6523d5b4c8dcdf03a1ad512512edfbdfac5648fa55fe0a3cf14bbc69228de14

      SHA512

      63e9dd57fe8607c54c67af7274df1cf07d988d312929e2c7dfbb1e0a3ff84c0b1fe5784080b469f23d26eab46d26ff977a3151c3163461ac913f5f607483642b

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61

      Filesize

      192B

      MD5

      484fefc4a46e84b8a0dcc9c3a685f316

      SHA1

      a149767552ba71ca029dcbe1d9604628b8597daa

      SHA256

      182229369ce4c6345f21fbcaa267890520e488d66b5581462fdfe42c89280a34

      SHA512

      0c31479e8cf62437dd99df745a559636b767dacb70afaf627c4f46252ce74ba3fb31f323ec17e09acdce2f47aceaef06bf719593e8c3b424edaca403a4399e09

    • memory/652-97-0x0000025B71C10000-0x0000025B71C11000-memory.dmp

      Filesize

      4KB

    • memory/652-17-0x0000025B6B630000-0x0000025B6B640000-memory.dmp

      Filesize

      64KB

    • memory/652-0-0x0000025B6B520000-0x0000025B6B530000-memory.dmp

      Filesize

      64KB

    • memory/652-98-0x0000025B71C20000-0x0000025B71C21000-memory.dmp

      Filesize

      4KB

    • memory/652-251-0x0000025B74600000-0x0000025B754C2000-memory.dmp

      Filesize

      14.8MB

    • memory/652-35-0x0000025B689D0000-0x0000025B689D2000-memory.dmp

      Filesize

      8KB

    • memory/2348-76-0x000001BA98060000-0x000001BA98062000-memory.dmp

      Filesize

      8KB

    • memory/2348-85-0x000001BA98960000-0x000001BA98980000-memory.dmp

      Filesize

      128KB

    • memory/2348-80-0x000001BA980A0000-0x000001BA980A2000-memory.dmp

      Filesize

      8KB

    • memory/2348-78-0x000001BA98080000-0x000001BA98082000-memory.dmp

      Filesize

      8KB

    • memory/2456-165-0x000002170DF10000-0x000002170E010000-memory.dmp

      Filesize

      1024KB

    • memory/2456-201-0x000002171F080000-0x000002171F0A0000-memory.dmp

      Filesize

      128KB

    • memory/2456-190-0x000002171E800000-0x000002171E900000-memory.dmp

      Filesize

      1024KB

    • memory/2456-181-0x000002171E570000-0x000002171E590000-memory.dmp

      Filesize

      128KB

    • memory/2932-142-0x0000020D38540000-0x0000020D38560000-memory.dmp

      Filesize

      128KB