Resubmissions

08-07-2024 01:51

240708-b9373sygqe 8

08-07-2024 01:49

240708-b85draygmb 4

Analysis

  • max time kernel
    40s
  • max time network
    38s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-07-2024 01:49

General

  • Target

    https://cdn.discordapp.com/attachments/775444866104688713/1259687610188824576/VBCABLE_A_Driver_Pack43.zip?ex=668c9702&is=668b4582&hm=5df42709d7011e8d2e0b09f0d95ddba259bde2904ca9ca426dd989df8ebac757&

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://cdn.discordapp.com/attachments/775444866104688713/1259687610188824576/VBCABLE_A_Driver_Pack43.zip?ex=668c9702&is=668b4582&hm=5df42709d7011e8d2e0b09f0d95ddba259bde2904ca9ca426dd989df8ebac757&"
    1⤵
      PID:4056
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2568
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4800
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2552
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2292
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3584
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3112
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5112
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:68

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VSH5XF98\edgecompatviewlist[1].xml

        Filesize

        74KB

        MD5

        d4fc49dc14f63895d997fa4940f24378

        SHA1

        3efb1437a7c5e46034147cbbc8db017c69d02c31

        SHA256

        853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

        SHA512

        cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

        Filesize

        4KB

        MD5

        1bfe591a4fe3d91b03cdf26eaacd8f89

        SHA1

        719c37c320f518ac168c86723724891950911cea

        SHA256

        9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

        SHA512

        02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\XBLEDSOP\favicon[1].ico

        Filesize

        758B

        MD5

        84cc977d0eb148166481b01d8418e375

        SHA1

        00e2461bcd67d7ba511db230415000aefbd30d2d

        SHA256

        bbf8da37d92138cc08ffeec8e3379c334988d5ae99f4415579999bfbbb57a66c

        SHA512

        f47a507077f9173fb07ec200c2677ba5f783d645be100f12efe71f701a74272a98e853c4fab63740d685853935d545730992d0004c9d2fe8e1965445cab509c3

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\NQR0ZD29\VBCABLE_A_Driver_Pack43[1].zip

        Filesize

        1.0MB

        MD5

        7266cec4ed6b388180ad96f906cbf186

        SHA1

        989fbcf08593602a22d85063f53ca8811693d055

        SHA256

        cc22e1ba821563a34ce1b7035ff136be694beeb9aaec8934e6fd1b0e86cf05aa

        SHA512

        851a164defeb66ed10a6e2fae87aa3065082058fe23cb8007fdbab2a1db5c4c1f138f0defe1541c57fc9eab6e050536bfc162f1708f15975675e42d6b44dffd9

      • memory/2292-44-0x0000021443C00000-0x0000021443D00000-memory.dmp

        Filesize

        1024KB

      • memory/2292-43-0x0000021443C00000-0x0000021443D00000-memory.dmp

        Filesize

        1024KB

      • memory/2292-45-0x0000021443C00000-0x0000021443D00000-memory.dmp

        Filesize

        1024KB

      • memory/2568-170-0x0000022AC56D0000-0x0000022AC56D1000-memory.dmp

        Filesize

        4KB

      • memory/2568-0-0x0000022ABE820000-0x0000022ABE830000-memory.dmp

        Filesize

        64KB

      • memory/2568-35-0x0000022ABBDE0000-0x0000022ABBDE2000-memory.dmp

        Filesize

        8KB

      • memory/2568-17-0x0000022ABE930000-0x0000022ABE940000-memory.dmp

        Filesize

        64KB

      • memory/2568-169-0x0000022AC56C0000-0x0000022AC56C1000-memory.dmp

        Filesize

        4KB

      • memory/3112-71-0x00000200FA840000-0x00000200FA940000-memory.dmp

        Filesize

        1024KB

      • memory/3584-55-0x000001A500CA0000-0x000001A500DA0000-memory.dmp

        Filesize

        1024KB

      • memory/3584-63-0x000001A510E90000-0x000001A510E92000-memory.dmp

        Filesize

        8KB

      • memory/3584-61-0x000001A510E70000-0x000001A510E72000-memory.dmp

        Filesize

        8KB

      • memory/3584-58-0x000001A510E40000-0x000001A510E42000-memory.dmp

        Filesize

        8KB

      • memory/5112-86-0x000001FE89000000-0x000001FE89100000-memory.dmp

        Filesize

        1024KB

      • memory/5112-124-0x000001FE9A9D0000-0x000001FE9A9F0000-memory.dmp

        Filesize

        128KB

      • memory/5112-123-0x000001FE9ACD0000-0x000001FE9ADD0000-memory.dmp

        Filesize

        1024KB

      • memory/5112-146-0x000001FEAB680000-0x000001FEAB780000-memory.dmp

        Filesize

        1024KB

      • memory/5112-121-0x000001FE9A690000-0x000001FE9A790000-memory.dmp

        Filesize

        1024KB

      • memory/5112-119-0x000001FE9A690000-0x000001FE9A790000-memory.dmp

        Filesize

        1024KB

      • memory/5112-114-0x000001FE99E00000-0x000001FE99F00000-memory.dmp

        Filesize

        1024KB

      • memory/5112-107-0x000001FE99830000-0x000001FE99850000-memory.dmp

        Filesize

        128KB