Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/07/2024, 11:43

General

  • Target

    http://youtube.com

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://youtube.com"
    1⤵
      PID:3972
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4852
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4124
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:700
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4908
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:368
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4360
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3092

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\L5P12AEX\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\2UC5QLYQ\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\01Y5O1AP\rs=AGKMywGjeqMolSPDqJJ3gUpvzyXNCmtAUQ[1].css

      Filesize

      2.8MB

      MD5

      812bdf39b0c0bfe61bf24d5005c57556

      SHA1

      f13c66800e817fcb253d717c73a7d08ac5315cd2

      SHA256

      6c3b3ddf3720aee5092474a32b6c544869a857c22fb37b45ab011f995c8acb3f

      SHA512

      61dd58d5f8e317908687d68f3e2c12b2beb3aa10387a7f1a59bf16d582262e19bac3eaa66db21e6a14a39ac552c174a8d0376ab588af603efb86fa69f06e1a9d

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\01Y5O1AP\scheduler[1].js

      Filesize

      9KB

      MD5

      d253fb13ad8f6827d24cf504b725eafa

      SHA1

      81ee8c43d98fbced10e03ae0023fc12c25e982d9

      SHA256

      9510a0e5e9fc3d18f09b21b22515d4a13494293f1a9f9f3caea141e2083b8c9f

      SHA512

      2ea9a0b6b0e6505415e41efb7e124b59a61623466f4b810661f01af9f9ddc196c6c09ed6f8c592a320be134f0d92c2e733fa4594b200d867c5a8d63374ed56c3

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\01Y5O1AP\www-main-desktop-home-page-skeleton[1].css

      Filesize

      4KB

      MD5

      9deae13c40798dfca19bd14ed7039d60

      SHA1

      4ba302a1435b094031e4f2e1bce1b6198f0cf825

      SHA256

      cdac5527dc3c1a9f38c6b00086b2a10b9e7eaa1e062314e548c1fa602d17bbbd

      SHA512

      95b093d926535fa9454e3776a3e219b61502ce67aa2e659175ae879133dd35a6efa1bfdbe5b6d3e3dd8ba1f0663892b44fd6f21be17fefa9725a234dff3c5d0c

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\01Y5O1AP\www-onepick[1].css

      Filesize

      739B

      MD5

      9ace9ca4e10a48822a48955cbd3f94d0

      SHA1

      1f0efa2ee544e5b7a98de5201fb8254b6f3eb613

      SHA256

      f8fdbb9c5cdceb1363bb04c5e89b3288ea30d79ef1a332e7a06c7195dd2e0ec4

      SHA512

      25354aeecb224fd6d863c0253cd7ad382dce7067f4147790ee0ce343f8c3e0efb84e54dd174116e7ad52d4a7e05735039fa1085b739abbe80f9e318e432eed73

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\07PLOET7\web-animations-next-lite.min[1].js

      Filesize

      49KB

      MD5

      9e1f5b2285bce3a471297b1505058b57

      SHA1

      c0cbe8b0a96f32c25adbae33932188d495a4135c

      SHA256

      708021b0a03278843afdf5190777b25bead3458548e7c221ac1ff6f6e6e17bad

      SHA512

      a10b9f0fa257580a1e44b5f756f99a149193d6b71f98590eba7bff2a6a3853c32a0d8d44a8967154eefab884d7964d148d38991393cc4785249f38253242099b

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\07PLOET7\webcomponents-ce-sd[1].js

      Filesize

      95KB

      MD5

      2b26e985df91c84424c744d8557bba69

      SHA1

      901e4665ee79cd7420139e39fcee2db0eea683ee

      SHA256

      4011a87b53c8fedc7e54076929d677a2d8f8cd76ab20ce4eb2e027778083cfcd

      SHA512

      c9a27e9970123f2ae0d692834b6f1117f2f20d5835a1670a3bace470123471cd7754425976abccce4abac7612659bf31f755e3e8ad9ff807d0d3e74db4154a78

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\4RT184TV\intersection-observer.min[1].js

      Filesize

      5KB

      MD5

      e02d881229f4e5bcee641ed3a2f5b980

      SHA1

      29093656180004764fc2283a6565178eb91b5ef3

      SHA256

      8037c1f1e0e4d3d7955f591a14a4b4d090141f1d210ef8b793ce5b345f08f7f5

      SHA512

      f4e8e21b91ee33879a2295215cba91e12851891165fe3f9f98913022280ef8192fd3f5def06aa8ac1fbe6d43d09034b0bb8e29e8703366a012e1fde6ff2828db

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\4RT184TV\www-tampering[1].js

      Filesize

      10KB

      MD5

      4a717b1104b7c162e2d019aef5ad0fa5

      SHA1

      6fb2f0dce050c58030e372e57e0d120052eb2eb9

      SHA256

      a10a23562c32f59d941ecb07ac7d3714fc64313591ddfd83807c4463c6391fca

      SHA512

      3ff892b33c9d02116cceb689ebae18d143692559de03a1231a68da0c736b46c5f782f207d5c434eb15b29f6790167991a789fbf8368abe5f996758df58d03e3a

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\DFR9EX0R\css2[1].css

      Filesize

      2KB

      MD5

      5912f3bba71c222672dfa244a60acef0

      SHA1

      317a49729bb8654c3986e6b32278258a1d692d81

      SHA256

      48708ab3b01bc53a736f7f85e0badd9174872faa981e78b32c16c4efcaa59d99

      SHA512

      770f13af0d6ebe7ff9d925efccd05b0b2e5afd5fbe19770562d88936d541a298a49aea028f5122a255fb5026b4a5f37c0cf52831212ecaaf378a5769ff0379f7

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\DFR9EX0R\www-i18n-constants[1].js

      Filesize

      5KB

      MD5

      877a2b1590385d79323ef992abe9e961

      SHA1

      f2f65882785537d6f3eeba7f02ea233f9e55672f

      SHA256

      ff474db3ea4409f034cbae6ae738bc80fb18734ccd38f87fcde90d02e11cfac3

      SHA512

      c7b9bda266c59a19476d7eaa3f6bc10d8d916345ff4195ee5932f5d5d884a487407552a29d576a9dd53dfd2588069c7376f660800f5ab7f8e1bea78cdd146e14

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

      Filesize

      854B

      MD5

      8d1040b12a663ca4ec7277cfc1ce44f0

      SHA1

      b27fd6bbde79ebdaee158211a71493e21838756b

      SHA256

      3086094d4198a5bbd12938b0d2d5f696c4dfc77e1eae820added346a59aa8727

      SHA512

      610c72970856ef7a316152253f7025ac11635078f1aea7b84641715813792374d2447b1002f1967d62b24073ee291b3e4f3da777b71216a30488a5d7b6103ac1

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      cd82fc2ad6505bfce4cb3773079e02de

      SHA1

      cec031927b1e4fa22d1d268d36ed147aa14bb579

      SHA256

      7a15227dc18bdde7b1ba1ccb42e1cdc3ef5fe2ce866eb2ccf64972fdb6775c48

      SHA512

      de88f2ce7874e3dd259981a3f9d62deb67f8ffab69d4fe8b32067a6aab87428d63554a037aff0b2fe853b4661a8b2cb3aed28e2e56d196b60989a194da710384

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_AF3BDC9312865949D5159FC0DE013AA0

      Filesize

      472B

      MD5

      c7a5da6784520fea394de61f20c6e943

      SHA1

      65edb45b4d736ea39e671aaf3b9db5166346eb51

      SHA256

      f172f0708df38b4515ebca5c0a170b4f938bcc7c6e6361c35fb5b38b092a21bd

      SHA512

      ad3d3ff3b4dfc25a27ab3787b24b8f21304ba3959d23e1963a413a6e26c7c46af805a59938f7844229f97760a0be5d5976711e0a5a8e291848480774f5672603

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_A3D4688236962EEA03574DE4F61B95D9

      Filesize

      472B

      MD5

      251f5c0de7e0799d9ef6f6c87fc475a6

      SHA1

      947ddfec640c042b61269b0ddf7600ea7eaac420

      SHA256

      0f3c9442a89fbd488847ccbec5fd7f86472e7f2e45b2665f2bf3c1c7edd3456f

      SHA512

      0fd84ecb92618c8f31bf2437f3198b2c763d1cb0f49c5eddc25284a80b93b5e1953aa811e058a4be5c948be7c268044b4fa9dc25efc9ac98a7228b08124ef3a8

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

      Filesize

      170B

      MD5

      c4cd2823e2412e6eefdb9af7f4163789

      SHA1

      3b39501a9e8f4953aa8d5da27b2dc83314537840

      SHA256

      9426851132b2504fcd538ee97f7f502e9a8e0ce61c124990a54efc881b04f4b3

      SHA512

      307707f82091e097da16dfba86ac2aba91bab00e613fdfc01a911c7d8fe7b1d14dd884323fb4166ae6c90012099cc158bd7aedebde24f58e637f90e184189a22

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      80d06f4394ba8317dd4f5228cac9bac7

      SHA1

      2290ec8937ed01008f29415d19ac166e6a0aa525

      SHA256

      8ca71aee84f6d0a82e2a97606b189a977b2d4cea6bff2e41cd149c2ab7a29dc9

      SHA512

      7dac7f40561d79ad5a9a4ec1fc0e8dec988589446476a35ae7c8336beb2dc718e4f8bfc6ae289b58d017d848040cd240abbb8bf5006489680339b1790f6f1f05

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_AF3BDC9312865949D5159FC0DE013AA0

      Filesize

      398B

      MD5

      ad61579d1334bb9f098cf37cfaf140af

      SHA1

      980d528d00a05b015e04e97906c888fa8c867cb6

      SHA256

      b1a99b71a787c82df98fa60b6e791678864c8a27d6a861a6fde144280d9f1988

      SHA512

      bbb67e29aa82ea4d9c131c2c9ff34c6a4897bae45efc1960a19458f4747fccc7be64bfa954d1df594f190eaaa59b3d008396da526d359e768e85e6cf1e48b6ea

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_A3D4688236962EEA03574DE4F61B95D9

      Filesize

      402B

      MD5

      6be634eb0c9474498ebbb960f1d3c89d

      SHA1

      a930e894a426d56fac17084a12c08ce08692146c

      SHA256

      f399402205458c9a9e626f74a2fc12fda4f4d3ae96226d726a0a860930651734

      SHA512

      cbb3645131f50cb674395b1097f5d122e8c728f7f9319f0731695899cfbef6cdde8e6ceac4c88d7baf31b8cb0db7abd94bf68e43b82126bc56723f4d100dadd5

    • memory/368-92-0x000001A043820000-0x000001A043840000-memory.dmp

      Filesize

      128KB

    • memory/368-66-0x000001A042BF0000-0x000001A042BF2000-memory.dmp

      Filesize

      8KB

    • memory/368-68-0x000001A042F10000-0x000001A042F12000-memory.dmp

      Filesize

      8KB

    • memory/368-64-0x000001A042BD0000-0x000001A042BD2000-memory.dmp

      Filesize

      8KB

    • memory/3092-180-0x00000223D84E0000-0x00000223D84E2000-memory.dmp

      Filesize

      8KB

    • memory/3092-169-0x00000223C7CC0000-0x00000223C7DC0000-memory.dmp

      Filesize

      1024KB

    • memory/3092-182-0x00000223D8500000-0x00000223D8502000-memory.dmp

      Filesize

      8KB

    • memory/3092-178-0x00000223D84C0000-0x00000223D84C2000-memory.dmp

      Filesize

      8KB

    • memory/3092-167-0x00000223C7CC0000-0x00000223C7DC0000-memory.dmp

      Filesize

      1024KB

    • memory/4360-160-0x0000020911AC0000-0x0000020911AE0000-memory.dmp

      Filesize

      128KB

    • memory/4852-1-0x000001477B130000-0x000001477B140000-memory.dmp

      Filesize

      64KB

    • memory/4852-35-0x0000014700090000-0x0000014700092000-memory.dmp

      Filesize

      8KB

    • memory/4852-199-0x0000014701B80000-0x0000014701B81000-memory.dmp

      Filesize

      4KB

    • memory/4852-198-0x0000014701B70000-0x0000014701B71000-memory.dmp

      Filesize

      4KB

    • memory/4852-16-0x000001477B220000-0x000001477B230000-memory.dmp

      Filesize

      64KB

    • memory/4908-44-0x00000268AC800000-0x00000268AC900000-memory.dmp

      Filesize

      1024KB