Analysis

  • max time kernel
    56s
  • max time network
    33s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/07/2024, 06:46

General

  • Target

    http://whatismyipaddress.com

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://whatismyipaddress.com"
    1⤵
      PID:1680
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:208
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:216
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4048
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1676
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2268
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4440
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:3496
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4252

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XCFODRP5\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_857450206B889F4FEA0F888FA03D68DB

      Filesize

      471B

      MD5

      090f56ceff2e17497a8122e8108115f0

      SHA1

      33cff43a61846cf1584aaaca78f151228766f12f

      SHA256

      e8714c50267df7fee7dcbe8c923aa1e2acbfdfec48dfd93ff048f9394a58fc71

      SHA512

      3346a12bf270f4506623e6f72e03ac615e5a0380b7fe493ce11634d41eed6dd4197cd574c0adbe190c1961204d01498aea29f8c2e95af9f8a22be67a8ebbce46

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_857450206B889F4FEA0F888FA03D68DB

      Filesize

      402B

      MD5

      dd706a3ff7bcbf5d3516b52d2cae12f9

      SHA1

      3be4ba1af9922325ef98b0b5a876e964e27e0f90

      SHA256

      e1e84e8a581f7c030ffaa7d7d63bcdbf581e3cd96feaeb056c67bfd272369a82

      SHA512

      52cba2f5dfa3cabff39bdbc75297f510b8ab850e8af684835227bff1536543ccc7cf39d2773fdc58f009dbeea8d1f54a85f2f02891478b4cf8b7cc46fbdbf8b0

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\Y3KUJMYI\favicon[1].ico

      Filesize

      15KB

      MD5

      ed1ad39a6ecc261f6abfa2327bab5756

      SHA1

      2a578fa8da6830dd2787ae8cb12e66ff5b040f44

      SHA256

      84886342ecdc4b1b095067268cdc5e94241959a551e0fdaa5f2998467f870aa2

      SHA512

      70b57ffaa1536a9461d16140fb2d1e332e32598ec08edc172250142ff3c5e7dcafdf7b38b7b639094337e9abeabeb99244ad84c291b3eeb9965cd9603b509e60

    • memory/208-16-0x000002597FE20000-0x000002597FE30000-memory.dmp

      Filesize

      64KB

    • memory/208-0-0x000002597FD20000-0x000002597FD30000-memory.dmp

      Filesize

      64KB

    • memory/208-35-0x0000025904BA0000-0x0000025904BA2000-memory.dmp

      Filesize

      8KB

    • memory/208-343-0x0000025906E00000-0x0000025906E01000-memory.dmp

      Filesize

      4KB

    • memory/208-344-0x0000025906E10000-0x0000025906E11000-memory.dmp

      Filesize

      4KB

    • memory/2268-220-0x000001782CA20000-0x000001782CA22000-memory.dmp

      Filesize

      8KB

    • memory/2268-429-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-222-0x000001782CAE0000-0x000001782CAE2000-memory.dmp

      Filesize

      8KB

    • memory/2268-214-0x00000178282D0000-0x00000178282D2000-memory.dmp

      Filesize

      8KB

    • memory/2268-218-0x00000178287F0000-0x00000178287F2000-memory.dmp

      Filesize

      8KB

    • memory/2268-211-0x0000017828270000-0x0000017828272000-memory.dmp

      Filesize

      8KB

    • memory/2268-216-0x00000178282E0000-0x00000178282E2000-memory.dmp

      Filesize

      8KB

    • memory/2268-291-0x000001782D980000-0x000001782D9A0000-memory.dmp

      Filesize

      128KB

    • memory/2268-178-0x0000017828230000-0x0000017828250000-memory.dmp

      Filesize

      128KB

    • memory/2268-177-0x00000178281B0000-0x00000178281D0000-memory.dmp

      Filesize

      128KB

    • memory/2268-164-0x00000178286B0000-0x00000178287B0000-memory.dmp

      Filesize

      1024KB

    • memory/2268-427-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-430-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-224-0x000001782CB00000-0x000001782CB02000-memory.dmp

      Filesize

      8KB

    • memory/2268-431-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-428-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-434-0x00000178279A0000-0x00000178279C0000-memory.dmp

      Filesize

      128KB

    • memory/2268-436-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-438-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-439-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-440-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-442-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-441-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-445-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-444-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-443-0x0000017826FE0000-0x0000017826FF0000-memory.dmp

      Filesize

      64KB

    • memory/2268-59-0x0000017816300000-0x0000017816400000-memory.dmp

      Filesize

      1024KB