Analysis

  • max time kernel
    1800s
  • max time network
    1794s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/07/2024, 02:54

General

  • Target

    http://crypto-drop-btc24.42web.io/

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://crypto-drop-btc24.42web.io/"
    1⤵
      PID:1268
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3540
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2132
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:412
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2352
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2336
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:1268

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\L5P12AEX\edgecompatviewlist[1].xml

            Filesize

            74KB

            MD5

            d4fc49dc14f63895d997fa4940f24378

            SHA1

            3efb1437a7c5e46034147cbbc8db017c69d02c31

            SHA256

            853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

            SHA512

            cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\FHIDWF3L\00Th[1].js

            Filesize

            127KB

            MD5

            65a83dc2570c3e36071ebdf70c5509b0

            SHA1

            caad685f5a8c2200876c9b6979f345f1248555b2

            SHA256

            b7b0744be6b06cb3b1c69793000d019e927b8b31aceede65fcfbad67ae4143e5

            SHA512

            cec208752d396c8bf3c81875d1cbfbe78729f765009390046902963a5ac1b6f1d8fe6fb52322f8dcd7cf9e9c068c44a910edb1167d007563331065eb6db30919

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\J8XJT518\iframe_api[1].js

            Filesize

            993B

            MD5

            a92aee893737d16e7937172532b0356f

            SHA1

            e2c7ccd9bbe33ab70a0b41e76eea50e07561cc0d

            SHA256

            ce1e7e97cbb93e6c88c2da5d1edc233fee0307b2c3e0a8f90b9016189f26ea5a

            SHA512

            d1858ed220194181a30fd66de3eac12f59bf104f496b3f6e877d79455e661e93c4eeeae236d4570916ffc465d4aef1ac31e7f1435cfb9d6143dc00bc37b0c751

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\MC9QM1Z1\crn.js[3].mem

            Filesize

            9KB

            MD5

            e3cc47c5f18f0c231791735d8bc14a83

            SHA1

            ccbf8ba68d9661d227eaa2630e97974f40dc5415

            SHA256

            40ce13efa92705c0fa65216db3011ac32837d240b9580403219b5e5e75c5b271

            SHA512

            2488911096aa55c05efe73f0915d70f215cdc94167a2a18413ebc9a29cf63b3735589deacbe9f6be8205651dd4e924087acfc9a9fb8eee8ae4c39e6043496054

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\92C82YJZ\crypto-drop-btc24.42web[1].xml

            Filesize

            171B

            MD5

            154e3121ce8c97e29a7ed066c82129e4

            SHA1

            693a436e5a236354912d2750bd8fb7de48bf636d

            SHA256

            a4302f10ccadd7cb52071cf601660fa7d367e187f4dbbfb3aa68c346a24e07a3

            SHA512

            2c65d86ce988020407686fbdf9921e05a31d9880ab0c7c69d1c109f775e83459b32857bc7f10250e96cbd6e81d3072ed6136e1678a9eb217b2b5e0a183298068

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\T3P8JOYR\www.youtube[1].xml

            Filesize

            13B

            MD5

            c1ddea3ef6bbef3e7060a1a9ad89e4c5

            SHA1

            35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

            SHA256

            b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

            SHA512

            6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\T3P8JOYR\www.youtube[1].xml

            Filesize

            228B

            MD5

            4574c4c40b880960423abe92cf8ce8dd

            SHA1

            937dd3f75e81b5f5967f884f30eba617668f7ce1

            SHA256

            7652b6d92d4ac589d46f8a228fd5c3fef3974c74bd7e7034995b174542f1cae3

            SHA512

            4e3bf71a5fada7db8422d10c6871c672b0caec972a2bbb486e8b85f907cfaf1bb05f2ea413dee9598f500b9077415cf4582a959b5b3144b241b8600d398214ec

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\3W2JL0CD\suggestions[1].en-US

            Filesize

            17KB

            MD5

            5a34cb996293fde2cb7a4ac89587393a

            SHA1

            3c96c993500690d1a77873cd62bc639b3a10653f

            SHA256

            c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

            SHA512

            e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\LC69F9A7\w-logo-blue-white-bg[1].png

            Filesize

            4KB

            MD5

            000bf649cc8f6bf27cfb04d1bcdcd3c7

            SHA1

            d73d2f6d74ec6cdcbae07955592962e77d8ae814

            SHA256

            6bdb369337ac2496761c6f063bffea0aa6a91d4662279c399071a468251f51f0

            SHA512

            73d2ea5ffc572c1ae73f37f8f0ff25e945afee8e077b6ee42ce969e575cdc2d8444f90848ea1cb4d1c9ee4bd725aee2b4576afc25f17d7295a90e1cbfe6edfd5

          • memory/2336-206-0x0000025B82BC0000-0x0000025B82BE0000-memory.dmp

            Filesize

            128KB

          • memory/2336-194-0x000002597F8F0000-0x000002597F9F0000-memory.dmp

            Filesize

            1024KB

          • memory/2336-191-0x000002597E700000-0x000002597E800000-memory.dmp

            Filesize

            1024KB

          • memory/2336-200-0x00000259806F0000-0x0000025980710000-memory.dmp

            Filesize

            128KB

          • memory/2336-212-0x0000025151470000-0x0000025151490000-memory.dmp

            Filesize

            128KB

          • memory/2336-209-0x0000025D83100000-0x0000025D83200000-memory.dmp

            Filesize

            1024KB

          • memory/2336-483-0x0000025957990000-0x00000259579A0000-memory.dmp

            Filesize

            64KB

          • memory/2336-131-0x0000025968710000-0x0000025968712000-memory.dmp

            Filesize

            8KB

          • memory/2336-478-0x0000025132660000-0x0000025132680000-memory.dmp

            Filesize

            128KB

          • memory/2336-115-0x00000259680A0000-0x00000259681A0000-memory.dmp

            Filesize

            1024KB

          • memory/2336-207-0x0000025D83360000-0x0000025D83380000-memory.dmp

            Filesize

            128KB

          • memory/2336-428-0x0000025130B90000-0x0000025130B92000-memory.dmp

            Filesize

            8KB

          • memory/2336-205-0x0000025980B00000-0x0000025980C00000-memory.dmp

            Filesize

            1024KB

          • memory/2336-203-0x0000025980B00000-0x0000025980C00000-memory.dmp

            Filesize

            1024KB

          • memory/2336-201-0x0000025980830000-0x0000025980850000-memory.dmp

            Filesize

            128KB

          • memory/2336-199-0x0000025980870000-0x0000025980890000-memory.dmp

            Filesize

            128KB

          • memory/2336-211-0x0000025D83100000-0x0000025D83200000-memory.dmp

            Filesize

            1024KB

          • memory/2336-193-0x000002597E700000-0x000002597E800000-memory.dmp

            Filesize

            1024KB

          • memory/2336-192-0x000002597F8F0000-0x000002597F9F0000-memory.dmp

            Filesize

            1024KB

          • memory/2336-184-0x000002597EF90000-0x000002597F090000-memory.dmp

            Filesize

            1024KB

          • memory/2336-183-0x000002597EF90000-0x000002597F090000-memory.dmp

            Filesize

            1024KB

          • memory/2336-182-0x000002597E900000-0x000002597EA00000-memory.dmp

            Filesize

            1024KB

          • memory/2336-181-0x000002597E900000-0x000002597EA00000-memory.dmp

            Filesize

            1024KB

          • memory/2336-57-0x00000259579D0000-0x00000259579D2000-memory.dmp

            Filesize

            8KB

          • memory/2336-305-0x0000025969300000-0x0000025969400000-memory.dmp

            Filesize

            1024KB

          • memory/2336-339-0x0000025133380000-0x00000251333A0000-memory.dmp

            Filesize

            128KB

          • memory/2336-55-0x00000259579B0000-0x00000259579B2000-memory.dmp

            Filesize

            8KB

          • memory/2336-52-0x0000025957980000-0x0000025957982000-memory.dmp

            Filesize

            8KB

          • memory/2352-44-0x000001C459500000-0x000001C459600000-memory.dmp

            Filesize

            1024KB

          • memory/3540-0-0x00000222E7A20000-0x00000222E7A30000-memory.dmp

            Filesize

            64KB

          • memory/3540-237-0x00000222EE1F0000-0x00000222EE1F1000-memory.dmp

            Filesize

            4KB

          • memory/3540-238-0x00000222EE6B0000-0x00000222EE6B1000-memory.dmp

            Filesize

            4KB

          • memory/3540-35-0x00000222E6BA0000-0x00000222E6BA2000-memory.dmp

            Filesize

            8KB

          • memory/3540-16-0x00000222E7B20000-0x00000222E7B30000-memory.dmp

            Filesize

            64KB