Analysis

  • max time kernel
    12s
  • max time network
    23s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-08-2024 03:05

General

  • Target

    https://drive.google.com/file/d/18XwJQv5Mn2DzDnXzMrfDnY90bwZMyFfC/view

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://drive.google.com/file/d/18XwJQv5Mn2DzDnXzMrfDnY90bwZMyFfC/view"
    1⤵
      PID:3944
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3208
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3740
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      PID:4948
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3836
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3636
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
        PID:2296

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3208-16-0x000001F3D4920000-0x000001F3D4930000-memory.dmp

        Filesize

        64KB

      • memory/3208-0-0x000001F3D4820000-0x000001F3D4830000-memory.dmp

        Filesize

        64KB

      • memory/3208-35-0x000001F3D1DC0000-0x000001F3D1DC2000-memory.dmp

        Filesize

        8KB

      • memory/3636-83-0x000001ECBBA00000-0x000001ECBBA20000-memory.dmp

        Filesize

        128KB

      • memory/3636-89-0x000001ECBD7A0000-0x000001ECBD7A2000-memory.dmp

        Filesize

        8KB

      • memory/3636-87-0x000001ECBD780000-0x000001ECBD782000-memory.dmp

        Filesize

        8KB

      • memory/3636-85-0x000001ECBD760000-0x000001ECBD762000-memory.dmp

        Filesize

        8KB

      • memory/3636-109-0x000001ECC7220000-0x000001ECC7240000-memory.dmp

        Filesize

        128KB

      • memory/3636-141-0x000001ECBE650000-0x000001ECBE750000-memory.dmp

        Filesize

        1024KB

      • memory/3636-145-0x000001ECBE650000-0x000001ECBE750000-memory.dmp

        Filesize

        1024KB

      • memory/3836-45-0x000001F444680000-0x000001F444780000-memory.dmp

        Filesize

        1024KB