Analysis

  • max time kernel
    20s
  • max time network
    20s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/08/2024, 18:41

General

  • Target

    https://gateway.discord.gg/?v=9&encording=json

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://gateway.discord.gg/?v=9&encording=json"
    1⤵
      PID:3796
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3800
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2432
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4220
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2536
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1352

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFB11E511A17AC0978.TMP

            Filesize

            16KB

            MD5

            68daa14cc51f0fb2a298f2d698a72bf8

            SHA1

            c442bdecd594e974291452883ec85fd660730056

            SHA256

            390b8e73d05a358fd6db48218030541454b29013ebea1c12421d452abc1caa2f

            SHA512

            4e17ececb139eb59b1a90f23d2d2164d66cd2bdd298bba65f5917c6c868106f80ccbfea0ac4ac2099ed5bc869894cda4ec6202e62bb9179c43611302c3cefa2c

          • memory/1352-67-0x00000242235E0000-0x00000242235E2000-memory.dmp

            Filesize

            8KB

          • memory/1352-69-0x0000024223700000-0x0000024223702000-memory.dmp

            Filesize

            8KB

          • memory/1352-84-0x0000024212A00000-0x0000024212B00000-memory.dmp

            Filesize

            1024KB

          • memory/1352-85-0x0000024212A00000-0x0000024212B00000-memory.dmp

            Filesize

            1024KB

          • memory/1352-71-0x0000024223720000-0x0000024223722000-memory.dmp

            Filesize

            8KB

          • memory/1352-64-0x0000024212A00000-0x0000024212B00000-memory.dmp

            Filesize

            1024KB

          • memory/1352-77-0x0000024223780000-0x0000024223782000-memory.dmp

            Filesize

            8KB

          • memory/1352-75-0x0000024223760000-0x0000024223762000-memory.dmp

            Filesize

            8KB

          • memory/1352-73-0x0000024223740000-0x0000024223742000-memory.dmp

            Filesize

            8KB

          • memory/2536-42-0x00000229E9800000-0x00000229E9900000-memory.dmp

            Filesize

            1024KB

          • memory/2536-44-0x00000229E9800000-0x00000229E9900000-memory.dmp

            Filesize

            1024KB

          • memory/2536-43-0x00000229E9800000-0x00000229E9900000-memory.dmp

            Filesize

            1024KB

          • memory/3800-35-0x000001B43D7F0000-0x000001B43D7F2000-memory.dmp

            Filesize

            8KB

          • memory/3800-16-0x000001B43E720000-0x000001B43E730000-memory.dmp

            Filesize

            64KB

          • memory/3800-97-0x000001B442A10000-0x000001B442A12000-memory.dmp

            Filesize

            8KB

          • memory/3800-100-0x000001B4428D0000-0x000001B4428D1000-memory.dmp

            Filesize

            4KB

          • memory/3800-104-0x000001B43D7E0000-0x000001B43D7E1000-memory.dmp

            Filesize

            4KB

          • memory/3800-0-0x000001B43E620000-0x000001B43E630000-memory.dmp

            Filesize

            64KB