Resubmissions

07/08/2024, 02:07

240807-ckec4axhnp 1

07/08/2024, 02:04

240807-chntra1fqd 4

07/08/2024, 02:01

240807-cfxzmsxgln 4

07/08/2024, 02:00

240807-ce9xta1fke 4

07/08/2024, 01:57

240807-cc95ss1emg 3

Analysis

  • max time kernel
    134s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/08/2024, 02:01

General

  • Target

    https://cdn.discordapp.com/attachments/1270510446109261876/1270544279130869770/KIRAS_BOMB.zip?ex=66b41611&is=66b2c491&hm=d2be13894818b51a7e1d79d15b2986eea1c36ed32863f840ae7f996338f32312&

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://cdn.discordapp.com/attachments/1270510446109261876/1270544279130869770/KIRAS_BOMB.zip?ex=66b41611&is=66b2c491&hm=d2be13894818b51a7e1d79d15b2986eea1c36ed32863f840ae7f996338f32312&"
    1⤵
      PID:2084
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5112
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • NTFS ADS
      PID:3124
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:656
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1328
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3500
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1640
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3808
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3316

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\0HLEFOQ9\KIRA'S%20BOMB[1].zip

        Filesize

        1.7MB

        MD5

        979597208a38213bf7112ae9ca45dfba

        SHA1

        63b104406bc10c81709d449e923f25a7d5b94b29

        SHA256

        f88c973c4051f35c62a75d732eafd0e5dbd653a3943c502134c492dd7f67cab4

        SHA512

        1c71c7a378d79afeba15706c1d25ab8a2c82a86e4a438bcced0983ae618b7fc7cb081e7166e33f6ef4c4c94dec8349fdd467b5763bb0955213c8fe02ffffbdf1

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF0C8FAC9373163CD3.TMP

        Filesize

        24KB

        MD5

        a3a531afb7e988bc1a2cf4217e603fc0

        SHA1

        2a514915197c681813c08cfb13e2634a726c49eb

        SHA256

        115603c29e90a55eca74fb17dc5db85f88139798d450f20216202005c1e21190

        SHA512

        6f40107cc67fdbe11a44dc476873da68ad907c7272ca887edf1558a287dea5f3de9deb2afa93fcac4080fca565b5ff1bf47678480bdb5554e9a650971696473c

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\0HLEFOQ9\KIRA'S%20BOMB[1].zip

        Filesize

        431KB

        MD5

        8e3c7ec087abfc0213bdf451f2d3e59d

        SHA1

        04f0fbbcb8f0c636203d2ef1b17a01f8165e60fc

        SHA256

        54ce9c0ee2461cf675d2a060f3598ad4641a39b8767521b4c685648799983398

        SHA512

        48e286bb9ab9462ffc13d123005732103b7af0029e9d0b839613d11c6229196f7a347c6c919e644d53734cf52add4c06c074cf4ea3954335defbec664199848b

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\B6NEM30X.cookie

        Filesize

        223B

        MD5

        b4b3b18e7bbb90a79edd22f871a06645

        SHA1

        9010d424d5cc84c027df15aeb2e2b538edcf6de8

        SHA256

        353b8fdff026fcf1c78d46d70bbe6b1eadd84aaa4eb72b065e33a00e88f98464

        SHA512

        4cf504a48a80bccffab3d0a7ae2697147364afb7beac2a9de031927232b3f06ba23d588b5347e0a354372f2cd3e5b4d3d02bd079d4d39d74aba3b9fe8e47d796

      • memory/1328-43-0x00000135A2E00000-0x00000135A2F00000-memory.dmp

        Filesize

        1024KB

      • memory/1328-45-0x00000135A2E00000-0x00000135A2F00000-memory.dmp

        Filesize

        1024KB

      • memory/1640-76-0x00000169B5680000-0x00000169B5780000-memory.dmp

        Filesize

        1024KB

      • memory/3500-62-0x000001DEFAAA0000-0x000001DEFAAA2000-memory.dmp

        Filesize

        8KB

      • memory/3500-65-0x000001DEFAAC0000-0x000001DEFAAC2000-memory.dmp

        Filesize

        8KB

      • memory/3500-59-0x000001DEFAA70000-0x000001DEFAA72000-memory.dmp

        Filesize

        8KB

      • memory/3500-56-0x000001DEEA890000-0x000001DEEA990000-memory.dmp

        Filesize

        1024KB

      • memory/5112-0-0x000002ABB1920000-0x000002ABB1930000-memory.dmp

        Filesize

        64KB

      • memory/5112-35-0x000002ABAEEC0000-0x000002ABAEEC2000-memory.dmp

        Filesize

        8KB

      • memory/5112-16-0x000002ABB1A20000-0x000002ABB1A30000-memory.dmp

        Filesize

        64KB

      • memory/5112-113-0x000002ABB0C10000-0x000002ABB0C12000-memory.dmp

        Filesize

        8KB

      • memory/5112-116-0x000002ABAEEF0000-0x000002ABAEEF1000-memory.dmp

        Filesize

        4KB

      • memory/5112-120-0x000002ABAEEB0000-0x000002ABAEEB1000-memory.dmp

        Filesize

        4KB