Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08/08/2024, 19:52

General

  • Target

    https://oilkhn.vk.com/away.php?to=https://brandequity.economictimes.indiatimes.com///etl.php?url=mirellamonteiro.com.br//dayo/b2ikiG/Y2F0aHkuYW5kZXJzb25AdXRhaC5lZHU=

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://oilkhn.vk.com/away.php?to=https://brandequity.economictimes.indiatimes.com///etl.php?url=mirellamonteiro.com.br//dayo/b2ikiG/Y2F0aHkuYW5kZXJzb25AdXRhaC5lZHU="
    1⤵
      PID:3852
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2700
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3928
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4312
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5084
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:948
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4932
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4288
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4176

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZVQ9VIUB\edgecompatviewlist[1].xml

            Filesize

            74KB

            MD5

            d4fc49dc14f63895d997fa4940f24378

            SHA1

            3efb1437a7c5e46034147cbbc8db017c69d02c31

            SHA256

            853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

            SHA512

            cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\B7QXPPPO\away.vk[1].xml

            Filesize

            13B

            MD5

            c1ddea3ef6bbef3e7060a1a9ad89e4c5

            SHA1

            35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

            SHA256

            b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

            SHA512

            6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\245VUJR1\favicon[1].htm

            Filesize

            5KB

            MD5

            8647dd1952b1ddaa8780f6200ae6e9cf

            SHA1

            408de20f4ca114e46460710ca6a7da45ed53ec28

            SHA256

            162ebfdb0d2a6dc37b53286b90af16a010410cc82f5d61f6dc3283dd08c1afe2

            SHA512

            dbd8d54006a8e9552a29fde2d12a0ef42b0abea144458989f7a261988d7152adb25426145fa22b331b9f40163777d650758d5f5e4678636685e8829de3f030c4

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\245VUJR1\suggestions[1].en-US

            Filesize

            17KB

            MD5

            5a34cb996293fde2cb7a4ac89587393a

            SHA1

            3c96c993500690d1a77873cd62bc639b3a10653f

            SHA256

            c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

            SHA512

            e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\ETFLLOVP\favicon[1].htm

            Filesize

            4KB

            MD5

            3a6ff453ba3c6602c8794118f8ac4e13

            SHA1

            bb9d18e9675764f459b8e4caa860539bcc48e0a4

            SHA256

            7fe5b58b9ebadea5e097149faa2afaf2817b440ab666c1c05f987ba4f301ffe0

            SHA512

            c09bb989c1da3cdd1847ba63107e19b41a7e456ac11231aa3bf4d47329572e91691beea8f6b7574bd8f1691a03573653c5b418b87d55be38fee6bb747a296f16

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

            Filesize

            4KB

            MD5

            1bfe591a4fe3d91b03cdf26eaacd8f89

            SHA1

            719c37c320f518ac168c86723724891950911cea

            SHA256

            9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

            SHA512

            02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

            Filesize

            471B

            MD5

            27d9397d3ab97c45627784fe6b76b828

            SHA1

            fa617aa2479a803463f6a97fc2d468234fc93c3f

            SHA256

            2eacf56f84e70746b592fddcc7d1449b8d4171dd5d5e0ac0169790bac6a8c98a

            SHA512

            ac66b7607dac4992b88e22539243a28edce738e96e2bce3d6d3ba2a9861b94e2ef65cff2b100eb988542d0582626e5cc6e9b87e20fa905f7521c067763f78513

          • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

            Filesize

            400B

            MD5

            e5d9b8d18f60b2848294795e273493be

            SHA1

            473a8d9e26d1a99d4ef89e273aaa92f88f92b7a2

            SHA256

            997ac77b53506819554329cb4d91e7252abf4914e4fec6e59bfcf829f095a233

            SHA512

            74e5fef7ab30526701d58a4cc037e270ad6f95c74e34b6e7cdcecfd141f170e503dcaa840a5e23fede7b426f5d4ff078be8111de320c38a24f659993a6515443

          • memory/948-71-0x0000020775C00000-0x0000020775D00000-memory.dmp

            Filesize

            1024KB

          • memory/948-67-0x0000020775620000-0x0000020775622000-memory.dmp

            Filesize

            8KB

          • memory/948-65-0x0000020775600000-0x0000020775602000-memory.dmp

            Filesize

            8KB

          • memory/948-62-0x00000207752B0000-0x00000207752B2000-memory.dmp

            Filesize

            8KB

          • memory/2700-16-0x000001BA72D20000-0x000001BA72D30000-memory.dmp

            Filesize

            64KB

          • memory/2700-185-0x000001BA79A10000-0x000001BA79A11000-memory.dmp

            Filesize

            4KB

          • memory/2700-186-0x000001BA79A20000-0x000001BA79A21000-memory.dmp

            Filesize

            4KB

          • memory/2700-35-0x000001BA76EB0000-0x000001BA76EB2000-memory.dmp

            Filesize

            8KB

          • memory/2700-0-0x000001BA72C20000-0x000001BA72C30000-memory.dmp

            Filesize

            64KB

          • memory/4288-126-0x0000025BC6F00000-0x0000025BC7000000-memory.dmp

            Filesize

            1024KB

          • memory/4288-157-0x0000025BD79F0000-0x0000025BD79F2000-memory.dmp

            Filesize

            8KB

          • memory/5084-45-0x000001F186D00000-0x000001F186E00000-memory.dmp

            Filesize

            1024KB