Resubmissions

10-08-2024 20:29

240810-y92etawgrr 8

10-08-2024 20:25

240810-y7nqyawgjq 8

10-08-2024 20:24

240810-y64e1a1apf 8

10-08-2024 20:23

240810-y589vswfmq 8

10-08-2024 20:16

240810-y2crgswdqq 8

Analysis

  • max time kernel
    30s
  • max time network
    25s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-es
  • resource tags

    arch:x64arch:x86image:win10-20240404-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    10-08-2024 20:24

General

  • Target

    https://nexuscreafilms.com/linoleum/braille/?GWdikZfzgM=bHVibGluLnByZW1pdW1AZm9jdXNob3RlbHMucGw=

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://nexuscreafilms.com/linoleum/braille/?GWdikZfzgM=bHVibGluLnByZW1pdW1AZm9jdXNob3RlbHMucGw="
    1⤵
      PID:3960
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2136
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4428
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4868
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1304
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1556
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3796
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1900
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4300
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4792
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2328

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      3B

      MD5

      8a80554c91d9fca8acb82f023de02f11

      SHA1

      5f36b2ea290645ee34d943220a14b54ee5ea5be5

      SHA256

      ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

      SHA512

      ca4b6defb8adcc010050bc8b1bb8f8092c4928b8a0fba32146abcfb256e4d91672f88ca2cdf6210e754e5b8ac5e23fb023806ccd749ac8b701f79a691f03c87a

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      302B

      MD5

      3e64daa6fef74b9367282165b3568460

      SHA1

      5bb594e4d542a9fd5f834cfdcecca6ecb8aca8ce

      SHA256

      a050c23e0cea01779f6ba680a1c120039f04a9ff280af25e4cd2dc85d2f4cb96

      SHA512

      5d3b368aaeb274302dbe46dd4fc33d5705702aabd938215cecbb8492de01ae14790f787858456ea69c22e42780984885560c48c9ea922662dec534a42cb2e691

    • memory/1304-43-0x00000228BF020000-0x00000228BF120000-memory.dmp

      Filesize

      1024KB

    • memory/1304-42-0x00000228BF020000-0x00000228BF120000-memory.dmp

      Filesize

      1024KB

    • memory/1556-56-0x000001A26EF60000-0x000001A26EF62000-memory.dmp

      Filesize

      8KB

    • memory/1556-55-0x000001A25EC00000-0x000001A25ED00000-memory.dmp

      Filesize

      1024KB

    • memory/1556-63-0x000001A26EFD0000-0x000001A26EFD2000-memory.dmp

      Filesize

      8KB

    • memory/1556-61-0x000001A26EFB0000-0x000001A26EFB2000-memory.dmp

      Filesize

      8KB

    • memory/1556-59-0x000001A26EF90000-0x000001A26EF92000-memory.dmp

      Filesize

      8KB

    • memory/2136-17-0x0000017030E30000-0x0000017030E40000-memory.dmp

      Filesize

      64KB

    • memory/2136-71-0x00000170379A0000-0x00000170379A1000-memory.dmp

      Filesize

      4KB

    • memory/2136-70-0x0000017037990000-0x0000017037991000-memory.dmp

      Filesize

      4KB

    • memory/2136-35-0x000001702DF90000-0x000001702DF92000-memory.dmp

      Filesize

      8KB

    • memory/2136-0-0x0000017030D20000-0x0000017030D30000-memory.dmp

      Filesize

      64KB

    • memory/4300-149-0x00000205DFCF0000-0x00000205DFCF2000-memory.dmp

      Filesize

      8KB

    • memory/4300-151-0x00000205DFD10000-0x00000205DFD12000-memory.dmp

      Filesize

      8KB

    • memory/4300-153-0x00000205DFD30000-0x00000205DFD32000-memory.dmp

      Filesize

      8KB