Analysis

  • max time kernel
    134s
  • max time network
    164s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/08/2024, 12:23

General

  • Target

    Injector.exe

  • Size

    6.0MB

  • MD5

    f36ee5932a730027228fd5d283f57785

  • SHA1

    3d007845d8384469a7dcacddf0756bfbaa766812

  • SHA256

    1f1a077a14b1a86775ddf74413d454f033c8fcadf198fce4d421f096fd7decfb

  • SHA512

    6c1fd7e826cae70ee47a3ffdfba8f76555a4194981ecedd02566d9fd508dbfd6ac317cb6737409433246bb2091d216e6267fa548875c1f47e20debdb3f4c6937

  • SSDEEP

    196608:2UwyetYraZbrkIeh2UWed0osYbrIu20fiFYrxFj:27tRGI+2UpxbrjhtxF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • cURL User-Agent 1 IoCs

    Uses User-Agent string associated with cURL utility.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Injector.exe
    "C:\Users\Admin\AppData\Local\Temp\Injector.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c start https://octane.lol/keysystem/1
      2⤵
      • Checks computer location settings
      PID:3996
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2140
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:1908
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4608
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2284
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4328
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1996
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1300
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:3076
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:2060
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:4320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XCFODRP5\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\DOMStore\X372504C\www.bing[1].xml

    Filesize

    1KB

    MD5

    9907dc050ff6668fc245c0cc14ec5f2b

    SHA1

    83d5e5bcdbb551c51395fa8497fc981c99b824ac

    SHA256

    5d6aa6227b229ad72e624c3601c4e7edd601164f5263c16f8692c037fc424b25

    SHA512

    2130a9415a63830e023f6a6867e3826478b8fb2ad36493804d158eba3a44d3f66cda101e696758d7cb2f1b65171ba4244fa1d9b43e8bbfe05d38f8c00a094a58

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    1bfe591a4fe3d91b03cdf26eaacd8f89

    SHA1

    719c37c320f518ac168c86723724891950911cea

    SHA256

    9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

    SHA512

    02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\EPQZQRVD\icon[1].ico

    Filesize

    14KB

    MD5

    18259084a6b0d1a226a324d77f7061e5

    SHA1

    7c5161abe20ee055210df9162ab01ca1b8d4ff73

    SHA256

    fde5d970f6ad51ef3b05c9e2c78883189f83fb4c4c792c7a5d5457a8cf78bc7c

    SHA512

    8c4a1a619a2545261d2807e229c52b08329d864310da8063bde5ba1e2f69b1b4f7082e05d90ae0ef9192dc38353d890db7e11c8d9356f17ddbe5ce9180acf24d

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\ZLZSVZE4\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF7AC58086531EEF7A.TMP

    Filesize

    16KB

    MD5

    dc31884683698ad219831abb04c1d224

    SHA1

    5d73cd66cbebf78ef2cd91f9f2131cbfc7c27336

    SHA256

    9e509c8361ae85e708186f49ea3c6cca0dbfe3805d61b61368252d6c25b8b908

    SHA512

    3a0774013d2600144dcdd511f5186c19882a3e5f6bf152dcce63ce684cb99e6dfb51e594f49d59e8a7e5819a0b007b36f0876cca49f0627e53bc0c5182d3295c

  • C:\Users\Admin\AppData\Local\Temp\workspace\auth.bin

    Filesize

    35B

    MD5

    505420dbd543ade945af25f94d075d8a

    SHA1

    894cee23888f0141c99a4dc466d6f54a179e975e

    SHA256

    1127131fccaf98036d2a07cfad2eb8d039c658cd20c87fa8209ed1868e6dd3c9

    SHA512

    1070dcd3673781481e60946040dc5730542ca057c9020252589f0e84d12d0b73dc8ce7920660a05d44f197163a5433b8d9e9e00c8d08ecdf2916facba8e3f3ec

  • memory/1596-1-0x00007FFAC0C20000-0x00007FFAC0C22000-memory.dmp

    Filesize

    8KB

  • memory/1596-2-0x00007FFAC0C30000-0x00007FFAC0C32000-memory.dmp

    Filesize

    8KB

  • memory/1596-0-0x00007FF6432E4000-0x00007FF643670000-memory.dmp

    Filesize

    3.5MB

  • memory/1596-355-0x00007FF6432E4000-0x00007FF643670000-memory.dmp

    Filesize

    3.5MB

  • memory/1596-540-0x00007FF643140000-0x00007FF643C7A000-memory.dmp

    Filesize

    11.2MB

  • memory/1596-539-0x00007FF6432E4000-0x00007FF643670000-memory.dmp

    Filesize

    3.5MB

  • memory/1596-356-0x00007FF643140000-0x00007FF643C7A000-memory.dmp

    Filesize

    11.2MB

  • memory/1596-3-0x00007FF643140000-0x00007FF643C7A000-memory.dmp

    Filesize

    11.2MB

  • memory/2140-130-0x000001A187A80000-0x000001A187A81000-memory.dmp

    Filesize

    4KB

  • memory/2140-129-0x000001A187A70000-0x000001A187A71000-memory.dmp

    Filesize

    4KB

  • memory/2140-23-0x000001A181320000-0x000001A181330000-memory.dmp

    Filesize

    64KB

  • memory/2140-42-0x000001A1854E0000-0x000001A1854E2000-memory.dmp

    Filesize

    8KB

  • memory/2140-7-0x000001A181220000-0x000001A181230000-memory.dmp

    Filesize

    64KB

  • memory/2284-51-0x000002B390B10000-0x000002B390C10000-memory.dmp

    Filesize

    1024KB

  • memory/2284-50-0x000002B390B10000-0x000002B390C10000-memory.dmp

    Filesize

    1024KB

  • memory/4328-74-0x0000023F401A0000-0x0000023F401A2000-memory.dmp

    Filesize

    8KB

  • memory/4328-164-0x0000023F41090000-0x0000023F41092000-memory.dmp

    Filesize

    8KB

  • memory/4328-162-0x0000023F41080000-0x0000023F41082000-memory.dmp

    Filesize

    8KB

  • memory/4328-183-0x0000023F410E0000-0x0000023F41100000-memory.dmp

    Filesize

    128KB

  • memory/4328-182-0x0000023F40300000-0x0000023F40400000-memory.dmp

    Filesize

    1024KB

  • memory/4328-211-0x0000023F43400000-0x0000023F43500000-memory.dmp

    Filesize

    1024KB

  • memory/4328-351-0x0000023F2FB80000-0x0000023F2FB90000-memory.dmp

    Filesize

    64KB

  • memory/4328-154-0x0000023F41280000-0x0000023F41282000-memory.dmp

    Filesize

    8KB

  • memory/4328-152-0x0000023F41260000-0x0000023F41262000-memory.dmp

    Filesize

    8KB

  • memory/4328-150-0x0000023F40FC0000-0x0000023F40FC2000-memory.dmp

    Filesize

    8KB

  • memory/4328-148-0x0000023F40190000-0x0000023F40192000-memory.dmp

    Filesize

    8KB

  • memory/4328-102-0x0000023F40C40000-0x0000023F40C42000-memory.dmp

    Filesize

    8KB

  • memory/4328-104-0x0000023F40C60000-0x0000023F40C62000-memory.dmp

    Filesize

    8KB

  • memory/4328-98-0x0000023F40C10000-0x0000023F40C12000-memory.dmp

    Filesize

    8KB

  • memory/4328-100-0x0000023F40C30000-0x0000023F40C32000-memory.dmp

    Filesize

    8KB

  • memory/4328-69-0x0000023F2FB70000-0x0000023F2FB72000-memory.dmp

    Filesize

    8KB

  • memory/4328-72-0x0000023F2FBE0000-0x0000023F2FBE2000-memory.dmp

    Filesize

    8KB