Resubmissions

30-08-2024 07:22

240830-h7e6ssscqc 3

21-08-2024 12:49

240821-p2r2qsyhjd 4

21-08-2024 12:46

240821-pzt4basdqp 4

21-08-2024 12:42

240821-pxg1zayfmf 8

Analysis

  • max time kernel
    2s
  • max time network
    14s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-08-2024 12:46

General

  • Target

    http://mega.nz/file/1iNShCCC#aNETgbLifSzjraFPtIxMT2WQvRWASgrYw74z3KfsHrA

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 59 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://mega.nz/file/1iNShCCC#aNETgbLifSzjraFPtIxMT2WQvRWASgrYw74z3KfsHrA"
    1⤵
      PID:2836
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2028
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4248
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1248
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
        PID:3724
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
          PID:4940

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\Y2P9GMCP\favicon[1].ico

          Filesize

          6KB

          MD5

          72f13fa5f987ea923a68a818d38fb540

          SHA1

          f014620d35787fcfdef193c20bb383f5655b9e1e

          SHA256

          37127c1a29c164cdaa75ec72ae685094c2468fe0577f743cb1f307d23dd35ec1

          SHA512

          b66af0b6b95560c20584ed033547235d5188981a092131a7c1749926ba1ac208266193bd7fa8a3403a39eee23fcdd53580e9533803d7f52df5fb01d508e292b3

        • memory/2028-16-0x000002DF21B20000-0x000002DF21B30000-memory.dmp

          Filesize

          64KB

        • memory/2028-0-0x000002DF21A20000-0x000002DF21A30000-memory.dmp

          Filesize

          64KB

        • memory/2028-35-0x000002DF20B80000-0x000002DF20B82000-memory.dmp

          Filesize

          8KB

        • memory/2028-93-0x000002DF28720000-0x000002DF28721000-memory.dmp

          Filesize

          4KB

        • memory/2028-94-0x000002DF28730000-0x000002DF28731000-memory.dmp

          Filesize

          4KB

        • memory/3724-45-0x00000180CA2C0000-0x00000180CA3C0000-memory.dmp

          Filesize

          1024KB

        • memory/4940-70-0x000001AAA11A0000-0x000001AAA11A2000-memory.dmp

          Filesize

          8KB

        • memory/4940-74-0x000001AAA11E0000-0x000001AAA11E2000-memory.dmp

          Filesize

          8KB

        • memory/4940-72-0x000001AAA11C0000-0x000001AAA11C2000-memory.dmp

          Filesize

          8KB