Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29-08-2024 03:03

General

  • Target

    http://swaghack.net

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://swaghack.net"
    1⤵
      PID:3380
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1984
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2112
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4188
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4036
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2328
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x390
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2712
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2116
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:664
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2880

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V28C7N3J\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\07SWPP6R\remote[1].js

      Filesize

      118KB

      MD5

      070f2f7d61543a4ee67d6c252075034d

      SHA1

      a2e0d1d08c18736dfc19c16e147ccea13361efc2

      SHA256

      924d0f1f7dec14081ddff34a8799e8ec9ef32963d38fb04e0f1e07ee4e3423da

      SHA512

      5abe05872c423717a8367b9187b0caaf5ecac1179329af2fc3a35256b0f6f8e97c8b7f92be0e440d63f1bb99ed0e4445793179e61896736a74a77d8ec77104c9

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4NDH4FUP\www.youtube[1].xml

      Filesize

      17KB

      MD5

      d01ab54109d22e879cac85e17309aac5

      SHA1

      fd3638a57c43085268d0745782cd3a71dca71027

      SHA256

      916bc41f3138f414549d5466cca2af2c6367bbad61245a7b5f31a2a72321d88d

      SHA512

      6238bdd78fba29fdb543e435085debce385f87020b29bef5976c832a6c0d16cbbbc602e88fedb145e56e0fa0479d269406081d15af71a5e8a9e7527243d12cb7

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4NDH4FUP\www.youtube[1].xml

      Filesize

      34KB

      MD5

      4c249c2bce8cb95db926e0ebce0fab88

      SHA1

      be09525242b1162cc77e90990a269e77cb86a487

      SHA256

      6389fd2de820a9c14683c5149219f360b5e00868880754cd9f03937e6d716b03

      SHA512

      efda4407dd54750667a5d4d906e429cec0009a4bc8dc603a93867addee5b2ac09834c511cf1c23a457ced3e79759b037d3dd97183fdb070b8ba7bb366ebfcedf

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4NDH4FUP\www.youtube[1].xml

      Filesize

      17KB

      MD5

      97cff1981de6c66af9ad47c60c06629b

      SHA1

      dec35a677f035aa3384731eea9523adb1afbc7f1

      SHA256

      abf596178ee839c623dd2c0a7348eb3a1602588b4c8a9c4bc288293e9af383ca

      SHA512

      dd206ff821b499a40abb256c6405bcd400219b5a29f3a36c3c009174b469f12cd3f2df0cae05527284d59e308e4082217ec702cf34b1e864b62ead77e5585cd2

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4NDH4FUP\www.youtube[1].xml

      Filesize

      979B

      MD5

      f749abe7b8d1611b9c5cde469ef79908

      SHA1

      f897290c0b6ace0d0c390248105b9dfca8702597

      SHA256

      4a60a1436341101374990df2c00778e2babd08b31a7f889915d29a546ff98ff3

      SHA512

      febc3db7a6b5f7d9e500824f3ef6c377eebfe7958cdf64fcc06bc38b353df5522fb23b425d6379e84e236de9f514ecbf2f72bd312bb5b8fad0378cd5f134374d

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4NDH4FUP\www.youtube[1].xml

      Filesize

      229B

      MD5

      3d313304b91f9d3251b8f5d6ed20043c

      SHA1

      70d7a2d1044d2408cc142a977fe3a075eaf3ac13

      SHA256

      db02a8dcfa5531682d11a5013eb9727d18bac88fd3e3a0a0f1cfddfc7ff4fd63

      SHA512

      bbfd82fc9773ef5eec631c897e03d21e050dac500a373025fe76ef85b93432d265f4ecae7400794ca8aaaac464138e73ef97d57aa3d27b3efd320890bca4d326

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4NDH4FUP\www.youtube[1].xml

      Filesize

      686B

      MD5

      e2c24e259af1c191880c7d52673492dd

      SHA1

      bee4f24d21d3e84913347e6b27971ce9e33ac24d

      SHA256

      891db62c514947671066d242daf7b76e30bf994177b728f5c76af3651c10ed83

      SHA512

      5ef2345bef3baddc8328b3795b4de4cd2376938e8c85635a196beb1d877257c9641c7ed239a228610a8c72e6926a70f6fc2268f48f0af092febf97174dfd943f

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\3KQ2OLTV\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\7U52YU9W\stander[1].png

      Filesize

      93KB

      MD5

      0921b7f630b0290ccda5932b821b0d77

      SHA1

      a1e02fffa5eb60001538c2240fcc9b3a5e02f4a8

      SHA256

      ccf715390d1a0fef7218e1adb5075914404aba492cca874e6c4d45ccf853cfac

      SHA512

      70da7f4aa31b10611c53042cefd01606c9e4b4fdb2e4eead72ed2e46e6b2934a74d39e5b54ad8709441ced505728f736073b56a9edd9b9c771b49ba9064ebee8

    • memory/1984-180-0x0000025D07EC0000-0x0000025D07EC1000-memory.dmp

      Filesize

      4KB

    • memory/1984-16-0x0000025D01700000-0x0000025D01710000-memory.dmp

      Filesize

      64KB

    • memory/1984-35-0x0000025D05960000-0x0000025D05962000-memory.dmp

      Filesize

      8KB

    • memory/1984-0-0x0000025D01600000-0x0000025D01610000-memory.dmp

      Filesize

      64KB

    • memory/1984-179-0x0000025D07EB0000-0x0000025D07EB1000-memory.dmp

      Filesize

      4KB

    • memory/2328-119-0x00000206F21B0000-0x00000206F21B2000-memory.dmp

      Filesize

      8KB

    • memory/2328-431-0x00000206DF120000-0x00000206DF130000-memory.dmp

      Filesize

      64KB

    • memory/2328-109-0x00000206F13F0000-0x00000206F13F2000-memory.dmp

      Filesize

      8KB

    • memory/2328-189-0x00000206F1580000-0x00000206F1680000-memory.dmp

      Filesize

      1024KB

    • memory/2328-196-0x00000206F7CE0000-0x00000206F7D00000-memory.dmp

      Filesize

      128KB

    • memory/2328-111-0x00000206F1420000-0x00000206F1422000-memory.dmp

      Filesize

      8KB

    • memory/2328-265-0x00000206F6D40000-0x00000206F6E40000-memory.dmp

      Filesize

      1024KB

    • memory/2328-420-0x00000206DF120000-0x00000206DF130000-memory.dmp

      Filesize

      64KB

    • memory/2328-421-0x00000206DF120000-0x00000206DF130000-memory.dmp

      Filesize

      64KB

    • memory/2328-422-0x00000206DF120000-0x00000206DF130000-memory.dmp

      Filesize

      64KB

    • memory/2328-423-0x00000206DF120000-0x00000206DF130000-memory.dmp

      Filesize

      64KB

    • memory/2328-429-0x00000206DF120000-0x00000206DF130000-memory.dmp

      Filesize

      64KB

    • memory/2328-428-0x00000206DF120000-0x00000206DF130000-memory.dmp

      Filesize

      64KB

    • memory/2328-107-0x00000206F13D0000-0x00000206F13D2000-memory.dmp

      Filesize

      8KB

    • memory/2328-430-0x00000206DF120000-0x00000206DF130000-memory.dmp

      Filesize

      64KB

    • memory/2328-427-0x00000206DF120000-0x00000206DF130000-memory.dmp

      Filesize

      64KB

    • memory/2328-426-0x00000206DF120000-0x00000206DF130000-memory.dmp

      Filesize

      64KB

    • memory/2328-425-0x00000206DF120000-0x00000206DF130000-memory.dmp

      Filesize

      64KB

    • memory/2328-424-0x00000206DF120000-0x00000206DF130000-memory.dmp

      Filesize

      64KB

    • memory/2328-113-0x00000206F14B0000-0x00000206F14B2000-memory.dmp

      Filesize

      8KB

    • memory/2328-117-0x00000206F2190000-0x00000206F2192000-memory.dmp

      Filesize

      8KB

    • memory/2328-121-0x00000206F21D0000-0x00000206F21D2000-memory.dmp

      Filesize

      8KB

    • memory/2328-123-0x00000206F21F0000-0x00000206F21F2000-memory.dmp

      Filesize

      8KB

    • memory/2328-115-0x00000206F17B0000-0x00000206F17B2000-memory.dmp

      Filesize

      8KB

    • memory/2328-105-0x00000206F08E0000-0x00000206F08E2000-memory.dmp

      Filesize

      8KB

    • memory/2328-59-0x00000206DF400000-0x00000206DF500000-memory.dmp

      Filesize

      1024KB

    • memory/4036-42-0x0000026CE0980000-0x0000026CE0A80000-memory.dmp

      Filesize

      1024KB