Analysis

  • max time kernel
    1800s
  • max time network
    1588s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-09-2024 16:52

General

  • Target

    Content-Warning-FixOnly.V4/OnlineFix.url

  • Size

    46B

  • MD5

    59bf167dc52a52f6e45f418f8c73ffa1

  • SHA1

    fa006950a6a971e89d4a1c23070d458a30463999

  • SHA256

    3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e

  • SHA512

    00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\System32\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Content-Warning-FixOnly.V4\OnlineFix.url
    1⤵
    • Checks computer location settings
    PID:4188
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:220
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4632
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:696
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4236
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:1576
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:3772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    1bfe591a4fe3d91b03cdf26eaacd8f89

    SHA1

    719c37c320f518ac168c86723724891950911cea

    SHA256

    9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

    SHA512

    02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VSH5XF98\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\TFLA3JYE\online-fix[1].xml

    Filesize

    356B

    MD5

    755ce6c78c2f8758b4d8b012d639f528

    SHA1

    cfe655ec63ee933c1e679659e3616b05b6e6f874

    SHA256

    4ca40de3acaff6d988c620cd63c04362c0828a1cb48e2bd3396dcae0659ae86a

    SHA512

    ae7bb5a13a6e91dae140b2cddf1d052e8cfb3a833f78c66f88d1b20568dc18214e317ae19a3345e798fc0ea916f9015a778e68f751b7dd6be323b8b62bf48635

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\TFLA3JYE\online-fix[1].xml

    Filesize

    1KB

    MD5

    49b1ce5ec649853284f480f23941d68c

    SHA1

    ed7231a93c74b724b212e5f8eb0e34bc22ed4853

    SHA256

    f1b1cb54b414a0b4696c650020f4f6f48d350710349ddeb32c09c20ad9b4f295

    SHA512

    13541ea7b27d6f3cb5fa9ea89a2b099090f3eb81cbaa19c2fd788bfb93f2e117ae74404faf70416012840d3bf8f3a054eec0e08d9c78f24d4087e9b856929db0

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\O7NTE3LO\favicon-16x16[1].png

    Filesize

    1KB

    MD5

    89db4cf9f3e2951f677919931ae16d12

    SHA1

    c52a7d97ac4cc838ed54ee9d2a682c9305a675c6

    SHA256

    c1fff90e1a74d5b51203f2a7b60270db5a105741217a3ce1d1a220504e43e96b

    SHA512

    5c7f06bbe108ac5915c303e32253ccdc78690f81c096568234a6a1f4c7ed8d2171266eec91139820bcf9222268ab90a9c79882b10a2a190ab81eadb5d61e7d7d

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\YRZ6G88R\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • memory/220-0-0x0000018414A20000-0x0000018414A30000-memory.dmp

    Filesize

    64KB

  • memory/220-16-0x0000018414B20000-0x0000018414B30000-memory.dmp

    Filesize

    64KB

  • memory/220-35-0x0000018411DF0000-0x0000018411DF2000-memory.dmp

    Filesize

    8KB

  • memory/220-425-0x000001841B1B0000-0x000001841B1B1000-memory.dmp

    Filesize

    4KB

  • memory/220-426-0x000001841B1E0000-0x000001841B1E1000-memory.dmp

    Filesize

    4KB

  • memory/1576-353-0x0000023003690000-0x0000023003692000-memory.dmp

    Filesize

    8KB

  • memory/1576-218-0x00000230033E0000-0x00000230033E2000-memory.dmp

    Filesize

    8KB

  • memory/1576-201-0x0000023003520000-0x0000023003522000-memory.dmp

    Filesize

    8KB

  • memory/1576-195-0x00000230034E0000-0x00000230034E2000-memory.dmp

    Filesize

    8KB

  • memory/1576-199-0x0000023003510000-0x0000023003512000-memory.dmp

    Filesize

    8KB

  • memory/1576-197-0x0000023003500000-0x0000023003502000-memory.dmp

    Filesize

    8KB

  • memory/1576-191-0x00000230034D0000-0x00000230034D2000-memory.dmp

    Filesize

    8KB

  • memory/1576-205-0x0000023003540000-0x0000023003542000-memory.dmp

    Filesize

    8KB

  • memory/1576-367-0x0000023004580000-0x0000023004582000-memory.dmp

    Filesize

    8KB

  • memory/1576-378-0x00000230019F0000-0x00000230019F2000-memory.dmp

    Filesize

    8KB

  • memory/1576-384-0x0000023004E00000-0x0000023004F00000-memory.dmp

    Filesize

    1024KB

  • memory/1576-207-0x00000230032A0000-0x00000230032A2000-memory.dmp

    Filesize

    8KB

  • memory/1576-209-0x00000230032C0000-0x00000230032C2000-memory.dmp

    Filesize

    8KB

  • memory/1576-203-0x0000023003530000-0x0000023003532000-memory.dmp

    Filesize

    8KB

  • memory/1576-211-0x00000230033C0000-0x00000230033C2000-memory.dmp

    Filesize

    8KB

  • memory/1576-487-0x0000023008420000-0x0000023008520000-memory.dmp

    Filesize

    1024KB

  • memory/1576-500-0x00000230001C0000-0x00000230001D0000-memory.dmp

    Filesize

    64KB

  • memory/1576-501-0x00000230001C0000-0x00000230001D0000-memory.dmp

    Filesize

    64KB

  • memory/1576-502-0x00000230001C0000-0x00000230001D0000-memory.dmp

    Filesize

    64KB

  • memory/1576-505-0x00000230001C0000-0x00000230001D0000-memory.dmp

    Filesize

    64KB

  • memory/1576-504-0x00000230001C0000-0x00000230001D0000-memory.dmp

    Filesize

    64KB

  • memory/1576-186-0x00000230034B0000-0x00000230034B2000-memory.dmp

    Filesize

    8KB

  • memory/1576-167-0x0000023003270000-0x0000023003272000-memory.dmp

    Filesize

    8KB

  • memory/1576-59-0x000002386FF00000-0x0000023870000000-memory.dmp

    Filesize

    1024KB

  • memory/4236-45-0x0000021CE6410000-0x0000021CE6510000-memory.dmp

    Filesize

    1024KB