Analysis

  • max time kernel
    33s
  • max time network
    33s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/09/2024, 20:12

General

  • Target

    sample.html

  • Size

    15KB

  • MD5

    317d3d959fd05983161f1c9dac42804f

  • SHA1

    82968cfe6348440a83e7ee57714370486f0917da

  • SHA256

    5988880dfdba7ac2c9b6a333ce8659645fcb42b6764413b3459294fcd34d46f5

  • SHA512

    df6c88f1d5c783b4313541abaf7be8c165fff99792f04e4304368e1b2b22428b5243a37b51412b1e7c8689b7ce183e9fc775de2e4cad1c8f007fa5626c77db62

  • SSDEEP

    384:qTg+oJkNifIOBWQAxYHcI65wPTDKH6FiN:WoJkOxpGCPTDSN

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "C:\Users\Admin\AppData\Local\Temp\sample.html"
    1⤵
      PID:1472
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2532
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4980
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4152
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4940
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4988
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4084
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:3996
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4808
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2480

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XCFODRP5\edgecompatviewlist[1].xml

            Filesize

            74KB

            MD5

            d4fc49dc14f63895d997fa4940f24378

            SHA1

            3efb1437a7c5e46034147cbbc8db017c69d02c31

            SHA256

            853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

            SHA512

            cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q627GJ7O\warmup[1].gif

            Filesize

            43B

            MD5

            325472601571f31e1bf00674c368d335

            SHA1

            2daeaa8b5f19f0bc209d976c02bd6acb51b00b0a

            SHA256

            b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

            SHA512

            717ea0ff7f3f624c268eccb244e24ec1305ab21557abb3d6f1a7e183ff68a2d28f13d1d2af926c9ef6d1fb16dd8cbe34cd98cacf79091dddc7874dcee21ecfdc

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\DOMStore\38W0ZDYP\www.bing[1].xml

            Filesize

            1KB

            MD5

            387a2bfa518629167b3221509ba138e1

            SHA1

            ca1ba4d00d7aa36d42c9f4446ffb92df6fa52973

            SHA256

            2722c6daa7e079880ebb755eb1aa598ca75c91fe1decf7675a2b92132ca05559

            SHA512

            74ff4d293d9c35daf76cd870e81d95b36e42857a2131c0144f35c52aae07ea3eaa2a1dc06d167a434ed9325c9c67b1b6c883bd9c08d03a47fc08724975e250f2

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\P68QH4OW\favicon[1].ico

            Filesize

            758B

            MD5

            84cc977d0eb148166481b01d8418e375

            SHA1

            00e2461bcd67d7ba511db230415000aefbd30d2d

            SHA256

            bbf8da37d92138cc08ffeec8e3379c334988d5ae99f4415579999bfbbb57a66c

            SHA512

            f47a507077f9173fb07ec200c2677ba5f783d645be100f12efe71f701a74272a98e853c4fab63740d685853935d545730992d0004c9d2fe8e1965445cab509c3

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

            Filesize

            4KB

            MD5

            1bfe591a4fe3d91b03cdf26eaacd8f89

            SHA1

            719c37c320f518ac168c86723724891950911cea

            SHA256

            9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

            SHA512

            02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

          • memory/2532-0-0x000001FFF7020000-0x000001FFF7030000-memory.dmp

            Filesize

            64KB

          • memory/2532-35-0x000001FFF44E0000-0x000001FFF44E2000-memory.dmp

            Filesize

            8KB

          • memory/2532-16-0x000001FFF7120000-0x000001FFF7130000-memory.dmp

            Filesize

            64KB

          • memory/2532-142-0x000001FFFFAE0000-0x000001FFFFAE1000-memory.dmp

            Filesize

            4KB

          • memory/2532-143-0x000001FFFFAF0000-0x000001FFFFAF1000-memory.dmp

            Filesize

            4KB

          • memory/4084-400-0x000001EC98DF0000-0x000001EC98E00000-memory.dmp

            Filesize

            64KB

          • memory/4084-403-0x000001EC98DF0000-0x000001EC98E00000-memory.dmp

            Filesize

            64KB

          • memory/4084-95-0x000001ECAA060000-0x000001ECAA160000-memory.dmp

            Filesize

            1024KB

          • memory/4084-101-0x000001ECAAA80000-0x000001ECAAAA0000-memory.dmp

            Filesize

            128KB

          • memory/4084-129-0x000001ECBBAA0000-0x000001ECBBBA0000-memory.dmp

            Filesize

            1024KB

          • memory/4084-65-0x000001EC99580000-0x000001EC99680000-memory.dmp

            Filesize

            1024KB

          • memory/4084-406-0x000001EC98DF0000-0x000001EC98E00000-memory.dmp

            Filesize

            64KB

          • memory/4084-405-0x000001EC98DF0000-0x000001EC98E00000-memory.dmp

            Filesize

            64KB

          • memory/4084-404-0x000001EC98DF0000-0x000001EC98E00000-memory.dmp

            Filesize

            64KB

          • memory/4084-164-0x000001ECAB900000-0x000001ECABA00000-memory.dmp

            Filesize

            1024KB

          • memory/4084-210-0x000001ECBBDE0000-0x000001ECBBE00000-memory.dmp

            Filesize

            128KB

          • memory/4084-217-0x000001ECBC170000-0x000001ECBC190000-memory.dmp

            Filesize

            128KB

          • memory/4084-94-0x000001ECA9D00000-0x000001ECA9D20000-memory.dmp

            Filesize

            128KB

          • memory/4084-248-0x000001ECBBFF0000-0x000001ECBC010000-memory.dmp

            Filesize

            128KB

          • memory/4084-402-0x000001EC98DF0000-0x000001EC98E00000-memory.dmp

            Filesize

            64KB

          • memory/4940-43-0x0000022290140000-0x0000022290240000-memory.dmp

            Filesize

            1024KB

          • memory/4988-52-0x000002AF77840000-0x000002AF77940000-memory.dmp

            Filesize

            1024KB

          • memory/4988-51-0x000002AF77840000-0x000002AF77940000-memory.dmp

            Filesize

            1024KB

          • memory/4988-59-0x000002AF77DB0000-0x000002AF77DB2000-memory.dmp

            Filesize

            8KB

          • memory/4988-57-0x000002AF77D90000-0x000002AF77D92000-memory.dmp

            Filesize

            8KB

          • memory/4988-55-0x000002AF77D70000-0x000002AF77D72000-memory.dmp

            Filesize

            8KB

          • memory/4988-50-0x000002AF77840000-0x000002AF77940000-memory.dmp

            Filesize

            1024KB