Analysis

  • max time kernel
    59s
  • max time network
    41s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-09-2024 12:28

General

  • Target

    https://reformedtundra.itch.io/windows-12-exe

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 11 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://reformedtundra.itch.io/windows-12-exe"
    1⤵
      PID:4888
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4020
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • NTFS ADS
      PID:204
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2692
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1196
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:428
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1012
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4372
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /1
        2⤵
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4384
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4812
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:3236

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

      Filesize

      14KB

      MD5

      a0575da55c726f427e0f3744c0b6a0ea

      SHA1

      f39112fcdaaca7be1fe4dff441ce28c904723ea1

      SHA256

      b01694e604eb220a923da5cacf58ab4fd0fcb1088c35b12a9708804de171ffd2

      SHA512

      7ecdf79e85026cc3f75bf73377e55118309ebf17a0063575116f6da7141276750987e267d6f81e98826e26db61190730b5b2920a8e71c076064b145586907abf

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VSH5XF98\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PRICache\1601268389\715946058.pri

      Filesize

      171KB

      MD5

      30ec43ce86e297c1ee42df6209f5b18f

      SHA1

      fe0a5ea6566502081cb23b2f0e91a3ab166aeed6

      SHA256

      8ccddf0c77743a42067782bc7782321330406a752f58fb15fb1cd446e1ef0ee4

      SHA512

      19e5a7197a92eeef0482142cfe0fb46f16ddfb5bf6d64e372e7258fa6d01cf9a1fac9f7258fd2fd73c0f8a064b8d79b51a1ec6d29bbb9b04cdbd926352388bae

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PRICache\4183903823\2290032291.pri

      Filesize

      2KB

      MD5

      b8da5aac926bbaec818b15f56bb5d7f6

      SHA1

      2b5bf97cd59e82c7ea96c31cf9998fbbf4884dc5

      SHA256

      5be5216ae1d0aed64986299528f4d4fe629067d5f4097b8e4b9d1c6bcf4f3086

      SHA512

      c39a28d58fb03f4f491bf9122a86a5cbe7677ec2856cf588f6263fa1f84f9ffc1e21b9bcaa60d290356f9018fb84375db532c8b678cf95cc0a2cc6ed8da89436

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\CILB2OEP\js[1].js

      Filesize

      275KB

      MD5

      5da73cd27fb5b7f608d9ee21f88cea72

      SHA1

      cb066afbe562a8e024c2f60c2ca77efb3b1107ce

      SHA256

      f682b6b630d27f15c9c16d5539d1c56bd03646b635162f4ee42f90a09884c124

      SHA512

      83f494cae9714c57eaeafcc477ebb2cdb118f6ed9ea9247443ca6d73e3ac9978383e195385587334d5d1a96084ffb302dfd191a53e47525ba206ad4c1ff4ed14

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\CILB2OEP\lato-v14-latin-italic[1].woff2

      Filesize

      23KB

      MD5

      b45e52f342dc29c8553f51a99f924871

      SHA1

      84ffaa7306ce72dc9dce975454298b91dc4d00be

      SHA256

      88f15027c3aadf50ab39cea089b1f8aa3a18da7c47b30569c1f7489470c05292

      SHA512

      d4eaa02b2b16f047658b14250f1531e1b90f3575bc7a084f06ba772c24e1436be4f223dfe784b0a5956d039ba385f2b7c1697d51c8d3a568d1bc6ebc9c99a726

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\CILB2OEP\lato-v14-latin-regular[1].woff2

      Filesize

      22KB

      MD5

      f1a4a058fbba1e35a406188ae7eddaf8

      SHA1

      e5e25503a9a6976e3ac4b1893a767c8a7a72eba0

      SHA256

      1670565574aab8aa0a287a4cd8f49cf0d8b0959ebe344f90ca8af696ede9c23b

      SHA512

      c0f3138f59034f26f89a7bee8a3a0af749c4dd119997ca121121ff19a35e690098ddd6e4d022d86a81783837fea39aa66d47cac1b19127cda5a0b1355714fa75

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\JKE7A3GY\lato-v14-latin-900[1].woff2

      Filesize

      21KB

      MD5

      f2de2c6ec69b0c11f1bc44c5348c2f35

      SHA1

      35380c04729ff2041e192756bea3052e7de2c5d0

      SHA256

      abde463ef27458713d91e9be883fdd389298ef57411b601cab5f66db609c508d

      SHA512

      847a73f219b215d03fac4335720d7be8ed6ec479e4a83d1c2d5e980f3572a54b8d2fff5ff117be6575c3d982c6e20ee01564dfae0290e70576ee0acc2b998259

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\LYOG6IM2\bundle.min[1].js

      Filesize

      111KB

      MD5

      5367c161f00ba356d8b143ede4d78591

      SHA1

      9dbfc6218a65e8dbe0be21eb46081d9d8fe02c65

      SHA256

      9da2294cc3da6275d5b88076abb0cb068f9a7b5a18f62a564ecd3a1caba920c1

      SHA512

      eb1e3d4b05105768ea24b13a4fea5ae5baec71b476175ea27f8b139d9858186c0f011989e10f55aeb7cdbdcbe25b85d532f61d49df79a3259fd9dcd4be860eea

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\LYOG6IM2\lato-v14-latin-700[1].woff2

      Filesize

      22KB

      MD5

      7fbbfd1610770d594aef639cfefdd0b0

      SHA1

      e8e478141c6bea23ed8f1b52b7062eebbafb29f0

      SHA256

      ead13ccfbdea5462c3af37aa6ae04e64ed65a31c33f76e46da5e86ec85c52064

      SHA512

      0b4a872e56961cdd20208fd631dc45175fb7b0475c2047a9df9297be87dd050cd980fbb170b09a144839c20900456b8837374954cd53efefece7b9fe05b2ddbd

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\LYOG6IM2\main[1].css

      Filesize

      543KB

      MD5

      35734e32bdc368e334783651eb578de5

      SHA1

      1440e6752807f2a1579d66485a90479d704907e6

      SHA256

      b6289cded72f192a300ff93332b5671d754c4bf98aa326e9f180b3f2d2347b88

      SHA512

      27c9514a4c2f5f9f60eb80f79d2aae8137ae7a9d9e65803bc36daed3e4c747d1e53bc4b3f29dbc798044f8572acdb8193724018d6643e4a2bd3f2c17bd458b75

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\VPH5IKN1\jquery.maskMoney[1].js

      Filesize

      22KB

      MD5

      50ae60d621c698f2993752e5525a7791

      SHA1

      579534d05690d381130410e3caafccc1a4569da1

      SHA256

      526a6d6740bf408dce3e6671745b3cfd5a953c8632faf523dabd38d068087360

      SHA512

      f348d52cc85c769dbe943ef7de58513c5082b1d84060ab94b706b78b9f379a56d00f69207414e20ca0f21e405ac5386ad379ea0702894ae0cbe726f9f8191165

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\VPH5IKN1\lib.min[1].js

      Filesize

      124KB

      MD5

      207451926a991de4adc16e6c64aab430

      SHA1

      60cb4c06d1714eab643a99a56fbb890a1aba421f

      SHA256

      0451ab174857156c1abb1a91baa9c569591defd2ca5a20fc4f8f78f4f6b1320e

      SHA512

      50f2f4a8d717cd4c13dc88611112d91079cf6b3d59e449bae7bcad0dca019070e1bf6b6849c2de072b9b6db496e0a7c7a43fce2d668d8e36c0bfbb57f0c5d15d

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\8AWOIRYS\favicon[1].ico

      Filesize

      5KB

      MD5

      9a3fe3a8b81bbf459c98753295394945

      SHA1

      0549a475c5fce345669877802f80eeffadfa6fff

      SHA256

      f5392ebf26bc5e9599340a9e5cef6644629b2b43bdbeb5c03e8382aaab7ef165

      SHA512

      1e4978397370430859b3c3c8f18015ec040fa8f1e15ea5086ffba069bacd537255c7ec9409117a2a27fd401c6b90a27f586183360680915dbed75cdf57a430ec

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\HZ6Q90KN\sNGgws[1].png

      Filesize

      2KB

      MD5

      9f1421643d651ffbe419cc07534ae63f

      SHA1

      51ee1eaa853ee699c0499df5b227b294f46dfd62

      SHA256

      7a71b0515807f3b7f2a7067bbf2e369e61e708257c931f5a17aceaf551be8b8d

      SHA512

      b636516921f72eb5c709f5e20f9f5006927c3cf1b4bd125b8fdad4f7bea43ee7b5c5d4fccc956d403662af10c22b70e9192ac1f9da107a47158f9c5b6f797538

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      4KB

      MD5

      1bfe591a4fe3d91b03cdf26eaacd8f89

      SHA1

      719c37c320f518ac168c86723724891950911cea

      SHA256

      9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

      SHA512

      02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\VPH5IKN1\Windows 12 exe[1].zip

      Filesize

      92KB

      MD5

      3e5c9c0c799fa1b684050222686d0142

      SHA1

      28500d34a07cb1d71dd1bb7949ea21e696b8a001

      SHA256

      402c80e8550c9d7c9494e07ff9d8ea3e0217a6435425612510e0dcad66b99cd8

      SHA512

      c425c6ad75412b41c3e30cc002232181018ee6bd7dee96cecdcce3ade2fe5175640f3c94dd7a119983e8c920329f5f9f21173264d518c623bb829adfffbb8c75

    • memory/428-649-0x000001EB83AF0000-0x000001EB83B00000-memory.dmp

      Filesize

      64KB

    • memory/428-135-0x000001EB94FF0000-0x000001EB94FF2000-memory.dmp

      Filesize

      8KB

    • memory/428-86-0x000001EB94220000-0x000001EB94222000-memory.dmp

      Filesize

      8KB

    • memory/428-141-0x000001EB95390000-0x000001EB95392000-memory.dmp

      Filesize

      8KB

    • memory/428-88-0x000001EB942E0000-0x000001EB942E2000-memory.dmp

      Filesize

      8KB

    • memory/428-84-0x000001EB83EB0000-0x000001EB83EB2000-memory.dmp

      Filesize

      8KB

    • memory/428-121-0x000001EB960E0000-0x000001EB96100000-memory.dmp

      Filesize

      128KB

    • memory/428-467-0x000001EB97F00000-0x000001EB98000000-memory.dmp

      Filesize

      1024KB

    • memory/428-468-0x000001EB97F00000-0x000001EB98000000-memory.dmp

      Filesize

      1024KB

    • memory/428-133-0x000001EB94FB0000-0x000001EB94FB2000-memory.dmp

      Filesize

      8KB

    • memory/428-143-0x000001EB95A30000-0x000001EB95A32000-memory.dmp

      Filesize

      8KB

    • memory/428-137-0x000001EB95150000-0x000001EB95152000-memory.dmp

      Filesize

      8KB

    • memory/428-139-0x000001EB95380000-0x000001EB95382000-memory.dmp

      Filesize

      8KB

    • memory/428-131-0x000001EB94FA0000-0x000001EB94FA2000-memory.dmp

      Filesize

      8KB

    • memory/428-651-0x000001EB83AF0000-0x000001EB83B00000-memory.dmp

      Filesize

      64KB

    • memory/428-650-0x000001EB97090000-0x000001EB97092000-memory.dmp

      Filesize

      8KB

    • memory/428-129-0x000001EB94D70000-0x000001EB94D72000-memory.dmp

      Filesize

      8KB

    • memory/428-648-0x000001EB97080000-0x000001EB97082000-memory.dmp

      Filesize

      8KB

    • memory/1012-254-0x000001BBFDB30000-0x000001BBFDB50000-memory.dmp

      Filesize

      128KB

    • memory/1012-251-0x000001BBFDA30000-0x000001BBFDA50000-memory.dmp

      Filesize

      128KB

    • memory/1012-246-0x000001BBFD7A0000-0x000001BBFD7C0000-memory.dmp

      Filesize

      128KB

    • memory/1196-44-0x000001B270D80000-0x000001B270E80000-memory.dmp

      Filesize

      1024KB

    • memory/1196-42-0x000001B270D80000-0x000001B270E80000-memory.dmp

      Filesize

      1024KB

    • memory/4020-1-0x000001C686930000-0x000001C686940000-memory.dmp

      Filesize

      64KB

    • memory/4020-195-0x000001C68D1D0000-0x000001C68D1D1000-memory.dmp

      Filesize

      4KB

    • memory/4020-194-0x000001C68D1C0000-0x000001C68D1C1000-memory.dmp

      Filesize

      4KB

    • memory/4020-35-0x000001C68AC00000-0x000001C68AC02000-memory.dmp

      Filesize

      8KB

    • memory/4020-16-0x000001C686A20000-0x000001C686A30000-memory.dmp

      Filesize

      64KB