Analysis

  • max time kernel
    1050s
  • max time network
    1055s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-09-2024 13:53

General

  • Target

    http://robloxhackers.lol

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://robloxhackers.lol"
    1⤵
      PID:2448
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1216
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:216
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1532
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3636
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4944
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4368
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4608
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:3720
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2912
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4464
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:5100

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V28C7N3J\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\3KQ2OLTV\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\7U52YU9W\favicon[1].ico

      Filesize

      106KB

      MD5

      e09ab9cf9d100a03956b9f8cff022440

      SHA1

      99968d88279b823f2f698cc67c549fa97fb0c104

      SHA256

      49d86395fb3cb4e16dd7a25e8395523d64920828d9267b6f13ac5b9ae3ec9646

      SHA512

      e462d93dde386b192a1d32735cf64ae2ab0075f51fa1005c7d38e5a67fdb059b7b8b37f2c24a165b8f180d618092a5dbcb7b16064b4e41f8998aa12edadd957c

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\kszaykz\imagestore.dat

      Filesize

      116KB

      MD5

      134dd86987f1cdbb8afc0cfc2deb843d

      SHA1

      b97c7ae91ba011e38b80b548f99cc1f4c5458551

      SHA256

      d8a7562e2335f0a4a656692a4736f7037d2f4085434a154af70128da5e7f118f

      SHA512

      71336aaf31b4e7ca1c555e6751f5f16bd7ba4efa2f7eedfffa144f6f3326c9ec7eb27b40acad75059b947411bb498dd99cc765ed47ff9674140bd8286daf6460

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\ZITQP3PH\api[1].js

      Filesize

      46KB

      MD5

      d7bb07b6ecd6fb1a2e123203006c33ba

      SHA1

      09cc76938fa366e40992880ff94accd8be0c6640

      SHA256

      8eae5159c56bf66c17e0cb002b25fc2e343f3e009dc2a39a7e230f08b7b8c672

      SHA512

      d87c6b675ef3f260cc86bd130f91a08f5d07d301f2a7b14778c5ccf42bf0d605957ff653ca53c57203a85aadff5f66f3514342a35dfaa581fbaf57fc3b72d722

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

      Filesize

      1KB

      MD5

      7fb5fa1534dcf77f2125b2403b30a0ee

      SHA1

      365d96812a69ac0a4611ea4b70a3f306576cc3ea

      SHA256

      33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

      SHA512

      a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

      Filesize

      436B

      MD5

      971c514f84bba0785f80aa1c23edfd79

      SHA1

      732acea710a87530c6b08ecdf32a110d254a54c8

      SHA256

      f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

      SHA512

      43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

      Filesize

      174B

      MD5

      8c0a68c25d789fb23b37035392058eee

      SHA1

      1357d296e615a99fb056abebf70a01414f0aca55

      SHA256

      0e25a692da03a5e2b048df85e4dcbb2a3dbce9bb7ec0188b0869b881cfd71854

      SHA512

      4b29e6e68e248038d1c30579243b22dc3d32e800b46a90ac0f6d3e60545e321a917a97e43101bab067f42dc5f2e2c0a74e7468176b857edba74ae4c5197a558f

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

      Filesize

      170B

      MD5

      b8ba842fc72ebd2e907512048e6ced03

      SHA1

      08ed70a725aada47554c2ed5156f2cf66272e548

      SHA256

      cd0200294cea8180dea15bd8e47a7b5f1d726f3514891ac7c26e35165bfaecbe

      SHA512

      c1396ae576531bef19428e090a289cb602d60baf2962bff51dba082298f7edcee8068b3d944aef5ed1eaf811259d1affd13ed9a2c7a2619e2a7184e558723614

    • memory/1216-188-0x000002137AB70000-0x000002137AB71000-memory.dmp

      Filesize

      4KB

    • memory/1216-35-0x0000021372E50000-0x0000021372E52000-memory.dmp

      Filesize

      8KB

    • memory/1216-0-0x0000021373C20000-0x0000021373C30000-memory.dmp

      Filesize

      64KB

    • memory/1216-187-0x000002137AB60000-0x000002137AB61000-memory.dmp

      Filesize

      4KB

    • memory/1216-16-0x0000021373D20000-0x0000021373D30000-memory.dmp

      Filesize

      64KB

    • memory/2912-953-0x00000179F19E0000-0x00000179F1A00000-memory.dmp

      Filesize

      128KB

    • memory/2912-950-0x00000179F19E0000-0x00000179F1A00000-memory.dmp

      Filesize

      128KB

    • memory/2912-943-0x00000179F1300000-0x00000179F1400000-memory.dmp

      Filesize

      1024KB

    • memory/2912-933-0x00000179F1A00000-0x00000179F1A20000-memory.dmp

      Filesize

      128KB

    • memory/2912-515-0x00000179F1960000-0x00000179F1980000-memory.dmp

      Filesize

      128KB

    • memory/2912-483-0x00000179F0C70000-0x00000179F0C90000-memory.dmp

      Filesize

      128KB

    • memory/2912-482-0x00000179F1300000-0x00000179F1400000-memory.dmp

      Filesize

      1024KB

    • memory/3636-44-0x000001CF9F040000-0x000001CF9F140000-memory.dmp

      Filesize

      1024KB

    • memory/3636-45-0x000001CF9F040000-0x000001CF9F140000-memory.dmp

      Filesize

      1024KB

    • memory/4464-519-0x000002203A760000-0x000002203A780000-memory.dmp

      Filesize

      128KB

    • memory/4464-662-0x000002204BE90000-0x000002204BF90000-memory.dmp

      Filesize

      1024KB

    • memory/4944-59-0x000001B29BDB0000-0x000001B29BDD0000-memory.dmp

      Filesize

      128KB

    • memory/4944-66-0x000001B2ACB10000-0x000001B2ACB12000-memory.dmp

      Filesize

      8KB

    • memory/4944-64-0x000001B2AC950000-0x000001B2AC952000-memory.dmp

      Filesize

      8KB

    • memory/4944-81-0x000001B2ACB90000-0x000001B2ACBB0000-memory.dmp

      Filesize

      128KB

    • memory/4944-62-0x000001B2AC930000-0x000001B2AC932000-memory.dmp

      Filesize

      8KB

    • memory/4944-58-0x000001B29C500000-0x000001B29C600000-memory.dmp

      Filesize

      1024KB

    • memory/4944-112-0x000001B2AE240000-0x000001B2AE242000-memory.dmp

      Filesize

      8KB

    • memory/4944-92-0x000001B2AD8A0000-0x000001B2AD8A2000-memory.dmp

      Filesize

      8KB

    • memory/4944-94-0x000001B2AD8C0000-0x000001B2AD8C2000-memory.dmp

      Filesize

      8KB

    • memory/4944-90-0x000001B2AD050000-0x000001B2AD052000-memory.dmp

      Filesize

      8KB