Analysis

  • max time kernel
    600s
  • max time network
    377s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/09/2024, 21:34

General

  • Target

    bin/Monaco/index.html

  • Size

    164KB

  • MD5

    0f76256876f7c781074734134b53d080

  • SHA1

    5d279e84c67a40c59f8a93ee0ca7071bb7518042

  • SHA256

    5b28a84344bae9286b83f9ac8e1c16185a8b9608d8801b2389b12ceff0614ef5

  • SHA512

    0b589afa314e70c98d2116c70d2af4f8e329dde743810e04c9af0f7448214ccc7c9a86ef498639ae33c3a77903a35be08db9ca264aff4caa57e5398ac6f230d7

  • SSDEEP

    3072:gKl34J09UmmJv8kBpZaFD48VOAGUWYPjDZlLJbRBiPEP8yKUz2Ojmjr8zM3KP7pJ:d4J09BA3pZaFD48VOAGUWYPjdlLJbRB1

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "C:\Users\Admin\AppData\Local\Temp\bin\Monaco\index.html"
    1⤵
      PID:2468
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:764
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:824
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4444
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5108
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4564
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:1048

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VSH5XF98\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\W2KFHKAT\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • memory/764-16-0x0000027DCF120000-0x0000027DCF130000-memory.dmp

      Filesize

      64KB

    • memory/764-0-0x0000027DCF020000-0x0000027DCF030000-memory.dmp

      Filesize

      64KB

    • memory/764-35-0x0000027DCE290000-0x0000027DCE292000-memory.dmp

      Filesize

      8KB

    • memory/4564-245-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-251-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-58-0x000001FF9C4A0000-0x000001FF9C4A2000-memory.dmp

      Filesize

      8KB

    • memory/4564-56-0x000001FF9C3E0000-0x000001FF9C3E2000-memory.dmp

      Filesize

      8KB

    • memory/4564-62-0x000001FF9E910000-0x000001FF9EA10000-memory.dmp

      Filesize

      1024KB

    • memory/4564-204-0x000001FF9FB00000-0x000001FF9FC00000-memory.dmp

      Filesize

      1024KB

    • memory/4564-214-0x000001FF9FC00000-0x000001FF9FD00000-memory.dmp

      Filesize

      1024KB

    • memory/4564-203-0x000001FF9E510000-0x000001FF9E530000-memory.dmp

      Filesize

      128KB

    • memory/4564-242-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-243-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-244-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-50-0x000001FF8C240000-0x000001FF8C340000-memory.dmp

      Filesize

      1024KB

    • memory/4564-246-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-53-0x000001FF9C3B0000-0x000001FF9C3B2000-memory.dmp

      Filesize

      8KB

    • memory/4564-259-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-258-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-257-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-256-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-255-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-254-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-253-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-252-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-250-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-249-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-248-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/4564-247-0x000001FF9C3C0000-0x000001FF9C3D0000-memory.dmp

      Filesize

      64KB

    • memory/5108-45-0x0000024BAC440000-0x0000024BAC540000-memory.dmp

      Filesize

      1024KB

    • memory/5108-47-0x0000024BAC440000-0x0000024BAC540000-memory.dmp

      Filesize

      1024KB