Resubmissions

23-09-2024 07:59

240923-jvnsvazdnq 4

21-09-2024 13:07

240921-qczwqatdjc 10

Analysis

  • max time kernel
    135s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-09-2024 07:59

General

  • Target

    https://cdn.discordapp.com/attachments/1256009606883442768/1286063807256465428/onibye-1.7.2.exe?ex=66efd781&is=66ee8601&hm=738f6adda77c7359d50d8cfcc2eba4c2e011200276b4c324ba552594c969d3af&

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://cdn.discordapp.com/attachments/1256009606883442768/1286063807256465428/onibye-1.7.2.exe?ex=66efd781&is=66ee8601&hm=738f6adda77c7359d50d8cfcc2eba4c2e011200276b4c324ba552594c969d3af&"
    1⤵
      PID:4172
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4076
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:824
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3212
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4208
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:5044
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2576
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2824

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      4KB

      MD5

      1bfe591a4fe3d91b03cdf26eaacd8f89

      SHA1

      719c37c320f518ac168c86723724891950911cea

      SHA256

      9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

      SHA512

      02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\P25NBSGP\favicon[1].ico

      Filesize

      758B

      MD5

      84cc977d0eb148166481b01d8418e375

      SHA1

      00e2461bcd67d7ba511db230415000aefbd30d2d

      SHA256

      bbf8da37d92138cc08ffeec8e3379c334988d5ae99f4415579999bfbbb57a66c

      SHA512

      f47a507077f9173fb07ec200c2677ba5f783d645be100f12efe71f701a74272a98e853c4fab63740d685853935d545730992d0004c9d2fe8e1965445cab509c3

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\SWI8KNW7\favicon[2].png

      Filesize

      7KB

      MD5

      9e3fe8db4c9f34d785a3064c7123a480

      SHA1

      0f77f9aa982c19665c642fa9b56b9b20c44983b6

      SHA256

      4d755ac02a070a1b4bb1b6f1c88ab493440109a8ac1e314aaced92f94cdc98e9

      SHA512

      20d8b416bd34f3d80a77305c6fcd597e9c2d92ab1db3f46ec5ac84f5cc6fb55dfcdccd03ffdc5d5de146d0add6d19064662ac3c83a852f3be8b8f650998828d1

    • memory/2576-142-0x00000211F53A0000-0x00000211F53C0000-memory.dmp

      Filesize

      128KB

    • memory/2576-121-0x00000211F5880000-0x00000211F58A0000-memory.dmp

      Filesize

      128KB

    • memory/2576-111-0x00000211F4980000-0x00000211F49A0000-memory.dmp

      Filesize

      128KB

    • memory/2576-112-0x00000211F5020000-0x00000211F5120000-memory.dmp

      Filesize

      1024KB

    • memory/2824-230-0x00000229A1AF0000-0x00000229A1AF2000-memory.dmp

      Filesize

      8KB

    • memory/2824-228-0x00000229A1AD0000-0x00000229A1AD2000-memory.dmp

      Filesize

      8KB

    • memory/4076-154-0x00000236941F0000-0x00000236941F1000-memory.dmp

      Filesize

      4KB

    • memory/4076-35-0x0000023688EC0000-0x0000023688EC2000-memory.dmp

      Filesize

      8KB

    • memory/4076-323-0x0000023688EB0000-0x0000023688EB1000-memory.dmp

      Filesize

      4KB

    • memory/4076-319-0x0000023688EF0000-0x0000023688EF1000-memory.dmp

      Filesize

      4KB

    • memory/4076-316-0x00000236891C0000-0x00000236891C2000-memory.dmp

      Filesize

      8KB

    • memory/4076-155-0x0000023694A80000-0x0000023694A81000-memory.dmp

      Filesize

      4KB

    • memory/4076-0-0x000002368BC20000-0x000002368BC30000-memory.dmp

      Filesize

      64KB

    • memory/4076-16-0x000002368BD20000-0x000002368BD30000-memory.dmp

      Filesize

      64KB

    • memory/4208-42-0x00000287DFA40000-0x00000287DFB40000-memory.dmp

      Filesize

      1024KB

    • memory/5044-68-0x000001BBDC630000-0x000001BBDC632000-memory.dmp

      Filesize

      8KB

    • memory/5044-58-0x000001BBCC000000-0x000001BBCC100000-memory.dmp

      Filesize

      1024KB

    • memory/5044-61-0x000001BBDC420000-0x000001BBDC422000-memory.dmp

      Filesize

      8KB

    • memory/5044-66-0x000001BBDC610000-0x000001BBDC612000-memory.dmp

      Filesize

      8KB

    • memory/5044-64-0x000001BBDC450000-0x000001BBDC452000-memory.dmp

      Filesize

      8KB