Resubmissions

13-10-2024 22:09

241013-12yp3a1epg 8

23-09-2024 20:35

240923-zc965azepm 3

23-09-2024 20:33

240923-zb633szenn 3

23-09-2024 20:28

240923-y81f5atdmc 10

23-09-2024 20:27

240923-y8sraatdlg 3

23-09-2024 20:27

240923-y8jtdatdlb 3

23-09-2024 20:26

240923-y8b4jazekn 3

23-09-2024 20:22

240923-y51mqazdpr 8

23-09-2024 20:22

240923-y5sbcatcph 4

Analysis

  • max time kernel
    600s
  • max time network
    400s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-de
  • resource tags

    arch:x64arch:x86image:win10-20240611-delocale:de-deos:windows10-1703-x64systemwindows
  • submitted
    23-09-2024 20:22

General

  • Target

    sample.html

  • Size

    12KB

  • MD5

    0b12663e5ae87a93a8726d938ef5bbf8

  • SHA1

    b53628d0d6db63fc3628146e901fa2ddca94b46d

  • SHA256

    6643f151aed8a65e60aafdd8ed1df99f4142b3cf4ac8f4f2ef41eb88070b13d8

  • SHA512

    9c3d34c587154bad94db1e4084f90f4d6415b7d8869293b74ab1cafb70021a12463fd1f1909ac06ed7407b062fcad33212769f018710081c9729417c59bb7f70

  • SSDEEP

    192:/NX6Gj50qTgymlrU4yD8Idlueh0ng61u+NmRmE5lw23WXX:/mzlrUhD8Idlu2SgT5u2w

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "C:\Users\Admin\AppData\Local\Temp\sample.html"
    1⤵
      PID:2332
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5036
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:164
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4612
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:924
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4364
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4308
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
        PID:2236

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZVQ9VIUB\edgecompatviewlist[1].xml

        Filesize

        74KB

        MD5

        d4fc49dc14f63895d997fa4940f24378

        SHA1

        3efb1437a7c5e46034147cbbc8db017c69d02c31

        SHA256

        853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

        SHA512

        cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\FOBUYHE2\suggestions[1].de-DE

        Filesize

        18KB

        MD5

        cc5361b5fdccfc6830217e2eb9972dd8

        SHA1

        e4a1206d9190eccea3e6a116c954d11da0aeba66

        SHA256

        afd57b0b6d8166e25bbef7cbc97522677c11c9a930fd4d4a204d1b7ae6258492

        SHA512

        ef63961bd7f0d3357d352a8f9c8ea57d0271e0fb664b1be179c38cd2d559bbaa4864f64f3521f26f868cc074f97994e2658c6d652021a39dc5207d45411691bc

      • memory/924-43-0x000001D497E00000-0x000001D497F00000-memory.dmp

        Filesize

        1024KB

      • memory/924-42-0x000001D497E00000-0x000001D497F00000-memory.dmp

        Filesize

        1024KB

      • memory/4364-66-0x000001A8208E0000-0x000001A8208E2000-memory.dmp

        Filesize

        8KB

      • memory/4364-52-0x000001A80FF10000-0x000001A810010000-memory.dmp

        Filesize

        1024KB

      • memory/4364-58-0x000001A8206D0000-0x000001A8206D2000-memory.dmp

        Filesize

        8KB

      • memory/4364-68-0x000001A820900000-0x000001A820902000-memory.dmp

        Filesize

        8KB

      • memory/4364-64-0x000001A820820000-0x000001A820822000-memory.dmp

        Filesize

        8KB

      • memory/4364-62-0x000001A820800000-0x000001A820802000-memory.dmp

        Filesize

        8KB

      • memory/4364-60-0x000001A8206E0000-0x000001A8206E2000-memory.dmp

        Filesize

        8KB

      • memory/4364-56-0x000001A80FCE0000-0x000001A80FCE2000-memory.dmp

        Filesize

        8KB

      • memory/5036-16-0x000002307A020000-0x000002307A030000-memory.dmp

        Filesize

        64KB

      • memory/5036-35-0x00000230775C0000-0x00000230775C2000-memory.dmp

        Filesize

        8KB

      • memory/5036-110-0x0000023002900000-0x0000023002901000-memory.dmp

        Filesize

        4KB

      • memory/5036-111-0x0000023002910000-0x0000023002911000-memory.dmp

        Filesize

        4KB

      • memory/5036-0-0x0000023079F20000-0x0000023079F30000-memory.dmp

        Filesize

        64KB