Analysis

  • max time kernel
    134s
  • max time network
    140s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/09/2024, 16:06

General

  • Target

    https://1drv.ms/w/c/4586d06eada9c98e/IQTpNI3ZE23OTbzl5TSldnaBAWwj7d5jkJMWUkn_oNzo8Rg

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://1drv.ms/w/c/4586d06eada9c98e/IQTpNI3ZE23OTbzl5TSldnaBAWwj7d5jkJMWUkn_oNzo8Rg"
    1⤵
      PID:3108
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2232
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:520
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3212
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4296
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4996
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3272
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3224
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2324
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4100

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XCFODRP5\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\YGWDMITP\manifest[1].js

      Filesize

      5KB

      MD5

      1f3807e1e0946c422e895d7ca39e167c

      SHA1

      648909314a936f48ea78202dde9716d024e31d10

      SHA256

      d5771afbe779793b38ee56d9e1f3a900885b7eaa01bf7053e428baba234a7f5d

      SHA512

      d7cfa475dbc95ba152ea5f7f222f631c1b04110bcfbc556a33168f419ed7021221c309c41e967cd68851cdde6d4518e1fdbd2a08cb15f3e92dc3c022fc84ab4e

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\0GGEKH6P\onedrive.live[1].xml

      Filesize

      13B

      MD5

      c1ddea3ef6bbef3e7060a1a9ad89e4c5

      SHA1

      35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

      SHA256

      b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

      SHA512

      6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\DOMStore\FVGTYBG7\www.bing[1].xml

      Filesize

      1KB

      MD5

      e978d7e77286b662c5a96addb5cd2185

      SHA1

      596491da8589a0494ad931de48865532d36bd4d8

      SHA256

      84f8bbeed720222aa2f5686d6970e6d78199f062e97685db2a25667b19a3cc25

      SHA512

      f5f9628a56ca673f22cb79cde1ca0a105c3e9169420afede7b78b3ed7d2f5e67145b9988d07b2a3e6e2789fdbc16f284141014a9c600898972554f998b4ac0e1

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      4KB

      MD5

      1bfe591a4fe3d91b03cdf26eaacd8f89

      SHA1

      719c37c320f518ac168c86723724891950911cea

      SHA256

      9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

      SHA512

      02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\P25NBSGP\FavIcon_Word[1].ico

      Filesize

      7KB

      MD5

      760f69985c44556f90d31cdb278286be

      SHA1

      98632d39e3ca24fdd974ac98bf187963a065ce8a

      SHA256

      4fbd8cc4075e1795215327af5e43e8ca3339677802700d19aefc57ba1713a12d

      SHA512

      8a36d389ed4d868ecb3ce6ac282fccf8c3fa4d969d1475b350ade63bd56d33b8004bf0b89b2d9cd4831d3b1f11dc6ce1f4f3f526f5d99b235d458bb4bd910759

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\SWI8KNW7\favicon[1].ico

      Filesize

      7KB

      MD5

      604adfb53677b5ca4f910ffb131b3e7c

      SHA1

      5f1a0fb4e4ad3707e591ce16352158263488ed70

      SHA256

      24638331466a52bb66f912090e7a9cc9e3df2236e39c187c9409104526b472b0

      SHA512

      35f618f42adfee6d1335c67f729c298789419fe2930371a91683f60481794488dfaf15b572e6fc1be70833ef12dfe57432725f6336b6b73dcfb52596f57f30a5

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\SWI8KNW7\favicon[2].ico

      Filesize

      758B

      MD5

      84cc977d0eb148166481b01d8418e375

      SHA1

      00e2461bcd67d7ba511db230415000aefbd30d2d

      SHA256

      bbf8da37d92138cc08ffeec8e3379c334988d5ae99f4415579999bfbbb57a66c

      SHA512

      f47a507077f9173fb07ec200c2677ba5f783d645be100f12efe71f701a74272a98e853c4fab63740d685853935d545730992d0004c9d2fe8e1965445cab509c3

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\o3kjd4r\imagestore.dat

      Filesize

      25KB

      MD5

      e6550df722d750b3a90b935b8e034709

      SHA1

      289ac0fd941297b10f17aa0a5ae79ff39aef6d1a

      SHA256

      2b35bd779d6d546f8a4a2f7079583a780c3b29230c15a389d39cb5e0af410e4f

      SHA512

      e852ac8b2326cbd008d6b719bb736a5fa184aa74a3f46be7c4434a9cd9c379f6a27257abf018b5cfbfa7ea9a6099710cba254f958643b834d2527bb557f97877

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFB2AF39E1AAF27A5F.TMP

      Filesize

      20KB

      MD5

      d223bb16955f4075f0cc4a3fc926472f

      SHA1

      b98d6b700b447886ce4cc912dc767aa3d42d2da6

      SHA256

      02dbd0d9193cf1f2f40a0a597aae0469d4cef5291eed9ecdb75ae032ce8bb210

      SHA512

      be21cf45b43014b4c1287752e1402465a81ea20bcef9418c7b51795744efa0166b227f97e1f83f56f3ec8203ffef038c06ee426b07717c22b56c4aaa82bd6adf

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

      Filesize

      471B

      MD5

      d11a564f92ffe2d43c35ec2946a29546

      SHA1

      0779c8baa0e1bdf76424db75a71e52cbf22db2fc

      SHA256

      d156b4c63f6fdad0ba2b7f1b71b21764f1cb12f67cc3617a5b541e71af572f86

      SHA512

      14b288fda8320c3938559518b7a7708d1b0fa7fe70cbd3b41977b4bae945ae744cf6cc8685cbf8ec574941b2d5ea3a4fc236afb84f19705dc6650d1e80b12939

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

      Filesize

      412B

      MD5

      16a5362a233815b3d1aa620be24bd571

      SHA1

      c7c3b991e8e3200d4acc86d8cf230f05e17dbe09

      SHA256

      1a5290debb2466dc16d03f1060bb1076909d3900080fed6e3b5f331912928093

      SHA512

      418e08ce0b28ba44e434e95d812a188303330ec1b799ff4cec93d4255feae9754bf1970eda40eb044237486705d6a37b143aa1b317a45dd0d71c0090ea377c29

    • memory/2232-87-0x0000017435060000-0x0000017435061000-memory.dmp

      Filesize

      4KB

    • memory/2232-88-0x0000017435070000-0x0000017435071000-memory.dmp

      Filesize

      4KB

    • memory/2232-639-0x000001742B530000-0x000001742B531000-memory.dmp

      Filesize

      4KB

    • memory/2232-635-0x000001742B700000-0x000001742B701000-memory.dmp

      Filesize

      4KB

    • memory/2232-632-0x000001742B740000-0x000001742B742000-memory.dmp

      Filesize

      8KB

    • memory/2232-35-0x000001742B5D0000-0x000001742B5D2000-memory.dmp

      Filesize

      8KB

    • memory/2232-0-0x000001742E320000-0x000001742E330000-memory.dmp

      Filesize

      64KB

    • memory/2232-16-0x000001742E420000-0x000001742E430000-memory.dmp

      Filesize

      64KB

    • memory/3224-559-0x00000220C73E0000-0x00000220C73E2000-memory.dmp

      Filesize

      8KB

    • memory/3224-556-0x00000220B64E0000-0x00000220B65E0000-memory.dmp

      Filesize

      1024KB

    • memory/3224-561-0x00000220C7400000-0x00000220C7402000-memory.dmp

      Filesize

      8KB

    • memory/3272-446-0x0000027FB60E0000-0x0000027FB6100000-memory.dmp

      Filesize

      128KB

    • memory/3272-512-0x0000027FB7660000-0x0000027FB7680000-memory.dmp

      Filesize

      128KB

    • memory/3272-389-0x0000027FA5820000-0x0000027FA5840000-memory.dmp

      Filesize

      128KB

    • memory/3272-399-0x0000027FC65C0000-0x0000027FC66C0000-memory.dmp

      Filesize

      1024KB

    • memory/3272-372-0x0000027F95100000-0x0000027F95200000-memory.dmp

      Filesize

      1024KB

    • memory/3272-493-0x0000027FC6880000-0x0000027FC6980000-memory.dmp

      Filesize

      1024KB

    • memory/3272-441-0x0000027FA5EA0000-0x0000027FA5EC0000-memory.dmp

      Filesize

      128KB

    • memory/3272-507-0x0000027FB75E0000-0x0000027FB7600000-memory.dmp

      Filesize

      128KB

    • memory/4296-45-0x0000023B2F5C0000-0x0000023B2F6C0000-memory.dmp

      Filesize

      1024KB

    • memory/4996-332-0x0000023A49630000-0x0000023A49632000-memory.dmp

      Filesize

      8KB

    • memory/4996-68-0x0000023A492D0000-0x0000023A492D2000-memory.dmp

      Filesize

      8KB

    • memory/4996-331-0x0000023A4A300000-0x0000023A4A400000-memory.dmp

      Filesize

      1024KB

    • memory/4996-64-0x0000023A38AF0000-0x0000023A38AF2000-memory.dmp

      Filesize

      8KB

    • memory/4996-66-0x0000023A49210000-0x0000023A49212000-memory.dmp

      Filesize

      8KB

    • memory/4996-330-0x0000023A38D00000-0x0000023A38E00000-memory.dmp

      Filesize

      1024KB