Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-09-2024 09:49

General

  • Target

    https://discord.com/channels/@me/1289523755806232586

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://discord.com/channels/@me/1289523755806232586"
    1⤵
      PID:3328
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2696
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3348
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1704
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5096
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4160
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:1072

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\MN8SE7I1\favicon[1].png

      Filesize

      7KB

      MD5

      9e3fe8db4c9f34d785a3064c7123a480

      SHA1

      0f77f9aa982c19665c642fa9b56b9b20c44983b6

      SHA256

      4d755ac02a070a1b4bb1b6f1c88ab493440109a8ac1e314aaced92f94cdc98e9

      SHA512

      20d8b416bd34f3d80a77305c6fcd597e9c2d92ab1db3f46ec5ac84f5cc6fb55dfcdccd03ffdc5d5de146d0add6d19064662ac3c83a852f3be8b8f650998828d1

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\YWCI917P\favicon[1].ico

      Filesize

      23KB

      MD5

      ec2c34cadd4b5f4594415127380a85e6

      SHA1

      e7e129270da0153510ef04a148d08702b980b679

      SHA256

      128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7

      SHA512

      c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\sbxdpz5\imagestore.dat

      Filesize

      41KB

      MD5

      2a42ee0fa9e41240f3a999dfb17a4000

      SHA1

      7c8d6c5540002526275cb3d19a200fedb2b39f27

      SHA256

      8dd6f1f3246353821dbb229f7698da2b1b458b5805b7addd9d6146d719e2bd62

      SHA512

      bd2f80519ea3e2a9bd9993509608ab07f6c9ed8773b72d95b8544b820e49a664d16bf482a77b1887a9364f3e60d521727f42d51a33b106f2bc28723dc55c4400

    • memory/2696-0-0x0000019C6EC20000-0x0000019C6EC30000-memory.dmp

      Filesize

      64KB

    • memory/2696-35-0x0000019C6C1C0000-0x0000019C6C1C2000-memory.dmp

      Filesize

      8KB

    • memory/2696-319-0x0000019C6C1B0000-0x0000019C6C1B1000-memory.dmp

      Filesize

      4KB

    • memory/2696-315-0x0000019C6DDF0000-0x0000019C6DDF1000-memory.dmp

      Filesize

      4KB

    • memory/2696-16-0x0000019C6ED20000-0x0000019C6ED30000-memory.dmp

      Filesize

      64KB

    • memory/2696-312-0x0000019C732E0000-0x0000019C732E2000-memory.dmp

      Filesize

      8KB

    • memory/2696-131-0x0000019C75BA0000-0x0000019C75BA1000-memory.dmp

      Filesize

      4KB

    • memory/2696-132-0x0000019C75BB0000-0x0000019C75BB1000-memory.dmp

      Filesize

      4KB

    • memory/4160-72-0x000001DC70C60000-0x000001DC70C62000-memory.dmp

      Filesize

      8KB

    • memory/4160-245-0x000001D411150000-0x000001D411152000-memory.dmp

      Filesize

      8KB

    • memory/4160-247-0x000001D411170000-0x000001D411172000-memory.dmp

      Filesize

      8KB

    • memory/4160-251-0x000001D4112B0000-0x000001D4112B2000-memory.dmp

      Filesize

      8KB

    • memory/4160-261-0x000001DC71100000-0x000001DC71200000-memory.dmp

      Filesize

      1024KB

    • memory/4160-182-0x000001D400200000-0x000001D400300000-memory.dmp

      Filesize

      1024KB

    • memory/4160-76-0x000001DC712C0000-0x000001DC712C2000-memory.dmp

      Filesize

      8KB

    • memory/4160-74-0x000001DC70C80000-0x000001DC70C82000-memory.dmp

      Filesize

      8KB

    • memory/4160-61-0x000001DC70200000-0x000001DC70300000-memory.dmp

      Filesize

      1024KB

    • memory/5096-45-0x0000024780B00000-0x0000024780C00000-memory.dmp

      Filesize

      1024KB