Resubmissions

28/09/2024, 17:49

240928-wd2pla1cre 4

28/09/2024, 17:48

240928-wdn4ha1cph 4

28/09/2024, 17:47

240928-wcyasayapr 6

28/09/2024, 17:47

240928-wct85ayapp 1

28/09/2024, 17:46

240928-wcpnms1cma 1

28/09/2024, 17:46

240928-wck1fs1cld 1

28/09/2024, 17:46

240928-wca59ayanj 1

28/09/2024, 17:45

240928-wb28cayalq 1

28/09/2024, 17:45

240928-wbt7qs1cjc 1

Analysis

  • max time kernel
    21s
  • max time network
    22s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/09/2024, 17:48

Errors

Reason
Machine shutdown

General

  • Target

    redirect.html

  • Size

    6KB

  • MD5

    6128e2da322af8a3562db916755b2bfd

  • SHA1

    eec78e14b2cb67c03f760faa021a2910347b37f4

  • SHA256

    3e69556870577730f7ab51f65b03e99cba32a0cd9edda179135a59c11a1ef9eb

  • SHA512

    8b12e9cbaa28bc2260fa6fe6a921b21c2ac597794d68dc137d057eadad2c3c46ebfd8f0ef468a7150bc0d85645cfdf0cfe461464b54be7ef5cdaa4c416b4bd37

  • SSDEEP

    192:dTHLxX7777/77QF7LyrN0Lod4BYCIkaOQX26:dTr5HY40+CIkaOQXL

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "C:\Users\Admin\AppData\Local\Temp\redirect.html"
    1⤵
      PID:3168
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:788
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2428
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:856
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5040
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2960
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:768
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0 /state0:0xa3afc855 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:820
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
        PID:4216
      • C:\Windows\system32\browser_broker.exe
        C:\Windows\system32\browser_broker.exe -Embedding
        1⤵
          PID:3000

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!121\Microsoft\Windows\3720402701\1568373884.pri

          Filesize

          218KB

          MD5

          13e8857c11c103c86af5a010ba171f66

          SHA1

          dd8f6ee3cd8b1ac01c480e0843c323805c3cf2ae

          SHA256

          8b69fd5d6b540b3080b438f3cf0d42f3266654e786ce7dc5e85855d309e962ac

          SHA512

          8454d4a02c15e12428628aaf9df2f5ec48d261e692a8b4f2e7e81d83c3acd6921bfb2d3ebc76f78f124fd0065852af348bec56a91e7ba9c54525615d6b7804b0

        • memory/768-62-0x0000021F7E780000-0x0000021F7E782000-memory.dmp

          Filesize

          8KB

        • memory/768-76-0x0000021F7E8C0000-0x0000021F7E8C2000-memory.dmp

          Filesize

          8KB

        • memory/768-68-0x0000021F7E840000-0x0000021F7E842000-memory.dmp

          Filesize

          8KB

        • memory/768-66-0x0000021F7E830000-0x0000021F7E832000-memory.dmp

          Filesize

          8KB

        • memory/768-72-0x0000021F7E880000-0x0000021F7E882000-memory.dmp

          Filesize

          8KB

        • memory/768-74-0x0000021F7E8A0000-0x0000021F7E8A2000-memory.dmp

          Filesize

          8KB

        • memory/768-59-0x0000021F7DE00000-0x0000021F7DF00000-memory.dmp

          Filesize

          1024KB

        • memory/768-58-0x0000021F7DE00000-0x0000021F7DF00000-memory.dmp

          Filesize

          1024KB

        • memory/768-70-0x0000021F7E860000-0x0000021F7E862000-memory.dmp

          Filesize

          8KB

        • memory/768-64-0x0000021F7E7A0000-0x0000021F7E7A2000-memory.dmp

          Filesize

          8KB

        • memory/768-57-0x0000021F7DE00000-0x0000021F7DF00000-memory.dmp

          Filesize

          1024KB

        • memory/788-16-0x0000022F16D20000-0x0000022F16D30000-memory.dmp

          Filesize

          64KB

        • memory/788-35-0x0000022F14290000-0x0000022F14292000-memory.dmp

          Filesize

          8KB

        • memory/788-0-0x0000022F16C20000-0x0000022F16C30000-memory.dmp

          Filesize

          64KB

        • memory/2960-50-0x0000019863310000-0x0000019863410000-memory.dmp

          Filesize

          1024KB

        • memory/2960-52-0x0000019863310000-0x0000019863410000-memory.dmp

          Filesize

          1024KB

        • memory/2960-51-0x0000019863310000-0x0000019863410000-memory.dmp

          Filesize

          1024KB

        • memory/5040-44-0x000001BE48E40000-0x000001BE48F40000-memory.dmp

          Filesize

          1024KB