Analysis

  • max time kernel
    26s
  • max time network
    27s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/10/2024, 11:37

Errors

Reason
Machine shutdown

General

  • Target

    https://crystal-launcher.net/

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://crystal-launcher.net/"
    1⤵
      PID:2780
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1512
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4680
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2752
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5004
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1948
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0 /state0:0xa3a81055 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:5076
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
        PID:3392
      • C:\Windows\system32\browser_broker.exe
        C:\Windows\system32\browser_broker.exe -Embedding
        1⤵
          PID:1276

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\MHRBPSRW\style.new[1].css

                Filesize

                11KB

                MD5

                9c8eb05a161c30719f0bb7644f62ae57

                SHA1

                431c84cf4530611b13ef3958c67a65bc9812541a

                SHA256

                d143b214c982c85ff9f2d538dcb463f3bdab033845ddc0bf2d48161b6eca5242

                SHA512

                297cac56f2ce61f8bf7f3d749a5559ba8bc672573882167d454c2cc277a799e978f1dc998cfed25751efdf81ad3e26bc23a68354497fa6a36847db5ae00e6d67

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\YG55PHBM\crystal-launcher[1].xml

                Filesize

                118B

                MD5

                8428f26d0c0111c99a49af1b411fbebd

                SHA1

                0818549547bac6ec00ae4cee45d5dd7c99453675

                SHA256

                205432768b1a00c78fe55d6ad7fbfae67502e39a7248108c6d46705af8ba534e

                SHA512

                e16f7b0adb83be92fe476a260f48903913daff9e36bc6e463bf092efe664f6f83d090255171265f7030f4aed0598849443468182ec2355c8d9fc432dc6069b84

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\YG55PHBM\crystal-launcher[1].xml

                Filesize

                296B

                MD5

                eb8bf446346435302e58034fc473b0c4

                SHA1

                13b9956f678c9c26fc168701b48a092e56bfe529

                SHA256

                acd0a01b7c3a6050f8f5a7ab33a8ad683ab64686f5459affc80c4e44e95bd18b

                SHA512

                ca96f9402334279e3f4291fd232ba3a0a247116839f812de8b305ee9ea38df77ed15461fc30bab21db7a452c38d926449a76f8eeeb7433eb83d69a9e0dd090b7

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\0YGRKPO3\favicon[1].ico

                Filesize

                4KB

                MD5

                2f3af99b5586b4c02c8414982d62dc04

                SHA1

                a42f3dd770d22d4ee02e82ef207394596b114842

                SHA256

                8227d63a9912de6b9ad496891e693d22359b7a68dac31dec64219c68e2986b70

                SHA512

                f6520de23febd804eae01667bfaf5aa77a4586f536dda2006cf8738a2e2c9e068e0d633eb7974057863f87d6a970f18c8ae1df8417064aeb7c6c80f41add67cf

              • memory/1512-0-0x000001F2C4420000-0x000001F2C4430000-memory.dmp

                Filesize

                64KB

              • memory/1512-17-0x000001F2C4530000-0x000001F2C4540000-memory.dmp

                Filesize

                64KB

              • memory/1512-35-0x000001F2C19E0000-0x000001F2C19E2000-memory.dmp

                Filesize

                8KB

              • memory/1512-262-0x000001F2CAFC0000-0x000001F2CAFC1000-memory.dmp

                Filesize

                4KB

              • memory/1512-263-0x000001F2CAFD0000-0x000001F2CAFD1000-memory.dmp

                Filesize

                4KB

              • memory/1948-202-0x0000020AE2500000-0x0000020AE2600000-memory.dmp

                Filesize

                1024KB

              • memory/1948-171-0x0000020AE16F0000-0x0000020AE16F2000-memory.dmp

                Filesize

                8KB

              • memory/1948-164-0x0000020ADF9C0000-0x0000020ADF9C2000-memory.dmp

                Filesize

                8KB

              • memory/1948-179-0x0000020AE1AD0000-0x0000020AE1AD2000-memory.dmp

                Filesize

                8KB

              • memory/1948-203-0x0000020AE2500000-0x0000020AE2600000-memory.dmp

                Filesize

                1024KB

              • memory/1948-91-0x0000020ADE400000-0x0000020ADE500000-memory.dmp

                Filesize

                1024KB

              • memory/1948-66-0x0000020ACDF00000-0x0000020ACE000000-memory.dmp

                Filesize

                1024KB

              • memory/1948-196-0x0000020AE19A0000-0x0000020AE19C0000-memory.dmp

                Filesize

                128KB

              • memory/1948-176-0x0000020AE1F20000-0x0000020AE1F22000-memory.dmp

                Filesize

                8KB

              • memory/1948-175-0x0000020AE1F30000-0x0000020AE1F50000-memory.dmp

                Filesize

                128KB

              • memory/1948-173-0x0000020AE1A90000-0x0000020AE1A92000-memory.dmp

                Filesize

                8KB

              • memory/1948-166-0x0000020ADF9E0000-0x0000020ADF9E2000-memory.dmp

                Filesize

                8KB

              • memory/1948-221-0x0000020ADF800000-0x0000020ADF900000-memory.dmp

                Filesize

                1024KB

              • memory/1948-58-0x0000020ACD3B0000-0x0000020ACD3B2000-memory.dmp

                Filesize

                8KB

              • memory/1948-242-0x0000020ADF250000-0x0000020ADF252000-memory.dmp

                Filesize

                8KB

              • memory/1948-244-0x0000020AE1640000-0x0000020AE1642000-memory.dmp

                Filesize

                8KB

              • memory/1948-253-0x0000020AE3370000-0x0000020AE3372000-memory.dmp

                Filesize

                8KB

              • memory/1948-251-0x0000020AE2240000-0x0000020AE2242000-memory.dmp

                Filesize

                8KB

              • memory/1948-61-0x0000020ACD3E0000-0x0000020ACD3E2000-memory.dmp

                Filesize

                8KB

              • memory/1948-63-0x0000020ACD4A0000-0x0000020ACD4A2000-memory.dmp

                Filesize

                8KB

              • memory/5004-45-0x00000288AB600000-0x00000288AB700000-memory.dmp

                Filesize

                1024KB

              • memory/5004-43-0x00000288AB600000-0x00000288AB700000-memory.dmp

                Filesize

                1024KB