Resubmissions

14/10/2024, 20:11

241014-yymsaatgne 6

14/10/2024, 20:10

241014-yxvfqstgkg 6

14/10/2024, 20:09

241014-yxbcvstfrb 6

14/10/2024, 20:06

241014-yvt27atfkd 6

14/10/2024, 20:04

241014-ytcrhsxflq 3

14/10/2024, 19:58

241014-yqa4hsxdpr 4

14/10/2024, 19:54

241014-ymwk2stbrg 4

Analysis

  • max time kernel
    115s
  • max time network
    116s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/10/2024, 19:58

Errors

Reason
Machine shutdown

General

  • Target

    http://google.com

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://google.com"
    1⤵
      PID:5052
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5032
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:1132
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3296
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3064
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3344
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4036
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2244
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0 /state0:0xa3af7855 /state1:0x41c64e6d
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of SetWindowsHookEx
        PID:220

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\74VQ0I5Q\favicon[1].ico

              Filesize

              5KB

              MD5

              f3418a443e7d841097c714d69ec4bcb8

              SHA1

              49263695f6b0cdd72f45cf1b775e660fdc36c606

              SHA256

              6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

              SHA512

              82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

            • memory/3064-44-0x00000229C6A00000-0x00000229C6B00000-memory.dmp

              Filesize

              1024KB

            • memory/3064-43-0x00000229C6A00000-0x00000229C6B00000-memory.dmp

              Filesize

              1024KB

            • memory/3344-95-0x000001F1527E0000-0x000001F1527E2000-memory.dmp

              Filesize

              8KB

            • memory/3344-133-0x000001F1529D0000-0x000001F1529D2000-memory.dmp

              Filesize

              8KB

            • memory/3344-64-0x000001F141500000-0x000001F141600000-memory.dmp

              Filesize

              1024KB

            • memory/3344-71-0x000001F1518F0000-0x000001F1518F2000-memory.dmp

              Filesize

              8KB

            • memory/3344-69-0x000001F1518D0000-0x000001F1518D2000-memory.dmp

              Filesize

              8KB

            • memory/3344-67-0x000001F1518B0000-0x000001F1518B2000-memory.dmp

              Filesize

              8KB

            • memory/3344-87-0x000001F152410000-0x000001F152412000-memory.dmp

              Filesize

              8KB

            • memory/3344-91-0x000001F152780000-0x000001F152782000-memory.dmp

              Filesize

              8KB

            • memory/3344-89-0x000001F152540000-0x000001F152542000-memory.dmp

              Filesize

              8KB

            • memory/3344-85-0x000001F1522F0000-0x000001F1522F2000-memory.dmp

              Filesize

              8KB

            • memory/3344-93-0x000001F1527C0000-0x000001F1527C2000-memory.dmp

              Filesize

              8KB

            • memory/3344-316-0x000001F140DF0000-0x000001F140E00000-memory.dmp

              Filesize

              64KB

            • memory/3344-105-0x000001F155220000-0x000001F155240000-memory.dmp

              Filesize

              128KB

            • memory/3344-317-0x000001F140DF0000-0x000001F140E00000-memory.dmp

              Filesize

              64KB

            • memory/3344-308-0x000001F140DF0000-0x000001F140E00000-memory.dmp

              Filesize

              64KB

            • memory/3344-309-0x000001F140DF0000-0x000001F140E00000-memory.dmp

              Filesize

              64KB

            • memory/3344-314-0x000001F140DF0000-0x000001F140E00000-memory.dmp

              Filesize

              64KB

            • memory/3344-180-0x000001F141500000-0x000001F141600000-memory.dmp

              Filesize

              1024KB

            • memory/3344-189-0x000001F1546F0000-0x000001F154710000-memory.dmp

              Filesize

              128KB

            • memory/3344-306-0x000001F140DF0000-0x000001F140E00000-memory.dmp

              Filesize

              64KB

            • memory/5032-16-0x000002E131220000-0x000002E131230000-memory.dmp

              Filesize

              64KB

            • memory/5032-155-0x000002E137840000-0x000002E137841000-memory.dmp

              Filesize

              4KB

            • memory/5032-156-0x000002E137850000-0x000002E137851000-memory.dmp

              Filesize

              4KB

            • memory/5032-35-0x000002E12E7A0000-0x000002E12E7A2000-memory.dmp

              Filesize

              8KB

            • memory/5032-0-0x000002E131120000-0x000002E131130000-memory.dmp

              Filesize

              64KB