Analysis
-
max time kernel
87s -
max time network
88s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order PO-0710.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Purchase Order PO-0710.html
Resource
win10v2004-20240419-en
General
-
Target
Purchase Order PO-0710.html
-
Size
13KB
-
MD5
ed71c424bd7a793eb081849e31a02d04
-
SHA1
f89de2a70d7d89385c98c61f6000bf7e256c209c
-
SHA256
d85d2b7f58d25a4cb4668e324b9ca8cc4dba7ab5b94097b71f05fca5aa486d02
-
SHA512
eeb233ab8ee22ec2ad819379dc27c6b1987131ef4a568e689af4540e5ed3081bf4e2547579102cf2e000b6566b03a372635562ab4b6828c847a830fcbfb98aac
-
SSDEEP
192:OLN/m/ZPBr3gFja9wxeMxi25hStLHlBk4+XemTGMT4hE9PfXuZjpOfUulHNREbve:hr32NoLGG04hEPvuZtOfUulHnAm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3696 msedge.exe 3696 msedge.exe 1144 identity_helper.exe 1144 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3696 wrote to memory of 2432 3696 msedge.exe 84 PID 3696 wrote to memory of 2432 3696 msedge.exe 84 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 2644 3696 msedge.exe 85 PID 3696 wrote to memory of 3028 3696 msedge.exe 86 PID 3696 wrote to memory of 3028 3696 msedge.exe 86 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87 PID 3696 wrote to memory of 1476 3696 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Purchase Order PO-0710.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb5e446f8,0x7ffbb5e44708,0x7ffbb5e447182⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9000643908481843410,12076896188332218675,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,9000643908481843410,12076896188332218675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,9000643908481843410,12076896188332218675,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9000643908481843410,12076896188332218675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9000643908481843410,12076896188332218675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,9000643908481843410,12076896188332218675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,9000643908481843410,12076896188332218675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9000643908481843410,12076896188332218675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9000643908481843410,12076896188332218675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9000643908481843410,12076896188332218675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9000643908481843410,12076896188332218675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
319B
MD536ce1c35cfbde3be5eb6bb135f2a9324
SHA142bb27f13dc9ebf43943498339e32d88153a3bbc
SHA25606fa40033778a33e9474a07a49cf56f2272a2bcb44e12fcdc13cbdc529b9ea21
SHA51255ae5837bb72c3a3f6353a7051b7351c7eb0158699212bb849b94d8f454786067382a1fc874c2c791e22a305cb6610dddab4713ebdb966ebb3ced2803a4851f4
-
Filesize
6KB
MD554e1539565ea292953069f2e21d98fe1
SHA13ca5d9eb6f728846b9701cc520d9af4e06949e02
SHA256f766049a17dacc4288c00b7b46217b19463320120f5bd587fa746103bc12987b
SHA5123632d25bcc5b15646d835716ac5db98a79dcf1f1316c7e77d35e6df85ff47c75cfc6dfaddabdd3bb1bb6c53c6f65fc8cb1958c3ea77d0fed918d954e7481890e
-
Filesize
5KB
MD5317289895b70214357a7008a8121e3ad
SHA1596c773fa946c42c14ce3661463f518d15f11182
SHA256d3f93d4da73f05382856d871b119d6d8457059223d1c5164340dab4c73b8200c
SHA5127098cce2216f0be8cfa272aafdec02bb8ac344554664f5ae7dde84c2dd1976aa85d0896d1d7d5e4740ac02ac4089ff1c2e6dffadc30ac740f03b664e90123815
-
Filesize
6KB
MD56a115904a407a2bbc6818887336ccc29
SHA19db5db9d50241a5e3ed7e6d464b9b872d832a7cf
SHA2562a95383f3be238575af4928a22e6cb2351776a15190fd23653639e1ce04c746a
SHA5121319a97c690403181b3bb20819d9f9d4c2dbd9ca5160567bd96d0ce948d446cc32f7095164f373353616835010003036ff2095924ea4eda016d83acce0630710
-
Filesize
6KB
MD5368a042a4ce52bf70621d84652e8d7ff
SHA1799fc15776c2b20b532bbd98d4810a77b0353f32
SHA256699e8176457fb6cd2dd7b0beaa8f33f485ae44c14c98a491cee9c182e5254764
SHA512b917aa8652ba72ba474f7d229d4dc111b2aebf567fa8774c4683aacae80ea88fc6bd6fc485b40bd7d74738a9452cb2d3813ed399d2cac63e38833dcebecf0e84
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD534b32af38fcd5352e2f31396d590c830
SHA1496dacb63cbd53f86ae1fdff6272152030d7a751
SHA256fb72f6add974d5dc7660885c959b7cfe9cfd8c442dad8f95f2f25033516a1a3d
SHA512f56dc3efb57eaf7ed5a51924f4a870998b332435245c6aa65b48504292db2f366d6f5917fbbd79f280cd65af2b9e52b6e25dc3f96c5f2b2e1edbff2f1091ec0e
-
Filesize
12KB
MD58ee9ca79de1107d89b33ce9a98b2ff78
SHA14ac6a614f4ae6ee3bc107af5332c960c95558962
SHA25622bc45cf0076cb52fb158c46b129c760c58419c46d786ed93605844e7fdcd556
SHA5128a6887012fbad3c162559a37a39517cf46d0f7cd526829321a1258451f0a976ad5fdd3c5c449aab84d7011145c54a98a76d40fb8d002ba026b4e4de86ad84932
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84