Overview
overview
10Static
static
4HowToBeatP...ci.pdf
windows7-x64
1HowToBeatP...ci.pdf
windows10-2004-x64
1NEW PAYPAL...14.pdf
windows7-x64
1NEW PAYPAL...14.pdf
windows10-2004-x64
1PolishPaypal.pdf
windows7-x64
1PolishPaypal.pdf
windows10-2004-x64
1Profiting ...i.html
windows7-x64
1Profiting ...i.html
windows10-2004-x64
1ScrewPaypal.pdf
windows7-x64
1ScrewPaypal.pdf
windows10-2004-x64
1StealthPaypal.pdf
windows7-x64
1StealthPaypal.pdf
windows10-2004-x64
1The Ultima...de.pdf
windows7-x64
1The Ultima...de.pdf
windows10-2004-x64
1Unlimited ...ut.pdf
windows7-x64
1Unlimited ...ut.pdf
windows10-2004-x64
1Yasuo.Payp....5.lnk
windows7-x64
10Yasuo.Payp....5.lnk
windows10-2004-x64
10files/Yasu....5.exe
windows7-x64
10files/Yasu....5.exe
windows10-2004-x64
10paypal stealth.pdf
windows7-x64
1paypal stealth.pdf
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2024 19:08
Behavioral task
behavioral1
Sample
HowToBeatPayPal-preci.pdf
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
HowToBeatPayPal-preci.pdf
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
NEW PAYPAL CASHOUT 2014.pdf
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
NEW PAYPAL CASHOUT 2014.pdf
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
PolishPaypal.pdf
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
PolishPaypal.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Profiting from Paypal - TCF Wiki.html
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Profiting from Paypal - TCF Wiki.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
ScrewPaypal.pdf
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
ScrewPaypal.pdf
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
StealthPaypal.pdf
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
StealthPaypal.pdf
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
The Ultimate Privacy Guide.pdf
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
The Ultimate Privacy Guide.pdf
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Unlimited Stealth PayPal Acts and how to Cash them out.pdf
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Unlimited Stealth PayPal Acts and how to Cash them out.pdf
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
Yasuo.Paypal.v4.5.5.5.lnk
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
Yasuo.Paypal.v4.5.5.5.lnk
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
files/Yasuo.Paypal.v4.5.5.5.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
files/Yasuo.Paypal.v4.5.5.5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
paypal stealth.pdf
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
paypal stealth.pdf
Resource
win10v2004-20240508-en
General
-
Target
Profiting from Paypal - TCF Wiki.html
-
Size
32KB
-
MD5
f69df598aa45d488ec12cc5438030ab6
-
SHA1
5ed2d3740dd741b5a1be1d7dd0d1c43f64d9537e
-
SHA256
fe8e7883656dcdf0ff4a05c3905397aeeecd0c75cc4b5d06b80e1536e11bc989
-
SHA512
97f0d6dc1d0a51576ddbe80424898e2128d20021aea0c79265747727c645a74871178dae01cf8960baee4cb8c2fdaf3c2b18efc43d5dd85b66103420813dc325
-
SSDEEP
384:aMPfdUrfTVBFPzDsjvr9ZMFgTvGoDYCvwe4yW165e/hVOl1i3mVCDLNZpc6TU1zx:aMPfEh7LWxZoyC6OgivZpcTaCW4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4436 msedge.exe 4436 msedge.exe 3292 identity_helper.exe 3292 identity_helper.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4436 wrote to memory of 2676 4436 msedge.exe 85 PID 4436 wrote to memory of 2676 4436 msedge.exe 85 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 3656 4436 msedge.exe 86 PID 4436 wrote to memory of 4616 4436 msedge.exe 87 PID 4436 wrote to memory of 4616 4436 msedge.exe 87 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88 PID 4436 wrote to memory of 1500 4436 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Profiting from Paypal - TCF Wiki.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9aa2a46f8,0x7ff9aa2a4708,0x7ff9aa2a47182⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10331247040627427598,13390553205202815586,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,10331247040627427598,13390553205202815586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,10331247040627427598,13390553205202815586,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10331247040627427598,13390553205202815586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10331247040627427598,13390553205202815586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10331247040627427598,13390553205202815586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 /prefetch:82⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10331247040627427598,13390553205202815586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10331247040627427598,13390553205202815586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10331247040627427598,13390553205202815586,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10331247040627427598,13390553205202815586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10331247040627427598,13390553205202815586,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10331247040627427598,13390553205202815586,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
6KB
MD52938884e3d2ce624257e8ee59e217cc2
SHA10a69908b7e916c40460c629b13740695ee0f260d
SHA256c7f0e425778ede04ad6e2b56656947e2fd1875fd2863f38e17bc4610de86c9c7
SHA512a23046ba3d1cf62bde14a175945f80a95661f171663dda422181b923b8aaa1a869ba88387ff3e57323bbcde843097ffb86258021d5edc4c831fda4501b0f2b55
-
Filesize
5KB
MD56a039c28a2aade3802fa5b5b3d6534b4
SHA17fc5d5960738941f2f85938f71ade870dfdc05b0
SHA25615ab75af95c3c00bd425cc1b2c68cbda3c738de2a9e0d9a134927529436cfcb4
SHA512920e7a49a0f87652afea75d177f86e964275b8309282ad3682fbe98ed210759bd82066aa232dae195efe43b5e3732ec4c5bbc376dc3b1b53c910f382c04c5da6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55e3aa3e45fd2fd90d251b3579f869cfd
SHA1afbd5c25de5c9523361acf0ce67a6efd0796e45b
SHA256aa21e5c224c54bb164111faceccdbaa94b280add42842823af4eb5b54d6a07d9
SHA51242fd90728bfdae914620e3e09101fe1480488cebb07f4ffa6a706cde0722e1519dcceedff60575cf0774603d4ce02641c38328429590add6eb9ead7b06850c37