Resubmissions

12-07-2024 11:28

240712-nld99s1fpp 1

12-07-2024 07:42

240712-jjwz3swhja 1

12-07-2024 07:30

240712-jb5x1stfll 1

12-07-2024 07:25

240712-h82feswdkg 1

Analysis

  • max time kernel
    145s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2024 11:28

General

  • Target

    https://d3hwtxj0w1i8v8.cloudfront.net/2024/07/2/116/TA.xlsx

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://d3hwtxj0w1i8v8.cloudfront.net/2024/07/2/116/TA.xlsx
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff9fdcf46f8,0x7ff9fdcf4708,0x7ff9fdcf4718
      2⤵
        PID:4132
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2
        2⤵
          PID:3740
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4960
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:8
          2⤵
            PID:3164
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
            2⤵
              PID:956
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
              2⤵
                PID:2056
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:8
                2⤵
                  PID:2772
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4908
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5072 /prefetch:8
                  2⤵
                    PID:1988
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:1
                    2⤵
                      PID:396
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1640
                    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Downloads\TA.xlsx"
                      2⤵
                      • Checks processor information in registry
                      • Enumerates system info in registry
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious use of SetWindowsHookEx
                      PID:804
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:1
                      2⤵
                        PID:4912
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:1
                        2⤵
                          PID:4376
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:1
                          2⤵
                            PID:4656
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:1
                            2⤵
                              PID:2068
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12970140816068563671,11558235670784453889,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3936 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4172
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3248
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1096

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                584971c8ba88c824fd51a05dddb45a98

                                SHA1

                                b7c9489b4427652a9cdd754d1c1b6ac4034be421

                                SHA256

                                e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307

                                SHA512

                                5dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                b28ef7d9f6d74f055cc49876767c886c

                                SHA1

                                d6b3267f36c340979f8fc3e012fdd02c468740bf

                                SHA256

                                fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37

                                SHA512

                                491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                76f1b99b52f22dcfa218fea237d98b72

                                SHA1

                                939266f65c557b4437595a417725166f4073f0a0

                                SHA256

                                87ca3ee8c27eff060cf07796ca66b3b74b2fd05200ad44b935f43f57cf5593c2

                                SHA512

                                6723f22fbb35a8a45ea519858f18d5c1240c16f29a81bb7649552becd6b16136e442a0d4e3de2e044bffbd534ee0a47f93c30b3d364a2063031b24800b0757fb

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                0d66a6691c561d2c1411ae3db76c903b

                                SHA1

                                ec7a7a13b51c95f2bf119fdbd4f88610c7a817c8

                                SHA256

                                a0a2b015a7ea7c4438b8a883a72b50c191c472d59e4d086ef5a6b16f5d65d35f

                                SHA512

                                9965f86c695bec075113a7f4a8437a385297af5bcba22f76fd3ca72dc3726f23996e969a7ba8ad68e0c6de9added0ee98d338eaee3d9e1f2155cf38f647b8c84

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f91a10d5-fe9f-44d9-9947-6bf13a2d47e6.tmp

                                Filesize

                                6KB

                                MD5

                                6e49154b8e21f57e22692586a6a29b72

                                SHA1

                                87a933c1ffe9cebd1d64192b96b9bcd4a082c94a

                                SHA256

                                e5eb8a991636d8a0378643d2617b0dc74147e52608649bdccd34ed5afc2353ae

                                SHA512

                                c2aa02d7533f523ea2bd08530dfe0373f7540e079aa76fc874a78f2448aff02c1fb52c751533eddfe8e389dd6fd9c215e9f7e3b6422738e66b744e6ffd0f297e

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                23a8fe57785c39f5c71cfe1d35b7cb65

                                SHA1

                                0734e3a9ad6d6d8de845486704d3bf22b8fdd427

                                SHA256

                                c80c44267b9013f618a0634b5e8118d2a42b5950c1ac007d0e1c70df093d5459

                                SHA512

                                a0f46883fce98578cbef156964592616a748b2bb53e3237465f502e29f5f560a2cdce4b7fb5fff284fe969259a15ded1a7af55aeb10d86f8aaaeecf2f0b75d10

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                3cdfa3329ee1ca0e77eb6000304ef514

                                SHA1

                                013ec76a6d5528d2bf820c4fedc77c2d51477e48

                                SHA256

                                333de09ca493d63f406c559a914c918c4a5e8dd1c242d7de07d31fc52020528d

                                SHA512

                                c4be0894f02a93b8a814e9ada54d74621b107238923152dc5cb96366f2999cce4c36c0365926e424aa6d0178329d6608a4eb6346ad9149c4d3942f7750cecc37

                              • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres

                                Filesize

                                4KB

                                MD5

                                89bb0bbb60c7a6aab2395f84663ffc01

                                SHA1

                                8a9715be3af5f39eec71cd16ac33201a7ad6ca5c

                                SHA256

                                5d7326302c026b1c869529f1af5151201ce4e83f92dad57d43044f48de4ecb44

                                SHA512

                                f1a84b51561ab5683d57007cc5e2de076b4c4ad54f8f180c4b48004544cafd4de3afef1595b81c6c84cf0ab754bc4b54453a9bab1d4a784b09787784086173d7

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                Filesize

                                411B

                                MD5

                                c128b6a2d47483022c52c51cec620f07

                                SHA1

                                e32242ba0b1e51945ac6b6e40cd3d97fb90c338f

                                SHA256

                                55aa276199051c7b5510a81bd87e3892b9007caa3720aff07c5afc8d46984ff9

                                SHA512

                                e2bef1583da03d71f2c5f13f3fec5f102e6cd5f2cae65cd5a04e8757acdd33b2ce88c4bad107fbfbd467a8f518a151580d8e7383ac9a3687955e3e1f24bb66fa

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

                                Filesize

                                3KB

                                MD5

                                a7b02cd8a2325bea2830592224ff1166

                                SHA1

                                9c93066aee33e3509a5ab44c8532431a10201091

                                SHA256

                                e7ad50dd0859066edb0ff193d0e48a38e6c1b33418354982d7777d50af6b04a1

                                SHA512

                                1614c01ddc2dea778cd5d5d8c4478a5f8af6ab75f26b042c320cb40252a72a019afffa6975d740161118e42861d019d1d6c622104d17ff035fa3bbd6d1c728c6

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

                                Filesize

                                3KB

                                MD5

                                7e380f06f97639bc787d4608d9875d5c

                                SHA1

                                57aeab6eb07b9d80681e58815c0a745f74a154b9

                                SHA256

                                e5ea58c782aa95a8e4f8d9b95ecbc52e49c0b8241472cf4c1393167e0719d729

                                SHA512

                                fd91650e2903ac05128a5503dd46e1677dea6e6390ac0bb6533fb3282590d5acb51cb5852ba77a8b265eae2944b90605b3084c715f046841f0867fe709ca2d72

                              • C:\Users\Admin\Downloads\TA.xlsx

                                Filesize

                                272KB

                                MD5

                                95bd674471a1dde0b7ce34673a1b640e

                                SHA1

                                9ff7ed92bab683abe58ce6796d0ca7cd840ef6db

                                SHA256

                                c27950ac4d525c834ace8c52a3d2abbba6e3122a0ef177d82feadb2c38014066

                                SHA512

                                718072bb08d14644c29522500af328bb1e82affcbd1ed8a14083c6391992187ea3cc08c77fe2623de08acfaeab78f20e16f2b8cbc7639079035b2d51792a4aab

                              • memory/804-49-0x00007FF9C6390000-0x00007FF9C63A0000-memory.dmp

                                Filesize

                                64KB

                              • memory/804-48-0x00007FF9C6390000-0x00007FF9C63A0000-memory.dmp

                                Filesize

                                64KB

                              • memory/804-47-0x00007FF9C8CF0000-0x00007FF9C8D00000-memory.dmp

                                Filesize

                                64KB

                              • memory/804-46-0x00007FF9C8CF0000-0x00007FF9C8D00000-memory.dmp

                                Filesize

                                64KB

                              • memory/804-44-0x00007FF9C8CF0000-0x00007FF9C8D00000-memory.dmp

                                Filesize

                                64KB

                              • memory/804-45-0x00007FF9C8CF0000-0x00007FF9C8D00000-memory.dmp

                                Filesize

                                64KB

                              • memory/804-43-0x00007FF9C8CF0000-0x00007FF9C8D00000-memory.dmp

                                Filesize

                                64KB