Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 09:54
Static task
static1
Behavioral task
behavioral1
Sample
BL/INV-67667466666.xlxs (8).htm
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
BL/INV-67667466666.xlxs (8).htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Cargo-Shipping_Doc.xlxs (6).htm
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Cargo-Shipping_Doc.xlxs (6).htm
Resource
win10v2004-20240802-en
General
-
Target
BL/INV-67667466666.xlxs (8).htm
-
Size
7KB
-
MD5
f13d40564cc78d412ebfb0c87f640854
-
SHA1
4e53edc5596d050e25bfac8fea0b9d9fda934445
-
SHA256
2462d528f165b7bc678788da39e7bbdb9fdfcad5f826b86a4f4a1e7feefc07d3
-
SHA512
bf60631e890f1de0c5c15704d8e33469ad29f9172ac62f8d331a40c1813794142f88cabcc2cf31a26bb099973b04e5d410bdf4d9ebaf714d33eeeb0fc86c3342
-
SSDEEP
96:xQoVUnU9JnCt9aja3sZqu42UhB+ogOab6NhzEC:SAUU9JnZGscuCP+vVmhzB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4776 msedge.exe 4776 msedge.exe 4068 msedge.exe 4068 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4824 4068 msedge.exe 84 PID 4068 wrote to memory of 4824 4068 msedge.exe 84 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 2460 4068 msedge.exe 85 PID 4068 wrote to memory of 4776 4068 msedge.exe 86 PID 4068 wrote to memory of 4776 4068 msedge.exe 86 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87 PID 4068 wrote to memory of 3576 4068 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\BL\INV-67667466666.xlxs (8).htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb5b546f8,0x7ffcb5b54708,0x7ffcb5b547182⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,13819980088272940239,5778358345098146512,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,13819980088272940239,5778358345098146512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,13819980088272940239,5778358345098146512,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2424 /prefetch:82⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13819980088272940239,5778358345098146512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13819980088272940239,5778358345098146512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,13819980088272940239,5778358345098146512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,13819980088272940239,5778358345098146512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13819980088272940239,5778358345098146512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13819980088272940239,5778358345098146512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13819980088272940239,5778358345098146512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13819980088272940239,5778358345098146512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,13819980088272940239,5778358345098146512,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
319B
MD53084689bfe660a1f8cf72361047e50ad
SHA1ccd020156512edd3a95399ce67537cb928a3f84a
SHA256b478d00a55fe056dc59579e7b9e93da8163e0c4c885148398cb416389e1bcece
SHA51257fb859b1e4a536ec759376df86c5bf923c8ba43329694b1b2e601ab72dd8a7b5e77e98418975106b8c01524a837dd82c5a9c7f3978ec470cae84859d5556703
-
Filesize
6KB
MD5bacdbca46b22e8f27a9db363462c9db9
SHA1ceb166a8910bc1e2f32bcee964c8a758dfd42948
SHA25613512c27b4159e4a47fd7fe15846892cd392c81c9217f428edeb7002b2ff509a
SHA51280d72c6ba70b93f4464ed5e20d86641ae04c4c3a854a6552ae27ae4d4c7d98a5d6e80892d1f67716042b9611dfca275aa49ea1a43cce9907050ece36e153c55f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f084226d-7f6b-452a-806e-75f8f36c8856.tmp
Filesize6KB
MD55936999ac73c1d7a6056de280dc346b1
SHA1b8744fa9a05f5f8f0cd588d8e4202311957d6131
SHA256d001e2c245b64dc8f68cfe1b7e3bae1ceaef91dad99194b341d3f452f2555c95
SHA512a5c16a3a691171c6cfc038fb5f048c2fb51697f175111e9116f2da145f230e58919b2c7df70af6a5af622a616bb5bcab5c8446e81bec11a605379134c2dff8b6
-
Filesize
11KB
MD506c1e5e37114720141a53aeb2e686e47
SHA15a19712f3d3a7c1027393f1e49d90ec9d07a03a9
SHA25618ea4110102faccc8c55915676ab0839ae89c3414c07960a9873927939a0fc51
SHA5125d0d6cffc995af523d97044640ee6a6cd7a6e877880d589043c56fd262592a3b7b23346b88e8395a716bea43712d07abe98a1d1661a5e10d7d535ff896a8592d