Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/09/2024, 13:34

General

  • Target

    https://www.paypal.com/signin/?returnUri=%2Fmyaccount%2Ftransfer%2FpayRequest%2FU-0WJ87586KB4027507%2FU-0LS42226NY0346033%3FclassicUrl%3D%2FUS%2Fcgi-bin%2F%3Fcmd%3D_prq&id=ed3Se7I3n5myi8TTz-a6lG2F6GsNq.6rC6.5nw&expId=p2p&onboardData=%7B%22signUpRequest%22%3A%7B%22method%22%3A%22get%22%2C%22url%22%3A%22https%3A%2F%2Fwww.paypal.com%2Fmyaccount%2Ftransfer%2FguestLogin%2FpayRequest%2FU-0WJ87586KB4027507%2FU-0LS42226NY0346033%3FclassicUrl%3D%2FUS%2Fcgi-bin%2F%3Fcmd%3D_prq%26id%3Ded3Se7I3n5myi8TTz-a6lG2F6GsNq.6rC6.5nw%22%7D%7D&flowContextData=6TjP_PcMXksiwnnqU-UsOIMkPuZcJpfycgngM6dQ_KHhY7ILZnDInUNf33xeTqAmoU5sxUbEe8YRCpF7Rn7SAWrWcEhZnEVHiDmmAusdSSsHQWxrCjgexgVMtMtXjbtUYVx5V6rC3JYOz7e2khfv340-PbyvS9Acn0yDoyTGj76JofnmGUE07TDMnCAkSKeT4a83eaGjbLMIsrKZ6Um6T_crX9fLYFwZydpbywMavZCD7BznPJ4JB9i8e6tf883KEezEuG3-24HTa8BF&v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000186&utm_unptid=b1e9d75a-6482-11ef-83aa-3cfdfeec1580&ppid=RT000186&cnac=US&rsta=en_US%28en-US%29&cust=&unptid=b1e9d75a-6482-11ef-83aa-3cfdfeec1580&calc=f741615b46e07&unp_tpcid=requestmoney-notifications-requestee&page=main%3Aemail%3ART000186&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.276.0&tenant_name=&xt=145585%2C150947%2C104038&link_ref=www.paypal.com_signin

Malware Config

Signatures

  • Detected potential entity reuse from brand paypal.
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.paypal.com/signin/?returnUri=%2Fmyaccount%2Ftransfer%2FpayRequest%2FU-0WJ87586KB4027507%2FU-0LS42226NY0346033%3FclassicUrl%3D%2FUS%2Fcgi-bin%2F%3Fcmd%3D_prq&id=ed3Se7I3n5myi8TTz-a6lG2F6GsNq.6rC6.5nw&expId=p2p&onboardData=%7B%22signUpRequest%22%3A%7B%22method%22%3A%22get%22%2C%22url%22%3A%22https%3A%2F%2Fwww.paypal.com%2Fmyaccount%2Ftransfer%2FguestLogin%2FpayRequest%2FU-0WJ87586KB4027507%2FU-0LS42226NY0346033%3FclassicUrl%3D%2FUS%2Fcgi-bin%2F%3Fcmd%3D_prq%26id%3Ded3Se7I3n5myi8TTz-a6lG2F6GsNq.6rC6.5nw%22%7D%7D&flowContextData=6TjP_PcMXksiwnnqU-UsOIMkPuZcJpfycgngM6dQ_KHhY7ILZnDInUNf33xeTqAmoU5sxUbEe8YRCpF7Rn7SAWrWcEhZnEVHiDmmAusdSSsHQWxrCjgexgVMtMtXjbtUYVx5V6rC3JYOz7e2khfv340-PbyvS9Acn0yDoyTGj76JofnmGUE07TDMnCAkSKeT4a83eaGjbLMIsrKZ6Um6T_crX9fLYFwZydpbywMavZCD7BznPJ4JB9i8e6tf883KEezEuG3-24HTa8BF&v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000186&utm_unptid=b1e9d75a-6482-11ef-83aa-3cfdfeec1580&ppid=RT000186&cnac=US&rsta=en_US%28en-US%29&cust=&unptid=b1e9d75a-6482-11ef-83aa-3cfdfeec1580&calc=f741615b46e07&unp_tpcid=requestmoney-notifications-requestee&page=main%3Aemail%3ART000186&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.276.0&tenant_name=&xt=145585%2C150947%2C104038&link_ref=www.paypal.com_signin
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7d4a46f8,0x7ffe7d4a4708,0x7ffe7d4a4718
      2⤵
        PID:1344
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:2
        2⤵
          PID:1880
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1004
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:8
          2⤵
            PID:3760
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
            2⤵
              PID:4824
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
              2⤵
                PID:4988
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:1
                2⤵
                  PID:1640
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
                  2⤵
                    PID:2580
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:8
                    2⤵
                      PID:4292
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3896
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:1
                      2⤵
                        PID:4260
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:1
                        2⤵
                          PID:4576
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:1
                          2⤵
                            PID:1144
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:1
                            2⤵
                              PID:4160
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15492333363217918747,14483090493897418438,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2624
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3308
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1704

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                ff63763eedb406987ced076e36ec9acf

                                SHA1

                                16365aa97cd1a115412f8ae436d5d4e9be5f7b5d

                                SHA256

                                8f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c

                                SHA512

                                ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                2783c40400a8912a79cfd383da731086

                                SHA1

                                001a131fe399c30973089e18358818090ca81789

                                SHA256

                                331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5

                                SHA512

                                b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000009

                                Filesize

                                211KB

                                MD5

                                e7226392c938e4e604d2175eb9f43ca1

                                SHA1

                                2098293f39aa0bcdd62e718f9212d9062fa283ab

                                SHA256

                                d46ec08b6c29c4ca56cecbf73149cc66ebd902197590fe28cd65dad52a08c4e1

                                SHA512

                                63a4b99101c790d40a813db9e0d5fde21a64ccaf60a6009ead027920dbbdb52cc262af829e5c4140f3702a559c7ac46efa89622d76d45b4b49a9ce01625ef145

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                864B

                                MD5

                                0d4aa3caca43f5e669a4e1d2c9874648

                                SHA1

                                011f5a2bdf9bc81a7b5c057e7a32e585f779764f

                                SHA256

                                0bb56997745e9423441c80e54841df14cb93810fa558bee04cc4622f7eeeb85a

                                SHA512

                                5135e28ff6c2fccc1af723ff116c719aef0b29308fd0c802681ff0850cbc2b744e591da9206f8add81a3e055d6ee7bebd5d8bb61320da63e699f66b2a9b5fe82

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                615cef13cb9342c14210481153f452c8

                                SHA1

                                200f34d96ebc17f4743dcb0af26b5f1b03bf0f11

                                SHA256

                                60db2df00de620a7b03eaa0ee460b841542341d70398ffa71db7b2bb5b2d65be

                                SHA512

                                33bff74fbabbe8d34f2569f187e11682660d62e3cc66b7ebe8441a88c52051c2475d0139b2de93940533b1cf2dc1d8c65e8a37b6f982a278dae72190e0da3c23

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                8bef8d4aad293605eca390d997b77e7d

                                SHA1

                                12060ee57460703a5e2429eada9c9723f90ffb0b

                                SHA256

                                31700694e74fa8613895b1ddb0e120d9c7e584d1e86e11834ae3c61c79c181d6

                                SHA512

                                1fd2ee218749b57142380f67006e242a7055f52617309a615184861ff7082d79891d3c07151611912d8a55cf4a74cc6781562ae034885bd66d7555b00127167d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                257ad63debf4e8f4abb8300b90baf5de

                                SHA1

                                cdd9426fbc6399b5d8823efc9f265c291b3fe16b

                                SHA256

                                86aae4fc320e58095f52bcb794a6acf1960e38ee66cd3af941f89be04fca086f

                                SHA512

                                19c92dea581ab5c14b43a0812d566260dde64841f3c0edb28374ae46f517f5f02824db6c050145c48fd201fb88908171fce633d39ccedd2e2c1c8009a57c6fe2

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                Filesize

                                871B

                                MD5

                                4326fb52fa63203aba3b11d2be3fddb3

                                SHA1

                                93c934b533fc5203136dc00d9426ff00f1e658d2

                                SHA256

                                16a35ff6630072b4adb2a9b2a9c892b2353d160526c32dfd2868b3b8f5e83ace

                                SHA512

                                b1d3ed1434c1a4c3b82196b36910eb1f526e5db02c7ec1190f34f7503b8bc58b3dce47a27e0b9dbfab174d2344432aa0e4fa79d92610d1f6e327a3eea1eb631b

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58721e.TMP

                                Filesize

                                871B

                                MD5

                                dbb391446965a9885c3180a4141af76e

                                SHA1

                                0016b7b639846fb7340197452cc6877f35bbd0c9

                                SHA256

                                9ea841298bad3a767361c800fb5c5014ceb978b508f81fd4081c43afa1c00a3d

                                SHA512

                                ee6635bc9cc50d67cc7fc4189a337789af2d8df2daa26aca70b4f6e8a0bfc7e5c1faf4a28b745c9dceb67a96aac320ec000dce0227ee5a3cbfc3832e154ba8f5

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                ef2c1bede717641706bec531a3b65ccc

                                SHA1

                                5a880b3f56d7ad9644c6fc3c5f07a86fbed1f041

                                SHA256

                                afdc3e727d1fb7c0b011282610c658c27df1973892be25c2ce2005b7fb790d0c

                                SHA512

                                3912f6acb970ae18032a2d681712eeeb5988510b7f4bc6482f4761bbdf6778ec9b9e1e389d7f10a88b5873d4fa846f48cfe6b180ef5364ee2da54f89a58cf0ab