Overview
overview
3Static
static
11User subm...il.msg
windows11-21h2-x64
3Outlook-De...nt.gif
windows11-21h2-x64
3Outlook-De...nt.png
windows11-21h2-x64
3Outlook-apz2nn3s.gif
windows11-21h2-x64
3Outlook-djm1vs02.png
windows11-21h2-x64
3Outlook-eaztdoif.png
windows11-21h2-x64
3Outlook-ihpdb1kr.png
windows11-21h2-x64
3Outlook-u2zmf02b
windows11-21h2-x64
1Outlook-yrkv3wc2.png
windows11-21h2-x64
3Tilbury Douglas.pdf
windows11-21h2-x64
3image001.png
windows11-21h2-x64
3image002.png
windows11-21h2-x64
3Analysis
-
max time kernel
295s -
max time network
275s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/10/2024, 12:08
Static task
static1
Behavioral task
behavioral1
Sample
1User submissionphish mail.msg
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Outlook-Department.gif
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Outlook-Department.png
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Outlook-apz2nn3s.gif
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Outlook-djm1vs02.png
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Outlook-eaztdoif.png
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Outlook-ihpdb1kr.png
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Outlook-u2zmf02b
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Outlook-yrkv3wc2.png
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Tilbury Douglas.pdf
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
image001.png
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
image002.png
Resource
win11-20241007-en
General
-
Target
Outlook-Department.gif
-
Size
42B
-
MD5
32023bb33cfb2a1990a4ef2d85b6ac16
-
SHA1
23dcc6d4b5bfe00357fd0248bb5955b8e36bb8f1
-
SHA256
99c2917ee5b2a01459a923bdd1c676f15ee73b62b87f696e6735312d26f51e12
-
SHA512
d052ecec2839340876eb57247cfc2e777dd7f2e868dc37cd3f3f740c8deb94917a0c9f2a4fc8229987a0b91b04726de2d1e9f6bcbe3f9bef0e4b7e0d7f65ea12
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 2912 msedge.exe 2912 msedge.exe 4080 msedge.exe 4080 msedge.exe 4344 identity_helper.exe 4344 identity_helper.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 3316 2912 msedge.exe 79 PID 2912 wrote to memory of 3316 2912 msedge.exe 79 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 3384 2912 msedge.exe 80 PID 2912 wrote to memory of 5060 2912 msedge.exe 81 PID 2912 wrote to memory of 5060 2912 msedge.exe 81 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82 PID 2912 wrote to memory of 2704 2912 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Outlook-Department.gif1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc687a3cb8,0x7ffc687a3cc8,0x7ffc687a3cd82⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,16830643061926170228,12032068079818163209,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,16830643061926170228,12032068079818163209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,16830643061926170228,12032068079818163209,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,16830643061926170228,12032068079818163209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,16830643061926170228,12032068079818163209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,16830643061926170228,12032068079818163209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,16830643061926170228,12032068079818163209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,16830643061926170228,12032068079818163209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,16830643061926170228,12032068079818163209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,16830643061926170228,12032068079818163209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,16830643061926170228,12032068079818163209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,16830643061926170228,12032068079818163209,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5aad1d98ca9748cc4c31aa3b5abfe0fed
SHA132e8d4d9447b13bc00ec3eb15a88c55c29489495
SHA2562a07cac05ffcf140a9ad32e58ef51b32ecccf1e3ab5ef4e656770df813a8944e
SHA512150ebf7e37d20f88b21ab7ea0793afe1d40b00611ed36f0cf1ac1371b656d26f11b08a84dbb958891c79776fae04c9c616e45e2e211d292988a5709857a3bf72
-
Filesize
152B
MD5cb557349d7af9d6754aed39b4ace5bee
SHA104de2ac30defbb36508a41872ddb475effe2d793
SHA256cfc24ed7d1c2e2c6585f53db7b39aa2447bf9212487b0a3c8c2a7d8e7e5572ee
SHA512f0cf51f42d975d720d613d09f201435bf98c6283ae5bc033207f4ada93b15e49743a235a1cfb1b761bde268e2f7f8561aa57619b99bff67a36820bc1a4d0ec4a
-
Filesize
5KB
MD520d67abc92d8a1a1d4ef0850b4a0b6c8
SHA16470cc53d50fb45381e489c2f9da60624ba62798
SHA2567296e523ba24189eaae8154a4230e65bc90952fb72a7f8b70d82f068897ecc87
SHA512f1a61957cc09706a2211f26893e3024c9f0faa7e2639d4acb0a089fb76d2f90f8dbd4b963bec3e297bd023f194fd25bea9544b046993f5db0b9622a3834734e1
-
Filesize
5KB
MD5dc81852b36a183adc464f49339728c70
SHA1f05ec95675ba0e997072b1bcc2fd7e3e4acebada
SHA256d97a5088387a02535418a17a2dc45e0a086bc118b6aaed3d8e431571def89a7d
SHA5128a63e76febe2eef2f31c14534c9d09f0a42cbc6d527c3d2cc499864d3c9ce3ebccb8eb4237f0411d18c9392b9e87b9fc8b172b907dfe2865c5989118c49bbbcd
-
Filesize
10KB
MD5857040228df9821bf9e54e3b1f42ec5f
SHA188ebf52443ef127dcc17f01ef003277f36654643
SHA256d9c07070c1b0b98f3067640791d7126a703ca86543a0f44b32c1e51585e2a346
SHA512716ed26d92c5115e0f75dcd9c1a46448c8e1256cf202c116bbe10787d30aac04390c487143a9783b908aa7c13ae640557df88db0f84632cbabfccf7b36dab67b