Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 19:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.paypal.com/us/webapps/mpp/mobile-apps?v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000186&utm_unptid=8616a58b-a5d6-11ef-bc8a-8bbd2e03b669&ppid=RT000186&cnac=US&rsta=en_US%28en-US%29&unptid=8616a58b-a5d6-11ef-bc8a-8bbd2e03b669&calc=f909668e297c0&unp_tpcid=requestmoney-notifications-requestee&page=main%3Aemail%3ART000186&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.293.0&tenant_name=&xt=145585%2C150948%2C104038&link_ref=mpp_mobile-apps
Resource
win10v2004-20241007-en
General
-
Target
https://www.paypal.com/us/webapps/mpp/mobile-apps?v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000186&utm_unptid=8616a58b-a5d6-11ef-bc8a-8bbd2e03b669&ppid=RT000186&cnac=US&rsta=en_US%28en-US%29&unptid=8616a58b-a5d6-11ef-bc8a-8bbd2e03b669&calc=f909668e297c0&unp_tpcid=requestmoney-notifications-requestee&page=main%3Aemail%3ART000186&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.293.0&tenant_name=&xt=145585%2C150948%2C104038&link_ref=mpp_mobile-apps
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid Process 4120 msedge.exe 4120 msedge.exe 4472 msedge.exe 4472 msedge.exe 968 identity_helper.exe 968 identity_helper.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid Process procid_target PID 4472 wrote to memory of 2240 4472 msedge.exe 83 PID 4472 wrote to memory of 2240 4472 msedge.exe 83 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 3008 4472 msedge.exe 84 PID 4472 wrote to memory of 4120 4472 msedge.exe 85 PID 4472 wrote to memory of 4120 4472 msedge.exe 85 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86 PID 4472 wrote to memory of 1416 4472 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.paypal.com/us/webapps/mpp/mobile-apps?v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000186&utm_unptid=8616a58b-a5d6-11ef-bc8a-8bbd2e03b669&ppid=RT000186&cnac=US&rsta=en_US%28en-US%29&unptid=8616a58b-a5d6-11ef-bc8a-8bbd2e03b669&calc=f909668e297c0&unp_tpcid=requestmoney-notifications-requestee&page=main%3Aemail%3ART000186&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.293.0&tenant_name=&xt=145585%2C150948%2C104038&link_ref=mpp_mobile-apps1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff99aa46f8,0x7fff99aa4708,0x7fff99aa47182⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,13344029670217063573,2982669798232320380,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,13344029670217063573,2982669798232320380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,13344029670217063573,2982669798232320380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13344029670217063573,2982669798232320380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13344029670217063573,2982669798232320380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13344029670217063573,2982669798232320380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13344029670217063573,2982669798232320380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13344029670217063573,2982669798232320380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13344029670217063573,2982669798232320380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13344029670217063573,2982669798232320380,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13344029670217063573,2982669798232320380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13344029670217063573,2982669798232320380,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,13344029670217063573,2982669798232320380,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD530768adabd692e25183ee9deaf1b00a6
SHA1f04769931c29a8064b4a6e1c981219a103646bf4
SHA256afa89822786bb0b34a80149c84ab40fcc581517f1d55110c004a9299de92cf0b
SHA5127af1bef6254e0164b396be7a8ac6b59a31993ca3c86729bd7b1d7bea34f0fc98b7be609da5b837f9d865f876aba70a55117865f975bc26b539e2c8d1add4e1d9
-
Filesize
1KB
MD5134b81b5dcf420c8bbaa9511df59ac5b
SHA13d782b0cc701d8abaf26ba38c6fd30d4460e4f15
SHA25623215ebc55ce4e616f996faa434c611d554c41e2d0e086a6613eb0f6d4e1a864
SHA51268d6ef7464a15ce640f486d8a07c6578de9a169a95a4e143e299372bfc187733a61c136aeb65e05ed18e039890af95783fa906b2ef39fbb1245f140760cced6e
-
Filesize
5KB
MD592ed46582bf1193a703cd6652131c1e7
SHA10b548e0ba227d1026f47e125f1be3a83d5e72996
SHA25610c72ac0c53f7d532ec54c598ec1a5fdda15c4ecd735c2aa867c693b37d13252
SHA512c13dbe0dfdd930e6d430d3f924ee3b068a12f2cd77469570b24443aef96d650e0f1557dccf87f0d510a1bc9ab279153e2d0298c22566274d8c2995288f391938
-
Filesize
6KB
MD5022d9068045b601724e22b278a036b9e
SHA19b6c3e49e9bb3e531bae42768d94b14facf4fe40
SHA256cef7c858dc3ccf3fd035a5318ff5632ff046714c55b8f0de7edf27199f295743
SHA5120750e7d44fdeadddfeb5f09daa8aa619f33646c8ff08b88533a5f7a525e5a64cf71f34a9cbfc0afc53ce1cc72f05829f61a8048872b86877eb7e74c57d31d2e3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD576d6627c1bfc41a8d12cbcf77f48fc25
SHA1f99c0363647f822e002a973c03642afef89393a1
SHA25611428060d7cec369a084837f681d9a76393176de8b4cbf9a8c71a7d2f59048b3
SHA512f439993733151f31edd33dbaf2cc68d351cb7113ccc2c3316fc927c65cb2803193caf0d34c83f51813b21489455ba5359cf1997887f01d6765618ec7e31fa360
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e