Analysis
-
max time kernel
533s -
max time network
559s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-11-2024 15:49
Static task
static1
General
-
Target
View_Receipt_Details_I(#1TSSU).html
-
Size
4KB
-
MD5
9c68f2224169ded57a848d34c39f6d65
-
SHA1
851c21e9baa8f87008c82cc9905ed92b90feb320
-
SHA256
adec446ec313e7b29b25867e6a9ad95a5c00f1d70ae4be86f7b54e4644d09cb2
-
SHA512
c8874dba59b55b9c3eaef391290d236b9c01deabd9744127db87eb38d0394af71b0183bb883acd8720f74decd900c9801f91b5b1294f0267671cbd8659a73f08
-
SSDEEP
48:tPy4M2b0jldFNThoVSYVAfaVGa4TftDEuAUKGN3wgH/deF9UdG5avf5TITapGudp:Y4MJvF9t8S5RAUJx43+ITapGuP+7GMLw
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4476 msedge.exe 4476 msedge.exe 2176 msedge.exe 2176 msedge.exe 3184 msedge.exe 3184 msedge.exe 2448 identity_helper.exe 2448 identity_helper.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
msedge.exepid process 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious use of SendNotifyMessage 14 IoCs
Processes:
msedge.exepid process 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2176 wrote to memory of 4496 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 4496 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 5084 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 4476 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 4476 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe PID 2176 wrote to memory of 3616 2176 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\View_Receipt_Details_I(#1TSSU).html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe19223cb8,0x7ffe19223cc8,0x7ffe19223cd82⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,15112530569751933297,15626018853516094789,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,15112530569751933297,15626018853516094789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,15112530569751933297,15626018853516094789,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2524 /prefetch:82⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15112530569751933297,15626018853516094789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15112530569751933297,15626018853516094789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15112530569751933297,15626018853516094789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15112530569751933297,15626018853516094789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15112530569751933297,15626018853516094789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,15112530569751933297,15626018853516094789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,15112530569751933297,15626018853516094789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15112530569751933297,15626018853516094789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15112530569751933297,15626018853516094789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,15112530569751933297,15626018853516094789,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5003b92b33b2eb97e6c1a0929121829b8
SHA16f18e96c7a2e07fb5a80acb3c9916748fd48827a
SHA2568001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54
SHA51218005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77
-
Filesize
152B
MD5051a939f60dced99602add88b5b71f58
SHA1a71acd61be911ff6ff7e5a9e5965597c8c7c0765
SHA2562cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10
SHA512a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f
-
Filesize
1KB
MD595be7c5a9772c2612d1a85e1d7b84dbb
SHA1865888e1bf17b174101eb7cad6faee37cd8754a5
SHA25613bb581753a5f3dd45646b2fa73f282aa46038781c160b887e69e3884a6d8b25
SHA5122fd9e14899636627e0e53a27b22672f0acfebabd109f9020a3c44682fafb26a066692d96e87a6a0cfcff1d13eff73adae9248cc682d8154b93293fa973524fe9
-
Filesize
5KB
MD5b0d401627b459ebd0da43fce6ffa5b85
SHA19e02901971dc7e86ab971900c154ccf11177a2e0
SHA256ae237829db2c5f3b6014ffcb87f3044992b7738a4f42b832be20fdd20e7618a2
SHA51298f0b977b37ba236dd7325d8c0bcba8b5b482575f6a55c25589a05d0abbb635a4ce24ccb166e4a8f3126df0b58b8feaaa30ff6050ee5bae05bd75ea3d57b738d
-
Filesize
6KB
MD5b0e1b0d3bbd0833e8b0dcd47baf8cfbc
SHA1e8f881bcb53b89e2fb2ce5e5adaada18c2f06161
SHA25667822e93d2edf81cc56d6c8da1e36539dec823117d0743b047069c512d387bd7
SHA512865dc78d0d7b951adaa9efce61be733cd6d0f5f51c7d085d10eb08bb1c277f435c497a6bc19d99f932d9d6a077aa9ff1af5b896b1122c186c6191aaa27e886db
-
Filesize
5KB
MD57ad56e3946c4399717fa683b3ad30ff2
SHA176cacb73e555ed6e28a9d466d433d15f71505ccb
SHA256888547a2dc73aa150da2b2ef4abc161685802be61fbb03d7be60f6c648374f9c
SHA51202497b9f3a16aeacd9d729c19deaf79b72a935107064f9a49d6e7287e4619b99684fc2fa111de70543d1f235f8049b39527b49a064d28a826e8dce176cfd9410
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d2f4018bc942c19cc4dde90789a8d004
SHA1b5e582924b6e2c0ec3c378ef6303a4e715ddfb8f
SHA25660c0accaa613e3a1b23e358fae65ddc4b8e7acedb4e3992f6f2215479fce3cc7
SHA512345e7f8718a3328dd8e00fd2accdbf64936daf7db8776ae391d88e50f7e2d0377f3237b33a8e70633ae2b185118d443573d091f7414abb3e360251362cb4b7a0
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e