Resubmissions
04-12-2024 20:49
241204-zl8dwszrc1 304-12-2024 20:47
241204-zk7qzazqh1 304-12-2024 20:47
241204-zkt5wawmhk 504-12-2024 20:45
241204-zj17sswmdm 504-12-2024 20:44
241204-zjk6kszqbt 304-12-2024 20:42
241204-zhdecazpfs 304-12-2024 20:42
241204-zg22bazpet 704-12-2024 20:41
241204-zgm76azpds 304-12-2024 20:35
241204-zc576swjgk 704-12-2024 20:32
241204-zbbl6szlgv 3Analysis
-
max time kernel
16s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
Payslip_Amendment12009.htm
Resource
win7-20241023-en
General
-
Target
Payslip_Amendment12009.htm
-
Size
5KB
-
MD5
931df36f406e0f5495c5d77fa91bf035
-
SHA1
01bbb0abb4f14451a48800e47d203732bc139920
-
SHA256
09dd2d9fe7934ea2d88ab8a7d13a824bb462e73d9d2d982e26d8f9a35646e5d5
-
SHA512
df882dd9eb3f6ed9290cb5b764653afdb3833bac947e6b18124454394380b1fc7cf6a7c5b7001108266aeb50813f6b5905e6bf94507f3116e76e66049bba1351
-
SSDEEP
96:ekUhhhIFDkrQJoSheziDftDIhfBDIEDHhDhiDgBhDMDftDIsjNhFiDIEDIfDhyDl:6hhhIFDkrQJoSheziDftDIhfBDIEDHhD
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: Desktop-solutions-tab2-img1@2x
-
A potential corporate email address has been identified in the URL: Desktop-solutions-tab2-img2@2x
-
A potential corporate email address has been identified in the URL: Desktop-solutions-tab2-img3@2x
-
A potential corporate email address has been identified in the URL: Desktop-solutions-tab2-img5@2x
-
A potential corporate email address has been identified in the URL: Desktop-solutions-tab4-img1@2x
-
A potential corporate email address has been identified in the URL: Desktop-solutions-tab4-img2@2x
-
A potential corporate email address has been identified in the URL: Desktop-solutions-tab4-img3@2x
-
A potential corporate email address has been identified in the URL: Desktop-solutions-tab4-img4@2x
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2960 msedge.exe 2960 msedge.exe 1360 msedge.exe 1360 msedge.exe 3008 identity_helper.exe 3008 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 3832 1360 msedge.exe 83 PID 1360 wrote to memory of 3832 1360 msedge.exe 83 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2072 1360 msedge.exe 84 PID 1360 wrote to memory of 2960 1360 msedge.exe 85 PID 1360 wrote to memory of 2960 1360 msedge.exe 85 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86 PID 1360 wrote to memory of 3824 1360 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Payslip_Amendment12009.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4bdc46f8,0x7ffa4bdc4708,0x7ffa4bdc47182⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17940292840034873694,16781050251524620067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
6KB
MD58d9bfd511e8afd22600c2665a06cf85e
SHA19a603713dda9ade3fcb3daa40dcb9233bde98342
SHA2561a0d02d91d2e7b96ae877fb88173ff58be8f5c047fb6827c6de3b3578eca9c1f
SHA512edf45cc13042b4e2d038ab56552977b97e82e0e94f5d398433221840d40a198bf0ac76a3e7a3078582c0af7cb2caa507dc358eb3abaec1f0e937bb54d3fbb9f5
-
Filesize
5KB
MD5ecc41703fd830cc7073f71af8b796b30
SHA1356c6d633db2e1f6853788f4dd84ed72a5bd0dfc
SHA256d4a72ae9bb31fb8ef3201678a7e31083acc5f07c97b8a864a6598775191c4532
SHA512d3de323495dccdcc25cd7fc922e1ac9597dd65392460fe120d66b6ca9bc23ff4f05e10cdb1c9170877326a080facaaa58854541bb185d5e3b8dd0d973fc61028
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD504911a99d1aa8c80e6080b841f8a5d7e
SHA1afae3dec62dd9864b1d7fbae02899036e4d2838d
SHA2561e2ad3f5bc30e40bc44b7d81979994a9f00eeb2a1462d4d2388d7590a1b8b383
SHA51285658b2192a71e1231c77c60c4daeabcd6a8ab53882e95becf0bc0282ae9b408be63faaecdc43f2dd2303400fe77589ea3c03a2f0daeb56db88d3e490aa5f4cb