Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2024, 03:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.paypal.com/invoice/payerView/details/INV2-869M-M7FA-87QR-PU5J?locale.x=en_US&v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000238&utm_unptid=16af3624-bc7d-11ef-aec8-2f2f3a3662c9&ppid=RT000238&cnac=US&rsta=en_US%28en-US%29&unptid=16af3624-bc7d-11ef-aec8-2f2f3a3662c9&calc=3f178254fadac&unp_tpcid=invoice-buyer-notification&page=main%3Aemail%3ART000238&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.295.0&tenant_name=&xt=145585%2C134645%2C150948%2C104038&link_ref=details_inv2-869m-m7fa-87qr-pu5k
Resource
win10v2004-20241007-en
General
-
Target
https://www.paypal.com/invoice/payerView/details/INV2-869M-M7FA-87QR-PU5J?locale.x=en_US&v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000238&utm_unptid=16af3624-bc7d-11ef-aec8-2f2f3a3662c9&ppid=RT000238&cnac=US&rsta=en_US%28en-US%29&unptid=16af3624-bc7d-11ef-aec8-2f2f3a3662c9&calc=3f178254fadac&unp_tpcid=invoice-buyer-notification&page=main%3Aemail%3ART000238&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.295.0&tenant_name=&xt=145585%2C134645%2C150948%2C104038&link_ref=details_inv2-869m-m7fa-87qr-pu5k
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3312 msedge.exe 3312 msedge.exe 2796 identity_helper.exe 2796 identity_helper.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3312 wrote to memory of 4612 3312 msedge.exe 82 PID 3312 wrote to memory of 4612 3312 msedge.exe 82 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 400 3312 msedge.exe 83 PID 3312 wrote to memory of 3932 3312 msedge.exe 84 PID 3312 wrote to memory of 3932 3312 msedge.exe 84 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85 PID 3312 wrote to memory of 3764 3312 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.paypal.com/invoice/payerView/details/INV2-869M-M7FA-87QR-PU5J?locale.x=en_US&v=1&utm_source=unp&utm_medium=email&utm_campaign=RT000238&utm_unptid=16af3624-bc7d-11ef-aec8-2f2f3a3662c9&ppid=RT000238&cnac=US&rsta=en_US%28en-US%29&unptid=16af3624-bc7d-11ef-aec8-2f2f3a3662c9&calc=3f178254fadac&unp_tpcid=invoice-buyer-notification&page=main%3Aemail%3ART000238&pgrp=main%3Aemail&e=cl&mchn=em&s=ci&mail=sys&appVersion=1.295.0&tenant_name=&xt=145585%2C134645%2C150948%2C104038&link_ref=details_inv2-869m-m7fa-87qr-pu5k1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0c8446f8,0x7ffc0c844708,0x7ffc0c8447182⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,15505961894673544681,584775597286982876,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,15505961894673544681,584775597286982876,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,15505961894673544681,584775597286982876,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15505961894673544681,584775597286982876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15505961894673544681,584775597286982876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15505961894673544681,584775597286982876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,15505961894673544681,584775597286982876,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:82⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,15505961894673544681,584775597286982876,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15505961894673544681,584775597286982876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15505961894673544681,584775597286982876,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15505961894673544681,584775597286982876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2052 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15505961894673544681,584775597286982876,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,15505961894673544681,584775597286982876,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD509a6e62cc50aad3182565f7fddcf5b20
SHA18b7e4bf7c37090e135cf16393a3858b23ba14e21
SHA256ba07a5c1fea3f4f3539ffd8e286f3c522a3ac61e28bb186407e5ff03dfefcb1c
SHA512783a333f9f89b1f4259a18c6f54c98d7223c2dbcb8b70eb356cffbab3325f5db9b7e3c21aa015d7ef02a2a543b7f4bf6ceeda6903aa41258a1dae74eeb130611
-
Filesize
1KB
MD57faf250e5173736b411e9e443937d97c
SHA11dc72d476c6c60685742dbbaf80f59a85c149416
SHA256a626a8a7d5062f6fcef0a61d13dd4aa9a2dec7cee7a59b344b8394b8d919d978
SHA512638e1e8bb36e8f68f11d538ef85d096cdc12aac438d291682b4875bd0c104441d3cccef33e50c113dd26d988390518e56e62b8deb17878085a59562dfc3ffc41
-
Filesize
5KB
MD53d5ce9297e2dfe907e0743e5d3ac4b99
SHA16ef3a332fb01f27f857c47cb606123810e7418eb
SHA25607f932df67f7eb93eb777b2bddb7bbe95a3f5f692bd8bf51c98dc37dff2dc210
SHA512f56f569caebee9c94ad721c16e1caeb2f03f94978f0a0d7b86d240df61a35216692c1c13ae648bce6d22a833b4ef540f8cfc41e009b5c8285ec9bceb3b040462
-
Filesize
6KB
MD5ab6141882761ae20561545dcf064c2db
SHA1a3b55b15eaec771cabc62313bf6dd43afdd8bb8f
SHA256259e79d1a69e309f1d0482ba19c6a17bcfaa38f4628ef8e75f3ece96418524c4
SHA512f9bce3e2dd7779f7820f6767d6e8557326c1daff0a057ee12f177303f873b62e9ec32563f90efbe91ff44741a458ad8e42132e8db19b8b6549f127e540540f20
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5338af301589c0f1cb1f845f98b242c91
SHA13cf965f566120fc0f9db970f67089dad74db8ad3
SHA256af0674de6482ceeea9e660e7476c91b3aded0020eb1a821a9917c43b33a9a474
SHA512696aeebc6a73736cc3bac27e0cc7e067740f3657e151706694b184678e796f61562472c6ec9b4665a9c8ba4c77ac89e6b5bcaf3623794ec4959a8327256c1569