Analysis
-
max time kernel
104s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 11:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1255278764032659466/1282423283752632452/steamapplicationupdater.exe?ex=66e29901&is=66e14781&hm=465f85149581167384db216ee91d19d1792df55a667d789ef9654d2da27badf5&
Resource
win10v2004-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1255278764032659466/1282423283752632452/steamapplicationupdater.exe?ex=66e29901&is=66e14781&hm=465f85149581167384db216ee91d19d1792df55a667d789ef9654d2da27badf5&
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Support DLL 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023512-98.dat elysiumstealer_dll -
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/4368-108-0x0000000007230000-0x0000000007444000-memory.dmp family_agenttesla -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ steamapplicationupdater.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ steamapplicationupdater.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions steamapplicationupdater.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions steamapplicationupdater.exe -
Downloads MZ/PE file
-
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools steamapplicationupdater.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools steamapplicationupdater.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion steamapplicationupdater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion steamapplicationupdater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion steamapplicationupdater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion steamapplicationupdater.exe -
Executes dropped EXE 2 IoCs
pid Process 4368 steamapplicationupdater.exe 3240 steamapplicationupdater.exe -
Loads dropped DLL 2 IoCs
pid Process 4368 steamapplicationupdater.exe 3240 steamapplicationupdater.exe -
resource yara_rule behavioral1/files/0x000a000000023288-65.dat themida behavioral1/memory/4368-94-0x0000000000400000-0x00000000011BA000-memory.dmp themida behavioral1/memory/4368-95-0x0000000000400000-0x00000000011BA000-memory.dmp themida behavioral1/memory/4368-218-0x0000000000400000-0x00000000011BA000-memory.dmp themida behavioral1/memory/3240-223-0x0000000000400000-0x00000000011BA000-memory.dmp themida behavioral1/memory/3240-224-0x0000000000400000-0x00000000011BA000-memory.dmp themida behavioral1/memory/3240-228-0x0000000000400000-0x00000000011BA000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA steamapplicationupdater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA steamapplicationupdater.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 steamapplicationupdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum steamapplicationupdater.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 steamapplicationupdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum steamapplicationupdater.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4368 steamapplicationupdater.exe 3240 steamapplicationupdater.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 804 sc.exe 2032 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamapplicationupdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language steamapplicationupdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS steamapplicationupdater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS steamapplicationupdater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer steamapplicationupdater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer steamapplicationupdater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion steamapplicationupdater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion steamapplicationupdater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 700546.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 412 msedge.exe 412 msedge.exe 1868 identity_helper.exe 1868 identity_helper.exe 4600 msedge.exe 4600 msedge.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe 4368 steamapplicationupdater.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4368 steamapplicationupdater.exe Token: SeDebugPrivilege 3240 steamapplicationupdater.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
pid Process 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 412 wrote to memory of 2608 412 msedge.exe 83 PID 412 wrote to memory of 2608 412 msedge.exe 83 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4716 412 msedge.exe 84 PID 412 wrote to memory of 4324 412 msedge.exe 85 PID 412 wrote to memory of 4324 412 msedge.exe 85 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86 PID 412 wrote to memory of 3280 412 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1255278764032659466/1282423283752632452/steamapplicationupdater.exe?ex=66e29901&is=66e14781&hm=465f85149581167384db216ee91d19d1792df55a667d789ef9654d2da27badf5&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa591d46f8,0x7ffa591d4708,0x7ffa591d47182⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Users\Admin\Downloads\steamapplicationupdater.exe"C:\Users\Admin\Downloads\steamapplicationupdater.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4368 -
C:\Windows\SysWOW64\sc.exe"sc.exe" stop dps3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2032
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15402381411141247564,17650693925066709270,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:12⤵PID:4616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:920
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1076
-
C:\Users\Admin\Downloads\steamapplicationupdater.exe"C:\Users\Admin\Downloads\steamapplicationupdater.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3240 -
C:\Windows\SysWOW64\sc.exe"sc.exe" stop dps2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD594670e97db4eb7ac129a8135e4b7eaf7
SHA178eab85fec57fe737f3b23e43774d88cd9a70a7d
SHA25626e09ab87eb061e4581115556ed8dfa5c21c8854a12a46c02e5456bee8ba9243
SHA512d621db405e9b72b0e10e5fa98c3fda7ad69a4195322e7560ff2bdeca6bb151a1cccfc8cd1ac672756a00f9d1e340f04a5181b59ea7bc41c2bf283e0b4d4f8467
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
5KB
MD544818c5d26bbef532b74e356bac4c56c
SHA1807125a6b7046bc52ee0411f1cb16fcd9cad1d4f
SHA25697a6126bd89088022d399d0d2172098ddae4025a0e5eaea9704b90c9e9e0867e
SHA5124e6020814d69a9736b567a615d55bf186358973ea6992bbdfeb4b1f2258b1ae8f3c33f8c267ab85e4825d9df909cb6edbe133a27357df4eac45216896b23738b
-
Filesize
6KB
MD5ace80e2b5e8572355c6776bf8b2ca03e
SHA1de76184e84e51430a90afbbc2039412be3882b86
SHA2561ad604903ed66dcd37f72931e8139f3538f7adf5fd4dac8749db0e5b2dfa6fa4
SHA512278ebd6f2a66f9c60de87661c09d523a968e04b9e87a849fb33c0e98f0cc1fb840146af9571f7233968aa7869285158e0eeeae86c4530138c183232bc17a311e
-
Filesize
6KB
MD5a648527807e5fc81816190764e14800b
SHA1dc21163a03e76a8ec1fe2b54acf59424491edf05
SHA256a4d49e1e21000910aec8a29b481c902f786da32ace1f2c8967d2b975dc7337be
SHA5123c217556470d111648e4fae697f8ef0d7cce2504e38ba4ebeb8b6acdbd757db944aecb51aa5b4fbf1d98d031f813f27adec11df0840c7d72d251631e95e8f5b3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bfb8557ea07734e3fbe0b8151b70fff3
SHA1ea2d78efceb9095ff6102630dd8572edeb0e04b3
SHA2566a567e67e69f9d3086fb936b19dcb8f9a1ac937f0243841bcb440c3b1ea0e9ac
SHA512c6a42e13923d00aef2bff30d60def2ed8cbba823646d80d282ec9439bfeda4c2df544aeeb9d7ea48f9d0bcb5236541f858fcc2c01ef0425d33054f4c77abc157
-
Filesize
10KB
MD5bcf01ef244df5e2dbf4468aa765f90ac
SHA151ccbd1c429585ffd54965d308d1abc093e7cb7e
SHA25671d4e9da3fd2660ce1e4e416854dbd886c25fe4df5b2cb2920569949d901704f
SHA512bf2d0c2b9c10e542bae3dfbd915e16683317f925cbc9319b7a3a32953a41671e77c11a200171a1205a0f3eedf7db57cd066c71c4cf55c31d374c2f860b36d41d
-
Filesize
40KB
MD594173de2e35aa8d621fc1c4f54b2a082
SHA1fbb2266ee47f88462560f0370edb329554cd5869
SHA2567e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f
SHA512cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798
-
Filesize
7.8MB
MD5242330c850b3d19ea1721859597f233d
SHA1b7c2e1681e513fc6ad8f11f6d42788b117b403a6
SHA25631f8a96880a76f6bfc758e329e8aeba810f9bbff91ca0d13a2c14ed2c5f80f7b
SHA5122db1bb15ca202f788f68756d9a4578d44ebb2408c59ecbfd482ff15298853820d96a72002198b542c1847c2ca395ce8118e88c0c1b8dcf2c0f6751464048c7a7