Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 20:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/folder/3is42kz6mwjhj/Files
Resource
win10v2004-20240802-en
General
-
Target
https://www.mediafire.com/folder/3is42kz6mwjhj/Files
Malware Config
Extracted
vidar
11
346a77fbabba142b23c256004b5a7c5d
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Signatures
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral1/memory/4424-689-0x0000000000600000-0x0000000000875000-memory.dmp family_vidar_v7 behavioral1/memory/4424-692-0x0000000000600000-0x0000000000875000-memory.dmp family_vidar_v7 behavioral1/memory/5596-706-0x0000000000400000-0x0000000000675000-memory.dmp family_vidar_v7 behavioral1/memory/4424-739-0x0000000000600000-0x0000000000875000-memory.dmp family_vidar_v7 behavioral1/memory/4424-743-0x0000000000600000-0x0000000000875000-memory.dmp family_vidar_v7 behavioral1/memory/4424-758-0x0000000000600000-0x0000000000875000-memory.dmp family_vidar_v7 -
Executes dropped EXE 7 IoCs
pid Process 1056 S0FTWARE.exe 6040 S0FTWARE.exe 4700 S0FTWARE.exe 5364 S0FTWARE.exe 3000 S0FTWARE.exe 5648 S0FTWARE.exe 5788 S0FTWARE.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1056 set thread context of 4424 1056 S0FTWARE.exe 128 PID 4700 set thread context of 4188 4700 S0FTWARE.exe 133 PID 6040 set thread context of 5596 6040 S0FTWARE.exe 135 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S0FTWARE.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3384 msedge.exe 3384 msedge.exe 3996 msedge.exe 3996 msedge.exe 3484 identity_helper.exe 3484 identity_helper.exe 5376 msedge.exe 5376 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 4424 BitLockerToGo.exe 4424 BitLockerToGo.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5276 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1196 7zG.exe Token: 35 1196 7zG.exe Token: SeSecurityPrivilege 1196 7zG.exe Token: SeSecurityPrivilege 1196 7zG.exe -
Suspicious use of FindShellTrayWindow 62 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 1196 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5276 OpenWith.exe 5276 OpenWith.exe 5276 OpenWith.exe 5276 OpenWith.exe 5276 OpenWith.exe 5276 OpenWith.exe 5276 OpenWith.exe 5660 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3996 wrote to memory of 2012 3996 msedge.exe 82 PID 3996 wrote to memory of 2012 3996 msedge.exe 82 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 2436 3996 msedge.exe 83 PID 3996 wrote to memory of 3384 3996 msedge.exe 84 PID 3996 wrote to memory of 3384 3996 msedge.exe 84 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85 PID 3996 wrote to memory of 4596 3996 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.mediafire.com/folder/3is42kz6mwjhj/Files1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cd7946f8,0x7ff8cd794708,0x7ff8cd7947182⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6788 /prefetch:12⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6536 /prefetch:12⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6856 /prefetch:12⤵PID:5396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:12⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=7112 /prefetch:82⤵PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:12⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6888 /prefetch:12⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7060 /prefetch:12⤵PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7448 /prefetch:12⤵PID:6100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,6020670356914149554,15376497958536083417,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5032
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5276
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5660
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5808
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\S0FTWARE\" -spe -an -ai#7zMap3265:74:7zEvent129321⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1196
-
C:\Users\Admin\Desktop\S0FTWARE\S0FTWARE.exe"C:\Users\Admin\Desktop\S0FTWARE\S0FTWARE.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Users\Admin\Desktop\S0FTWARE\S0FTWARE.exe"C:\Users\Admin\Desktop\S0FTWARE\S0FTWARE.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6040 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:5596
-
-
C:\Users\Admin\Desktop\S0FTWARE\S0FTWARE.exe"C:\Users\Admin\Desktop\S0FTWARE\S0FTWARE.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4700 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:4188
-
-
C:\Users\Admin\Desktop\S0FTWARE.exe"C:\Users\Admin\Desktop\S0FTWARE.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5364 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:4012
-
-
C:\Users\Admin\Desktop\S0FTWARE.exe"C:\Users\Admin\Desktop\S0FTWARE.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:1820
-
-
C:\Users\Admin\Desktop\S0FTWARE.exe"C:\Users\Admin\Desktop\S0FTWARE.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5648 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:5880
-
-
C:\Users\Admin\Desktop\S0FTWARE.exe"C:\Users\Admin\Desktop\S0FTWARE.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5788 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:6000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5b4e66a92bf6e99c412e3823e72fbeb10
SHA1ac1980071200492b359bd7d43bbfbd0ff7e42825
SHA2560211d2dd7eefce16d5b652fb37d42dd51d49f2e8aef50235a9b8f023f688dfa2
SHA5122bcf0b3d3f961a4b96518151751e77b814377be52a8123c0207793369bc8aad12777c16436defe83b7e69eb26826cc2a78a663fd8533d0de3af470eb0bfbd40e
-
Filesize
9KB
MD5f5d31aaeb92ed7962a55bbf1f6fcdf05
SHA1080f2c8aa43f2a49d01ffe04568c285256c676a4
SHA256b046914a5a06d20a69eae5617ca255656478879459efc0fa7a700dbd698195cc
SHA512e58f770e14e560824d1210a1363102e93e98473afabf806bbea8fba3f8444b0ff694fbe40c599cc89afe680d197e058f0f742aad89c49b9bdecaa9eaac174b5d
-
Filesize
5KB
MD5615133f74e8caec5a48bfd28eb07878e
SHA1c7f9e4f692a2b530ae85870341afb91579c1d0c6
SHA25606ddbebc06ba047cac8ded098d5b1e813bfd05a238982877add6901c9e9b3742
SHA5123013475f1168a583973cf69bc2fc569733627ec51476a424bf0f480b9245f6fd1fdd9b6d2285c62672e1dd3a7ad3372e3cef8ec25652069d7c4df606e3353be8
-
Filesize
11KB
MD5e88d73598b5c33c39c596c19bf568758
SHA1d5cad46171521828a561d80bc291011414dad49e
SHA25600691e9bfd4eeb6e1523596f0ade09cba4f6730937992025f05eb7170670c61e
SHA512581cfebd9828a9bd51cfc5875475916e3426150315c4cb3806cd5a66c2940f4d7067dd86e013d0b64c5d6e9c034d35b4ec87a916b5c12b9aa6f710eb2130b3f0
-
Filesize
8KB
MD5c91883ee5a9653dd5a2afc45fe8ec6da
SHA1fef04c1ffaa0f68637a90e395c8663ef3c427c6c
SHA2567c85109f58b386f9ceea079ecad71346ff0ea6e51c0a397ed2a4784c678d1d21
SHA512bc440a927c25ee21e10447b33856916b67add333ea7ebdba995e6b583676a8daf0f7326e471482f066b8c18fa76565c0371f4212eaabb7517398eb72b75e1d4a
-
Filesize
11KB
MD5fbd57f3f646eed4ade986b7579556992
SHA1f45e7a0fb1622ca043bddef2a55807b8df49df30
SHA2567534f7261b895e1577326c5899bb48f19342b80ac00bf1abe3e994d895689f25
SHA512a1bb8d100ef9ee4ddddb325c8ba2513e1697b61a41aba782e7941714b398a29901f6a626cfa339c437283591ce84f32f94894acdc6d0acea32a71aa90b7460d0
-
Filesize
3KB
MD5714ebdfde1338e7c25e281e4a5f6eb4c
SHA1e5e3e925cf4587e304749d50700d2de77fc280da
SHA256187c3eeaa919b7cdec0711fa8e68dbe771628627800d7a10d97cc554213a20dd
SHA51238ae36b3dbbec8b73fd6fd94b6d69462531b99ccb5d41903c0a66319dcee0b91068ae0354a5cfe70465c1ccdb7ab045a16a9a7de96ebabbcd368bda7b179e937
-
Filesize
1KB
MD51807b16461c375dd147391584803ebc0
SHA1ac03ac568cc15200bbf28712245eac838ba90cc8
SHA25600b9b47df9db6cfcfb9a2829ed3ec87dbd36919b27c44e149f362d86488018ec
SHA5128d4d72ecc30c117231a28bf06cd98f0b3090ffd0e42dd4b6406ee119d0ed452729294894416f89fbdb912ca4dd1569fbec58ad28f6aba007fc838e0dcc2fb425
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c1782adf-13e6-40c7-89d7-e6ded1785186.tmp
Filesize3KB
MD5d4ddddfbb4badc2d555cfffca463c25a
SHA17aced8543855f68f10649e0a481c027cfb307ec4
SHA256b35bf928d33f9158e5353f0ab1e07d2a21282d5d124fb4352eb53506a17a99ab
SHA512a0413478c81584517e13d258323d3d135acd903d156c32422d9637a2e14469a20a8bbab348b4e8454bbe6a1e5c20954cf6a0c42f8ba51d75a90a53c33a9b830b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51b1aa65210dd11d726327d0283730663
SHA1aa911b6c199e3a820b4b3cab04ee7dc79fe001ed
SHA256985ed0043c6109268ca29ecd6b893282ad04db92555e01ae921e8882b6819be8
SHA512a53858ee1ec898a56b4ea194ab0ad5a4fdcff4c47fdef85e6271c1e7ecc7044a247dd638c6310c7a33bac667a0b0f5f0498d8a67fd896770ce598490f464cb27
-
Filesize
10KB
MD5badf58ddc9836bd2f0b29a424b8f232c
SHA158d27b059631d2c8ccb27110bec3e105902a8f6e
SHA256b471c6104583e3c434e1f39c481f538ebc951d1914a98093ea10fc6f86543535
SHA5126b2ce9fe5a1e34bebb601ad4acd87e962655b43a6a6e11f58a9202d2e8b3b3e807478183918714684174388011c8d235088861f833efbf26cfa9e5cdf529483c
-
Filesize
10KB
MD592aa2abd4605fe72ade843f5c80c2ca6
SHA1ea2c0122a37fbca5ce85c98c227aad60628326de
SHA2564ad2bc2d8c7b207629738c225b2c142cf04da9d81a26f7e7b80c4228e5b880a3
SHA512ed757e527dc88c3f4450824f98098ab2f9149d6b96f9fa260bd053003613b72765b70aa47686c5f281e2fcd22c62985cb55cc8aca90fd41559dcbf5fde88af66
-
Filesize
17.5MB
MD51603ae955d010896283442534a8ad39c
SHA190101b5164c138f227d7add871c1f629bd6d083d
SHA25634d99b2a6ed62e5080c9448ab3728066c6db5f997212ef71bd2705c79b19fc09
SHA512e1c8d2ba780d98ff7a845543d35fdf7a2f2092d66295d82cfa07a0d6b64dda58db913967e4f595538f43ac94e88d97e3bfb762205f5588a675ba9abd2ceadb9e
-
Filesize
21.0MB
MD50e224047d792804c332b20bff47e0698
SHA1bfd2d0b0d4eda8da547a7d0524a7f0430048f034
SHA2568ff9ed4f63162eeaba8ec4780ffaa95e347dec462929f636962e2c2005582365
SHA5121c23a95adf412841ed62f901b93193c5ffa8287b8ba02e244f8a34b6f6685c2632bf16b1f2ad9892b6ea4e11f91ce2ba64ec5af0199d3d54fea8a579c668f24e