Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 17:32
Static task
static1
Behavioral task
behavioral1
Sample
ts.js
Resource
win7-20240903-en
General
-
Target
ts.js
-
Size
4KB
-
MD5
ed3b56e4275b4a0ed7b7b0b7bd7461c6
-
SHA1
404efc9a3c6be253546f9ad0cc6b61df5efbf091
-
SHA256
848296488fd185d3621c274420d9e59b974734234ec4e420bc11820f26c732a6
-
SHA512
7bc3684177b1ec80b3e7895522f29996a706a3215314307726c9ecaab65b5525936725bf41d876fdd575e9dd583d6cc1e02ca9fed2988418d4cf33fb8d3f208a
-
SSDEEP
96:dCkwnKuF0idLODzNXkv6YxiMjip1PDpmMjDqVoV7bKD8Ngr:fwndTdCDz1SLxixp1PPjD9btNgr
Malware Config
Extracted
vidar
https://t.me/fun88rockskek
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Extracted
vidar
8
Signatures
-
Detect Vidar Stealer 20 IoCs
resource yara_rule behavioral2/memory/3696-30-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/436-27-0x0000000000400000-0x000000000091F000-memory.dmp family_vidar_v7 behavioral2/memory/436-26-0x0000000000400000-0x000000000091F000-memory.dmp family_vidar_v7 behavioral2/memory/3696-25-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/436-24-0x0000000000400000-0x000000000091F000-memory.dmp family_vidar_v7 behavioral2/memory/3696-49-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-102-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-108-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-109-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-110-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-178-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-297-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-303-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-304-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-313-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-333-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-334-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-341-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-342-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 behavioral2/memory/3696-343-0x0000000000920000-0x0000000000C20000-memory.dmp family_vidar_v7 -
Vidar family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 8 1516 wscript.exe 18 1516 wscript.exe 23 1516 wscript.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2672 msedge.exe 2256 msedge.exe 4848 chrome.exe 1940 chrome.exe 4024 msedge.exe 980 msedge.exe 3724 chrome.exe 4460 chrome.exe 1228 msedge.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation tp3host.exe -
Executes dropped EXE 2 IoCs
pid Process 436 tp3host.exe 3696 tp3host.exe -
Loads dropped DLL 3 IoCs
pid Process 3696 tp3host.exe 3696 tp3host.exe 3696 tp3host.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tp3host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tp3host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tp3host.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString tp3host.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4624 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133746103744536419" chrome.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 3696 tp3host.exe 3696 tp3host.exe 3696 tp3host.exe 3696 tp3host.exe 3724 chrome.exe 3724 chrome.exe 3696 tp3host.exe 3696 tp3host.exe 3696 tp3host.exe 3696 tp3host.exe 2876 msedge.exe 2876 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 4024 msedge.exe 4024 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3696 tp3host.exe 3696 tp3host.exe 3696 tp3host.exe 3696 tp3host.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 3724 chrome.exe Token: SeCreatePagefilePrivilege 3724 chrome.exe Token: SeShutdownPrivilege 3724 chrome.exe Token: SeCreatePagefilePrivilege 3724 chrome.exe Token: SeShutdownPrivilege 3724 chrome.exe Token: SeCreatePagefilePrivilege 3724 chrome.exe Token: SeShutdownPrivilege 3724 chrome.exe Token: SeCreatePagefilePrivilege 3724 chrome.exe Token: SeShutdownPrivilege 3724 chrome.exe Token: SeCreatePagefilePrivilege 3724 chrome.exe Token: SeShutdownPrivilege 3724 chrome.exe Token: SeCreatePagefilePrivilege 3724 chrome.exe Token: SeShutdownPrivilege 3724 chrome.exe Token: SeCreatePagefilePrivilege 3724 chrome.exe Token: SeShutdownPrivilege 3724 chrome.exe Token: SeCreatePagefilePrivilege 3724 chrome.exe Token: SeShutdownPrivilege 3724 chrome.exe Token: SeCreatePagefilePrivilege 3724 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1516 wrote to memory of 436 1516 wscript.exe 90 PID 1516 wrote to memory of 436 1516 wscript.exe 90 PID 1516 wrote to memory of 436 1516 wscript.exe 90 PID 436 wrote to memory of 3696 436 tp3host.exe 95 PID 436 wrote to memory of 3696 436 tp3host.exe 95 PID 436 wrote to memory of 3696 436 tp3host.exe 95 PID 436 wrote to memory of 3696 436 tp3host.exe 95 PID 436 wrote to memory of 3696 436 tp3host.exe 95 PID 3696 wrote to memory of 3724 3696 tp3host.exe 96 PID 3696 wrote to memory of 3724 3696 tp3host.exe 96 PID 3724 wrote to memory of 2180 3724 chrome.exe 97 PID 3724 wrote to memory of 2180 3724 chrome.exe 97 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 5056 3724 chrome.exe 98 PID 3724 wrote to memory of 448 3724 chrome.exe 99 PID 3724 wrote to memory of 448 3724 chrome.exe 99 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100 PID 3724 wrote to memory of 4612 3724 chrome.exe 100
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ts.js1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\tp3host.exe"C:\Users\Admin\AppData\Local\Temp\tp3host.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\tp3host.exe"C:\Users\Admin\AppData\Local\Temp\tp3host.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb699bcc40,0x7ffb699bcc4c,0x7ffb699bcc585⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2000,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1996 /prefetch:25⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1880,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2112 /prefetch:35⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2308,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2324 /prefetch:85⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:15⤵
- Uses browser remote debugging
PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3204,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:15⤵
- Uses browser remote debugging
PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3636,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4592 /prefetch:15⤵
- Uses browser remote debugging
PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4636,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4724 /prefetch:85⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4820,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4508 /prefetch:85⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4884,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4764 /prefetch:85⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5004,i,15554192669353876567,12103866561082020939,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5020 /prefetch:85⤵PID:3028
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb699c46f8,0x7ffb699c4708,0x7ffb699c47185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:25⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:85⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:15⤵
- Uses browser remote debugging
PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:15⤵
- Uses browser remote debugging
PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:15⤵
- Uses browser remote debugging
PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:15⤵
- Uses browser remote debugging
PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:25⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:25⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2604 /prefetch:25⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,191006470414284191,11729151239239106009,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3828 /prefetch:25⤵PID:1012
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AECAECFCAAEB" & exit4⤵
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4624
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5eda18948a989176f4eebb175ce806255
SHA1ff22a3d5f5fb705137f233c36622c79eab995897
SHA25681a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4
SHA512160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD54725d653ff10e4286f00c5732d740693
SHA1171782797eb562016d96c4850bd5fdd626d7223e
SHA2569b949466716140ffe69b1bec40f1ffebad2ceffff756e29807488d706e274a61
SHA5121b8f342494afedaab66a43eb67698b526770b4e66d944ecb17a9fc6239c1cd63a983e71486f8d1da7dab05a8fef33a544780a80616603dcf9ac4bb88e1399527
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
552B
MD57d08f14817a4c763cfb9f09208008568
SHA1bfafb731de634ae5b791a2472c503b3f018ef67e
SHA256947c90931eacf8d6967102e10bb56b4809493163301cea54eded3b22996586de
SHA5127174b34940fa4a22b4115b447ec936d020308ce45edd06cd5711e4ba135af8d606801d3a8ce24aac837a6ee978640815f2f2fec7e55522e37f093b7136d1029b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\05df1010-5069-475a-9b55-f342b08a8a6f.dmp
Filesize823KB
MD57ff4a640b5be4f9033731e3ea11f2f67
SHA16ec21ab87f81fe5f5f50f5e9d7422c2644ef7efc
SHA2562787e10418d1e003654d4fe7d369c17c53b537146320ec48b7105f8c598f6b6c
SHA512606ae28327ada5893514851580d68dc2a4681f28e9ad51736b37f08fd52b06ff27f5417b317306f3cebe49bb96e12e26bb111608f0d1046d09ff599e3a5862b2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\2a7cc06c-9697-4905-ae10-67c7d2f9a02d.dmp
Filesize838KB
MD579da06f8af3de51570481d2d99ceb04e
SHA1ce0c177e8d129e1dda0615ba92034e602a31f78f
SHA2564e922d0e401b9398c40e558cbb433c4ca68b90792bf88413725e952cf9927780
SHA512219efbd43e175b2f48a89aa4d128db31189b7cd9046d8d4d0096f455a36ee3dcf50e55bdeaf38ae1e63b4e9a7ba2d83a338581eafaff71c05ffad8420744b273
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\62cad879-177e-443d-8b52-0a0edfbf01c0.dmp
Filesize826KB
MD5af73fe73c78e111288f9570be2dd236e
SHA15d3e5b7f45a9906dc3a9b496509f99c066630fef
SHA256590cc87fde882ab2a481c1f55776bd65318ce0993590a42e54dbf36834bba3d0
SHA512bd97c91b98cfa8ec54c47acb80ba108f95b9af15c4c0d73a91c1ac86ed4429982487badd2152c889f456e1eaa400d9980e5dbb368bf5acc58d2e8feaefe153d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\7f603834-cf1d-44f7-8920-fd82b7b14a5e.dmp
Filesize823KB
MD59a6ff8b07839ddb2e06e0288addcca08
SHA1563185d65e508117de6c9ee069f4a5f2cdf3e85f
SHA2568a5664144f4b69eb93e30d2c68bc087ed7864cec27ba0d9fc8acd8dafba5cb80
SHA512ade5053e4b5121a6f80763f5fd8affd39c7eb6ea346dfb5452720bc7864e2b555ffd3bcc5c703e03653301abbb971cdd495f69e538bd99d99bb86f4a716a16ea
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5bfb0b51a020df1927743c01149621f55
SHA1ae4c06896a5f920c43db8e4e1661ea1f83ec4dcf
SHA2566081bd059452804fd9458217d75d1a4d88cbf30560b3c21dfae4a64248133db8
SHA51289809e38cac082bb2a521a28d8d1d5dc1cc22cf2d6ee5bbe53d6d8f14bc0677cbdf8e084e3418e58cfab057bf00ebb019c3f32d94cf3673fcb84e91b21d1e6d8
-
Filesize
152B
MD525400746ac39342693709711f6760821
SHA159260c541f574fdf29c0b9fb52d178661611a921
SHA256a5d7c4b12083c265dd281303f1dde2334536ffbfcdba40d3552efd4a3fcdedcb
SHA5124172484f5099b4616b0033370f9b96dd2ee9a3a213ed9b4bc2f623cd6aa44cb572eaef95473bf68a8e52aaebe0f1362b6539b4670658fd9039d0fff30fb5b049
-
Filesize
5KB
MD58653116538c873f805b42a435f8bc760
SHA1fc37df34f1f3246afa6378ddbdbb7e0b16d7288c
SHA256913754a0a1c971baa8b9f2cc4ef19be7f6aeaa35fb8de90bf428b8d95692f885
SHA51286b011b90eab8060a7342f3d5e12c679e3947f63f0178b83c0639fda4677f356282fc1a9530be8f7ee1595fb1e7ce41b72aba8332b0fa63212926f539a350abc
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5.0MB
MD5fb08f2cb20523c34a7c01e2f565774a1
SHA1212f6bb39ab33ea61abaf69e35da3449db39d1d8
SHA2569a42637e8c5229a0b84c28892e030c5b9d07cd32ccb5bdc0cc6f0633113c8fe2
SHA512c7e650e8b7d4f1ece36f1dd1427ee200ed824a032ea6b3452a5f3f68edca4605f5f94c5ee2730dcc9016c8d8fea355fddf2d47aecdf23e574cd431307d0d143d