Overview
overview
10Static
static
3Insstallin..._1.exe
windows10-ltsc 2021-x64
dII/AdGuar...er.dll
windows10-ltsc 2021-x64
1dII/AdGuar...pi.dll
windows10-ltsc 2021-x64
1dII/AdGuar...er.dll
windows10-ltsc 2021-x64
1dII/AdGuar...se.dll
windows10-ltsc 2021-x64
1dII/AdGuar...nt.dll
windows10-ltsc 2021-x64
1dII/AdGuar...UI.dll
windows10-ltsc 2021-x64
1dII/Adguar...on.dll
windows10-ltsc 2021-x64
1dII/Entity...er.dll
windows10-ltsc 2021-x64
1dII/Feedba...on.dll
windows10-ltsc 2021-x64
1dII/FileReport.dll
windows10-ltsc 2021-x64
1dII/Microsoft.Ink.dll
windows10-ltsc 2021-x64
3dII/crashh...64.dll
windows10-ltsc 2021-x64
1dII/fdgdf (1).dll
windows10-ltsc 2021-x64
3dII/fdgdf (2).dll
windows10-ltsc 2021-x64
3dII/fdgdf (3).dll
windows10-ltsc 2021-x64
1dII/fdgdf (4).dll
windows10-ltsc 2021-x64
1dII/fdgdf (5).dll
windows10-ltsc 2021-x64
1dII/fdgdf (6).dll
windows10-ltsc 2021-x64
3dII/fdgdf (7).dll
windows10-ltsc 2021-x64
1dII/gfhgfhswf.dll
windows10-ltsc 2021-x64
1dII/iTunes...on.dll
windows10-ltsc 2021-x64
1dII/libEGL.dll
windows10-ltsc 2021-x64
3dII/libcurl.dll
windows10-ltsc 2021-x64
1dII/libdispatch.dll
windows10-ltsc 2021-x64
1dII/libssl...64.dll
windows10-ltsc 2021-x64
1dII/libssl-3-x64.dll
windows10-ltsc 2021-x64
1dII/libxml2.dll
windows10-ltsc 2021-x64
1dII/mshwLatin.dll
windows10-ltsc 2021-x64
3dII/mshwrwisp.dll
windows10-ltsc 2021-x64
3jres/bin1/...32.dll
windows10-ltsc 2021-x64
3jres/bin1/...ge.dll
windows10-ltsc 2021-x64
3Analysis
-
max time kernel
107s -
max time network
119s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
16-11-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
InsstallingFileX64_1.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
dII/AdGuard.CrashReporter.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
dII/AdGuard.Sciter.BaseApi.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
dII/AdGuard.Updater.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
dII/AdGuard.Utils.Base.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
dII/AdGuard.Utils.UI.PlatformDependent.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
dII/AdGuard.Utils.UI.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
dII/Adguard.Vpn.Common.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
dII/EntityFramework.SqlServer.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
dII/FeedbackCommon.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
dII/FileReport.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
dII/Microsoft.Ink.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
dII/crashhandler64.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
dII/fdgdf (1).dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
dII/fdgdf (2).dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
dII/fdgdf (3).dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
dII/fdgdf (4).dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
dII/fdgdf (5).dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
dII/fdgdf (6).dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
dII/fdgdf (7).dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
dII/gfhgfhswf.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
dII/iTunesRepairCommon.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
dII/libEGL.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
dII/libcurl.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
dII/libdispatch.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
dII/libssl-1_1-x64.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
dII/libssl-3-x64.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral28
Sample
dII/libxml2.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral29
Sample
dII/mshwLatin.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral30
Sample
dII/mshwrwisp.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral31
Sample
jres/bin1/JAWTAccessBridge-32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral32
Sample
jres/bin1/JAWTAccessBridge.dll
Resource
win10ltsc2021-20241023-en
Errors
General
-
Target
InsstallingFileX64_1.exe
-
Size
55.2MB
-
MD5
deae42628027ddba5be9da5d677cab1b
-
SHA1
258e78c53099ac93d5ccf96bdf4a6cdd7529e3ea
-
SHA256
0b3ec79d97a2e5edb398768cd1bc525fccca95eea9fbd5fe6ea6acfde3561a7a
-
SHA512
7b01d4b06f402ed2eef0fb9d16cd32170d16eeb871f48d26cf83e7c3b7803ba8b47d7568a14966c174bfbb1f5224d7ac09d89dfa987230716abc7fa693836cb4
-
SSDEEP
196608:IVnfEtQ78Kp6OL13ZTsUdXgDzQ7Md4fYATaN5iVWE3lEcmio7PIuGsCdm5kx00Fq:IVnMtQ78xd40Qls7PIxso00
Malware Config
Extracted
vidar
11.7
93fc6460673f6002db33ceb23a9e1868
https://t.me/m07mbk
https://steamcommunity.com/profiles/76561199801589826
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Signatures
-
Detect Vidar Stealer 26 IoCs
Processes:
resource yara_rule behavioral1/memory/3992-3-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-2-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-6-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-22-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-23-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-31-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-32-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-59-0x00000000741F0000-0x00000000747F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-60-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-70-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-71-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-72-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-73-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-74-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-75-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-76-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-77-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-78-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-79-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-80-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-81-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-95-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-96-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-97-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-98-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 behavioral1/memory/3992-101-0x00000000033A0000-0x00000000035F9000-memory.dmp family_vidar_v7 -
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 2812 chrome.exe 4040 chrome.exe 3460 chrome.exe 3832 chrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
InsstallingFileX64_1.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation InsstallingFileX64_1.exe -
Loads dropped DLL 2 IoCs
Processes:
InsstallingFileX64_1.exepid Process 3992 InsstallingFileX64_1.exe 3992 InsstallingFileX64_1.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
InsstallingFileX64_1.execmd.exetimeout.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InsstallingFileX64_1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
InsstallingFileX64_1.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 InsstallingFileX64_1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString InsstallingFileX64_1.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 1740 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 17 IoCs
Processes:
LogonUI.exechrome.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "130" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133762482273794398" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Modifies registry class 1 IoCs
Processes:
OpenWith.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000_Classes\Local Settings OpenWith.exe -
Processes:
InsstallingFileX64_1.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 InsstallingFileX64_1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 InsstallingFileX64_1.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
InsstallingFileX64_1.exechrome.exepid Process 3992 InsstallingFileX64_1.exe 3992 InsstallingFileX64_1.exe 3992 InsstallingFileX64_1.exe 3992 InsstallingFileX64_1.exe 3832 chrome.exe 3832 chrome.exe 3992 InsstallingFileX64_1.exe 3992 InsstallingFileX64_1.exe 3992 InsstallingFileX64_1.exe 3992 InsstallingFileX64_1.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe Token: SeShutdownPrivilege 3832 chrome.exe Token: SeCreatePagefilePrivilege 3832 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid Process 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe 3832 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
OpenWith.exeLogonUI.exepid Process 2380 OpenWith.exe 2380 OpenWith.exe 2380 OpenWith.exe 684 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
InsstallingFileX64_1.exechrome.exedescription pid Process procid_target PID 3992 wrote to memory of 3832 3992 InsstallingFileX64_1.exe 86 PID 3992 wrote to memory of 3832 3992 InsstallingFileX64_1.exe 86 PID 3832 wrote to memory of 4144 3832 chrome.exe 87 PID 3832 wrote to memory of 4144 3832 chrome.exe 87 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 4896 3832 chrome.exe 88 PID 3832 wrote to memory of 2664 3832 chrome.exe 89 PID 3832 wrote to memory of 2664 3832 chrome.exe 89 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90 PID 3832 wrote to memory of 2192 3832 chrome.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\InsstallingFileX64_1.exe"C:\Users\Admin\AppData\Local\Temp\InsstallingFileX64_1.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffeddbbcc40,0x7ffeddbbcc4c,0x7ffeddbbcc583⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1980,i,15927909988618110745,3655494004258444981,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1976 /prefetch:23⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1880,i,15927909988618110745,3655494004258444981,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2028 /prefetch:33⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,15927909988618110745,3655494004258444981,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2292 /prefetch:83⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,15927909988618110745,3655494004258444981,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3188 /prefetch:13⤵
- Uses browser remote debugging
PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,15927909988618110745,3655494004258444981,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3252 /prefetch:13⤵
- Uses browser remote debugging
PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4508,i,15927909988618110745,3655494004258444981,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4412 /prefetch:13⤵
- Uses browser remote debugging
PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4832,i,15927909988618110745,3655494004258444981,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4840 /prefetch:83⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4940,i,15927909988618110745,3655494004258444981,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4952 /prefetch:83⤵PID:404
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\FBFCAKKKFBGD" & exit2⤵
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1740
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4872
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2928
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2380
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a25055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:684
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD50b70f7a9d1495325e10cdcb10751a634
SHA1158867050129e2973e3ab7e0690660cbe169a710
SHA256be7fd6a5a0720e406f85fff09a282f5acc778f19f984149ba787c54d7c166c5b
SHA51237bfcd802a7d3ee228e66dba9fae946daf1c9043e7f7e4ebbf6d568b9f044b2564373982f04eb9bc58112ba20bae2f184f9ca31b1c46605397966f087725dd8b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
708KB
MD535e9daa54c3a4656932ed1ee01bbdd04
SHA1fbaa357eea75280035e1fb4662f77d20553b0ad8
SHA2563a415bb0d48677166ec1721bc6c4258932f2c5027adb640f2fe0ca67baab2db9
SHA512535fadb557b3f38a6055cedeb64df7a94fe24cf31a8cd10954f62b00053334632e73b9a392f749bda94933fe33b7f52ba5796af7db7c304db1d7f1381c2661bb
-
Filesize
406KB
MD5cbc8603c81af6c27986cf7d98a93be6c
SHA1e18d2c79e5a134135e65aad3656e57c384668e77
SHA256bdb2187235c64693e60f5769e7ef6224d1b006f02f1a1c8f02e83fa36fc92fa7
SHA5126062ecefb68d576dfcb63114957768bf13de5e567fa98886d3ced9c99ab666365cb072c2b44e55845e71622ea91834219ca4dbff62785a9d9f5eba4eb54e43dd
-
Filesize
638KB
MD5b326ac66c427f61d201a8b24cdae6cce
SHA1b428eeaef2350bda29dcb1566499ee23f6d9c227
SHA25691752753f22314118bdb70f7c85e68ef2098d02c69e0914f7a709c02ced8e4e2
SHA5126c8ad57f4ffc30739f508a875376025607f9b404741de3985666379f07881ad0f8fa7f53826d83029b81dfd29b93591040927264f940c78f5ff4aa2efd64229e
-
Filesize
476KB
MD57dc4519d4c3ebe497197b822d3f37d2e
SHA16ae56d8a432b71bad3cea185dce3236c7e9b55c4
SHA256b78bcc4dc24033bd5d1e000b8287830c0a6ee9826975629510fbb390cac78153
SHA512461dada0867164b5e7d4a4b9473dba8da0486f717ec2359d828f6e1a42965ed9c6d2efa86d8d462c7eef7e8546a9a32a63d4cf357eeb34aae88ebf310fc8f5ff
-
Filesize
592KB
MD5f2c900a71dc7fac0ad8c2c5f23764808
SHA132efeabf219d7acd79515935e3fcc46700782522
SHA256bb7d83ca175cac9d66a2393283805c599241b637b5fe7dce4ad7b0097f7163b2
SHA512d5a944df16bf8d068f7e9d3699b35d97e49138efe5a89ec7812b245291471ad2a08f542cfa19603ccf9db02220e7461551e8ff6d0f02b75619032481efe2739b
-
Filesize
13KB
MD52f55c1e30b99ba8d41b54be18cb038c5
SHA1ef065536fb5dd846d42c1763b24754c045035263
SHA256454c79b3a1608d552e39949fccb700075a406e766f2292644dd1466b0de13b4a
SHA512d87895b0500a432e9753a1f1f91d3a8e1255f34d6e87fdb8a8e4dc67e23b701dd8ad4b2686b865456cd2312a12778639b0564e7f911818876d7c3dbec750c901
-
Filesize
429KB
MD532459c6ae3091a21cbd0871f6eaba8c1
SHA18216ae5e53cb5ce6756777a62e65dbbb7beadf95
SHA2562c17604ab3f6674156b4fcc863cf2b541a7bd1069291537cb96b57317ea1273e
SHA51269a5b41c8db08b3ddfdf07e6a87e9f718d76e6fdc4dd5d94709f5dce1baa0eb02ff78bd7c64c0cd199ec17ad683af09fa67fede8e85872dfd84aacef0dbd5be9
-
Filesize
290KB
MD5b3676dd7fc21229d48ab678c941dd01f
SHA1d03da8283513954627022566932022d0e0ec1a07
SHA256c5bc8f28664571e1c1a863e60309a3c379ca341789146a32faa2c2f38af1c196
SHA51222349894042be26ba4c57146972a56401bcb882ab5ad85629363d770ac2f5748decc72e4771b66feda312a8fa8384db65962dde99993df4397885e60cb3638d2
-
Filesize
569KB
MD5e2d52768c3173947ee641dd99a888f2a
SHA1b1c0bf5db5ea9a7e376c98156f9538373bf3aa81
SHA25618473d669b6f59434f2b0a5ac6450e44b4e62a3a998abe36805a271942762d04
SHA51287e22cf11246b0ed454d8e46518bb092ef5bcab9e97b2a7d0d008c037b72b0fe0d2c8170786c78f9c32805188cd103f867da0af403c9706f12cd9747fe2c836c
-
Filesize
360KB
MD5633774789a0af56accc05c65109e0ddb
SHA1e296d4bdf0c000fa7f8fa41f9169030c251156f1
SHA256f7b13ac2465cc955b643ecbd3d32287639a0b525a2caecf88252f8e683aa6a7c
SHA512c475bea6f4007e50cab83dd3883cc49741e2fef0d66262f93b36a71fbd1c3e666e31f79faf5ac373b7952af585d14680fac4c23b0babebef2d88aa2f0ff9dc45
-
Filesize
1.0MB
MD5dd0b31c40a813632b0080bdd97f4146a
SHA19456a489959ebce066cedf76da798fcb88c3acab
SHA2562c54c5ebcf8035e602d90dcea0464df7a0668a224010bb2f61dc68a4b45350b9
SHA512efb23ae52c96c24a663b0324ad4dd7b8eb88e6b09004311ced6ec669617127e0c744315adced0b8d0a701255fe1b2ae311df997dfbe7e613ea4a1b9bf26ec9ba
-
Filesize
13KB
MD56359f2a3efb07d6534b2542d97227be9
SHA1e2465a8bc184bfb5dab7efb5f6a9ce69b70891ae
SHA2563409431f8964a718428ea3efd0f0845982918b80b9507b4e2ffbf5f387a86dad
SHA512525daf5aafe0bcdbd8a482dcea5ba84a8b3e107717d36908c182cd6157c4ef68c8a87ef95fa4a7c08f8c6af719fceb11fc88c25d10ec448764b493d847252dae
-
Filesize
685KB
MD5535fd6bd7d45bbea276a3e50e4e14744
SHA1425f7d3c95433c798b1cf5d7e719381f997cca3d
SHA2568b91628455ee0c2acbef82528caaa4867ce49d2eb798d37ca75646629ffffe60
SHA512cccfd09c0d9577124136a11a417e0157c77ae7cf77f43a90ea2250bbf899660aff3f9cb4e19fd3bbd4a7ff1feb4b0b97b64705f282e5559edc58892fda3f1d62
-
Filesize
452KB
MD5cdf0f1ad5dac6932940da12677b4db17
SHA173f8313caf241a310bc13b41400265ac2efd64e0
SHA25650fdbf74a59c76f2498e3b5815d40596894cc696e5ab9f80f8469d5358dd6bc0
SHA51252844c85a3f12cafd3a96b78845a5b04d5a2252511b6e93d3f91272174d11215a7b7f85f515cd2fd8d23f5af62c53f224f255001a701947682517fd5804cfd2c
-
Filesize
522KB
MD5bab97a6ea0ce12bf6dd149192686d73c
SHA104e76386ec01789d56ce21268adc2b22c8decdcd
SHA256f83653388546e722be0d8373a633316d5a0e44a98b0fe5fdc3c09903bf18b344
SHA5125bd96bc8848246b9d0bab30569d06c8e3158459432165b8fb2ba5cfc89902ffe83b5e6f8cbd76ebc9dc09df61578e9618a718c5ebebbfa1ca89c1a62f8252856
-
Filesize
9KB
MD5bb20d162644e0d22fc1187fc98f6723c
SHA13ed4febc5714d3de3153fe1a148c5c2f75dcd032
SHA2561dfbdae58e2ddbd24ae7881572683d43ffcead3aa69fb412231f3388d6181893
SHA51240da22ccd3a2b322ef6df0bff74498c41a04b5943f23f1ac0f2bb005c40a0bd3c7e5a1e1f7b3e523665dc2a0a76b45362c576f3adb9bc6665570026c46c35f80
-
Filesize
499KB
MD5c378add72efdd6f22283cfb6afdde63b
SHA1894ba7bb987636b14e5a78f761030d61a4f87267
SHA256b0305494169d373566465c722800a9af33a3337b3202edc486e466b133d40036
SHA512865ef195ddc2ad8729c64a0ecf5cfc06088d0b327b88d5fdaf2fb4ad66d9b8614a44e5e25812c8fa807b605924c437adfc7282d174338e106d81edb3613bf501
-
Filesize
12KB
MD5dcb7653e8875ec87a928de72da210418
SHA1503a5c93b9c7e64db94bca7c990c39469f8afe0e
SHA256f751a1979168e1ea0169f761567727448efc59c662f75ca59ca962d282621b0c
SHA5126b9f15888f0b000e2b30e8f5c9061aedd4c18d45b49550a25513731772ffb648c4a4440e3901f61bfc50a49f84d63ae170f4895c8b885587ab0da8b804377a52
-
Filesize
336KB
MD5946c29b70c649012248740b099043ef0
SHA11f805d8449419cf5b9d560b6822f3861d65e55bc
SHA2561efc1b6ab76dbb06615af34b8027eb039a03261aed8d538627720dc6fca77bf6
SHA51279b88654155babb8b3897da339327569688063f88055940508cf18c3f6a93ce4c9e1d400b9c087199d183f2f7048f80459d6e3514789443a47a85353ad8b1c9f
-
Filesize
1000B
MD556b8a8b4d7b5166a3bd9335a4e989297
SHA15b85908c79ff9cd66cb0a6f59f4e96fe7b8be445
SHA256f3afa7c541cffc83c23d0122f7c36f139a620dbbcdecae339fed4e9ddf5b00a8
SHA512bd8cf5e4166568cf28f99ec794fe48d0ec0b24dca243c0e320c63fc4f653cb9ea6b512f983fcef0f990b29160ae0e61cb3b6e60a63a5fa7890cd6f6bd25e94f9
-
Filesize
2KB
MD5b3772990dde45194647038d9f0801607
SHA131fb13e40954a93038504bb1d6c71f751eeacbb1
SHA256c3af2716bd6e46f38e61e13abddcefde52d3166106216d98af5ccbd3c6d57cdc
SHA5122fe9b09efe69ff2b230d53fcf57dcde20d0370643265d293f8b6028571bed3492a6bc6669c3068e9aea8f6df94fb3c9c7132d7e97f1f7083076f736dc0dadbd1
-
Filesize
923B
MD59c0bfb28fe4eb8edbb56e55b7e7eae8e
SHA138d6ac2c82bb2356382736493ed7d066cba6ea65
SHA25641285ee304e70327a8a054660b4b6e381dde943a96059a45addc701df18d1819
SHA512e05c5f6037c3d579902f9641d05b84bd88ce654d6171200e222e21d0e51c8b93756c319a67ea9d660294017da3e89047698a9c401055800b88763907ee0d28e6
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e