Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b.exe
Resource
win7-20241023-en
General
-
Target
60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b.exe
-
Size
419KB
-
MD5
0b9795bc5978c62899793b157271e979
-
SHA1
d31405a2caf535d882fe873473df1badd7d5d028
-
SHA256
60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b
-
SHA512
ba7054eaa9ae5eb5a17fbb30a9ed0200cc11fee439d7795b6e78ea8fce3c5592ed6710eac1ecf5396ece510cf4972ae870e16de38af17580586cc39d0ad2387e
-
SSDEEP
12288:K3r16Nwm9j++TwWOQzHfFlQps+QMUoF9AFs7:K71wF++TLOYFl9MUo7AFs7
Malware Config
Extracted
stealc
default
http://92.255.57.89
-
url_path
/45c616e921a794b8.php
Signatures
-
Stealc family
-
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1684 chrome.exe 3224 msedge.exe 4752 msedge.exe 4964 msedge.exe 1464 msedge.exe 1228 chrome.exe 3804 chrome.exe 1448 chrome.exe 3616 msedge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b.exe -
Executes dropped EXE 1 IoCs
pid Process 2820 8BEF.tmp.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8BEF.tmp.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8BEF.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8BEF.tmp.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133783589238423281" chrome.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2820 8BEF.tmp.exe 2820 8BEF.tmp.exe 2820 8BEF.tmp.exe 2820 8BEF.tmp.exe 1684 chrome.exe 1684 chrome.exe 2820 8BEF.tmp.exe 2820 8BEF.tmp.exe 2820 8BEF.tmp.exe 2820 8BEF.tmp.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 2580 msedge.exe 2580 msedge.exe 3224 msedge.exe 3224 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 2820 8BEF.tmp.exe 2820 8BEF.tmp.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe Token: SeShutdownPrivilege 1684 chrome.exe Token: SeCreatePagefilePrivilege 1684 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 4220 60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4220 60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4220 wrote to memory of 2820 4220 60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b.exe 87 PID 4220 wrote to memory of 2820 4220 60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b.exe 87 PID 4220 wrote to memory of 2820 4220 60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b.exe 87 PID 2820 wrote to memory of 1684 2820 8BEF.tmp.exe 92 PID 2820 wrote to memory of 1684 2820 8BEF.tmp.exe 92 PID 1684 wrote to memory of 1108 1684 chrome.exe 93 PID 1684 wrote to memory of 1108 1684 chrome.exe 93 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 2932 1684 chrome.exe 94 PID 1684 wrote to memory of 4416 1684 chrome.exe 95 PID 1684 wrote to memory of 4416 1684 chrome.exe 95 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96 PID 1684 wrote to memory of 1996 1684 chrome.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b.exe"C:\Users\Admin\AppData\Local\Temp\60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\8BEF.tmp.exe"C:\Users\Admin\AppData\Local\Temp\8BEF.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffcbc3bcc40,0x7ffcbc3bcc4c,0x7ffcbc3bcc584⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1840,i,13959232568259015031,16226196250963002509,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1832 /prefetch:24⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2192,i,13959232568259015031,16226196250963002509,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2384 /prefetch:34⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,13959232568259015031,16226196250963002509,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2392 /prefetch:84⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3216,i,13959232568259015031,16226196250963002509,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3228 /prefetch:14⤵
- Uses browser remote debugging
PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3324,i,13959232568259015031,16226196250963002509,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3300 /prefetch:14⤵
- Uses browser remote debugging
PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4516,i,13959232568259015031,16226196250963002509,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4624 /prefetch:14⤵
- Uses browser remote debugging
PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4788,i,13959232568259015031,16226196250963002509,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4800 /prefetch:84⤵PID:4284
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffcd34746f8,0x7ffcd3474708,0x7ffcd34747184⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,8272481866101949523,6867106399574960885,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:24⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,8272481866101949523,6867106399574960885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,8272481866101949523,6867106399574960885,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:84⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2004,8272481866101949523,6867106399574960885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:14⤵
- Uses browser remote debugging
PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2004,8272481866101949523,6867106399574960885,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:14⤵
- Uses browser remote debugging
PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2004,8272481866101949523,6867106399574960885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:14⤵
- Uses browser remote debugging
PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2004,8272481866101949523,6867106399574960885,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:14⤵
- Uses browser remote debugging
PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,8272481866101949523,6867106399574960885,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:24⤵PID:928
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4088
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD51f3351ae60b2f69e8cf4cab1f262d09f
SHA1131f7ef95552acbe2375e64393b96027349d6872
SHA256acd68fefd44430cb8ee963e16c2dc16b967f33b7fe48e1ad39cf1c143905e8f0
SHA51200f26971bc3d67378e9c9660be4fb0bbd2fbd3b07dd60918e1688a6f605f90b77e69f11cda1b13c3af47e5cc58d7de8d81e8f0fa66ae8c756760053e7e5aff6c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\f8e4ced3-27fd-453c-86fb-dc9fede66614.dmp
Filesize888KB
MD5f98c2c6e7677c2b172afd839fe75a053
SHA1ea9f410e3e0821b1adb5afdc11452a8dbd8fe773
SHA256352f1bfa02ddb053b8607ee28eb3c24bb8b5b473d970344063686c75373c077f
SHA512be7af1d894145517c7d83605fb01e38e7f258c6a58883d3d9deff5a22cfc03cef03d337e69add2af3c6eeb0d7e92eb01274007cc9574b7f633e65a2d944e3fa8
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD5c9d505e9b29cf9851d32da3e1d89630d
SHA1307a9121ae6f9efc1d79a69fd7af4b3eb9d20406
SHA256200c5231f88add5571a3e3b9c445b14156d752cd4d94b979cc0607c70e14dc2f
SHA512b1d4bd113e3adf527b9632fdb62e77d57b0269f5e572ccc16743f0d7590db05dd8019e763da7eb9ea87ed719e14b8bd9bf57a5cb6c386b8f5945f822ad4b075f
-
Filesize
5KB
MD5810d157e148fdf7eb76ff15520039892
SHA1c26b41a22af3d8cf1b7754806095f1ebbe005b37
SHA256de76a875a6a76101fc7c09e9c3f3afa3be4ca4ec5393c1810129100ed1e28b68
SHA51266aa5c91294d5ca678adbbb2b7d519d1144968f6ccc598791d0d27f9494de1da21abc96561695aca1d659d4c3aaa4499b79d8a5586976c5e9c2c53ce3c9b804d
-
Filesize
297KB
MD59d773e345dca0487c5654a92e6340baa
SHA16db3a6b22e452ff6ba55bb28d78dca1ea0fdea6a
SHA256176ee771c395dc6748a4c973a15d53a5d68b9704989349a862714e4bdc0f9fda
SHA512a8d94374d51141fd9654e960e6b1f28fc10ace788bee77db1efe01aa1a3020cb7f53230238b832be1ebadfa73076ac51157d1c18175abee0fe66566a3d6786ac