Analysis
-
max time kernel
95s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2025, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
sex.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
sex.exe
Resource
win10v2004-20241007-en
General
-
Target
sex.exe
-
Size
6.1MB
-
MD5
06a11d92b4c9034fde9061fce77b5dfb
-
SHA1
6421a62fff6d51f57293b669b0083ed423566d80
-
SHA256
0ff1f7a2f230eb0c641dc7951cba276cf76c678ac0c0af337360d5594eacaaf2
-
SHA512
fa147a8047023094875b2e3305126a5de8c695e814320fd818ca2736d19fa08034528400b2d3afdbde981d1f49a06d532c32d3442c167ca23d610285e31e34e0
-
SSDEEP
196608:WSkSIlLTUcwti7TQl2NgVg01MWAXAkuujCPX9YG9he5GnQCAJKN:nkSopwtQQl2aOtXADu8X9Y95GQLJ
Malware Config
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0009000000023cac-7.dat family_asyncrat -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 6 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1640 msedge.exe 2312 msedge.exe 5004 chrome.exe 3804 chrome.exe 5048 chrome.exe 3532 chrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation sex.exe -
Executes dropped EXE 6 IoCs
pid Process 5100 svchost.exe 4072 svchost.exe 4340 svchost.exe 1812 svchost.exe 716 svchost.exe 4404 svchost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sex.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sex.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sex.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 raw.githubusercontent.com 4 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 icanhazip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2972 cmd.exe 3068 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 sex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier sex.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4912 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 2752 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 5004 chrome.exe 5004 chrome.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 1652 sex.exe 4116 msedge.exe 4116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1652 sex.exe Token: SeIncreaseQuotaPrivilege 5100 svchost.exe Token: SeSecurityPrivilege 5100 svchost.exe Token: SeTakeOwnershipPrivilege 5100 svchost.exe Token: SeLoadDriverPrivilege 5100 svchost.exe Token: SeSystemProfilePrivilege 5100 svchost.exe Token: SeSystemtimePrivilege 5100 svchost.exe Token: SeProfSingleProcessPrivilege 5100 svchost.exe Token: SeIncBasePriorityPrivilege 5100 svchost.exe Token: SeCreatePagefilePrivilege 5100 svchost.exe Token: SeBackupPrivilege 5100 svchost.exe Token: SeRestorePrivilege 5100 svchost.exe Token: SeShutdownPrivilege 5100 svchost.exe Token: SeDebugPrivilege 5100 svchost.exe Token: SeSystemEnvironmentPrivilege 5100 svchost.exe Token: SeRemoteShutdownPrivilege 5100 svchost.exe Token: SeUndockPrivilege 5100 svchost.exe Token: SeManageVolumePrivilege 5100 svchost.exe Token: 33 5100 svchost.exe Token: 34 5100 svchost.exe Token: 35 5100 svchost.exe Token: 36 5100 svchost.exe Token: SeIncreaseQuotaPrivilege 4072 svchost.exe Token: SeSecurityPrivilege 4072 svchost.exe Token: SeTakeOwnershipPrivilege 4072 svchost.exe Token: SeLoadDriverPrivilege 4072 svchost.exe Token: SeSystemProfilePrivilege 4072 svchost.exe Token: SeSystemtimePrivilege 4072 svchost.exe Token: SeProfSingleProcessPrivilege 4072 svchost.exe Token: SeIncBasePriorityPrivilege 4072 svchost.exe Token: SeCreatePagefilePrivilege 4072 svchost.exe Token: SeBackupPrivilege 4072 svchost.exe Token: SeRestorePrivilege 4072 svchost.exe Token: SeShutdownPrivilege 4072 svchost.exe Token: SeDebugPrivilege 4072 svchost.exe Token: SeSystemEnvironmentPrivilege 4072 svchost.exe Token: SeRemoteShutdownPrivilege 4072 svchost.exe Token: SeUndockPrivilege 4072 svchost.exe Token: SeManageVolumePrivilege 4072 svchost.exe Token: 33 4072 svchost.exe Token: 34 4072 svchost.exe Token: 35 4072 svchost.exe Token: 36 4072 svchost.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeSecurityPrivilege 4180 msiexec.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeShutdownPrivilege 5004 chrome.exe Token: SeCreatePagefilePrivilege 5004 chrome.exe Token: SeIncreaseQuotaPrivilege 4340 svchost.exe Token: SeSecurityPrivilege 4340 svchost.exe Token: SeTakeOwnershipPrivilege 4340 svchost.exe Token: SeLoadDriverPrivilege 4340 svchost.exe Token: SeSystemProfilePrivilege 4340 svchost.exe Token: SeSystemtimePrivilege 4340 svchost.exe Token: SeProfSingleProcessPrivilege 4340 svchost.exe Token: SeIncBasePriorityPrivilege 4340 svchost.exe Token: SeCreatePagefilePrivilege 4340 svchost.exe Token: SeBackupPrivilege 4340 svchost.exe Token: SeRestorePrivilege 4340 svchost.exe Token: SeShutdownPrivilege 4340 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5004 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1652 wrote to memory of 5100 1652 sex.exe 83 PID 1652 wrote to memory of 5100 1652 sex.exe 83 PID 1652 wrote to memory of 4072 1652 sex.exe 87 PID 1652 wrote to memory of 4072 1652 sex.exe 87 PID 1652 wrote to memory of 5004 1652 sex.exe 90 PID 1652 wrote to memory of 5004 1652 sex.exe 90 PID 5004 wrote to memory of 1500 5004 chrome.exe 91 PID 5004 wrote to memory of 1500 5004 chrome.exe 91 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 2216 5004 chrome.exe 92 PID 5004 wrote to memory of 1240 5004 chrome.exe 93 PID 5004 wrote to memory of 1240 5004 chrome.exe 93 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 PID 5004 wrote to memory of 3708 5004 chrome.exe 94 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sex.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sex.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sex.exe"C:\Users\Admin\AppData\Local\Temp\sex.exe"1⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1652 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff97110cc40,0x7ff97110cc4c,0x7ff97110cc583⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-logging --headless=new --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --disable-logging --field-trial-handle=1908,i,16389246902123346782,5984859772190401761,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1904 /prefetch:23⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=1864,i,16389246902123346782,5984859772190401761,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2052 /prefetch:33⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=2176,i,16389246902123346782,5984859772190401761,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2356 /prefetch:83⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3060,i,16389246902123346782,5984859772190401761,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3112 /prefetch:13⤵
- Uses browser remote debugging
PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3068,i,16389246902123346782,5984859772190401761,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:13⤵
- Uses browser remote debugging
PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4376,i,16389246902123346782,5984859772190401761,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1868 /prefetch:13⤵
- Uses browser remote debugging
PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=4644,i,16389246902123346782,5984859772190401761,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4656 /prefetch:83⤵PID:4380
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2972 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3572
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3068
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:3832
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵PID:3648
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:2732
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2196
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
PID:1640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff9708b46f8,0x7ff9708b4708,0x7ff9708b47183⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1488,6810339183591379772,12669769023515867948,131072 --disable-features=PaintHolding --disable-logging --headless=new --headless --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --override-use-software-gl-for-tests --disable-logging --mojo-platform-channel-handle=1496 /prefetch:23⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1488,6810339183591379772,12669769023515867948,131072 --disable-features=PaintHolding --lang=en-US --service-sandbox-type=none --use-gl=swiftshader-webgl --headless --disable-logging --mojo-platform-channel-handle=1824 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-logging --remote-debugging-port=9222 --allow-pre-commit-input --field-trial-handle=1488,6810339183591379772,12669769023515867948,131072 --disable-features=PaintHolding --disable-gpu-compositing --lang=en-US --headless --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2012 /prefetch:13⤵
- Uses browser remote debugging
PID:2312
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
PID:1812
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
PID:716
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
PID:4404
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\f230b58f-f992-4b47-8126-0985f021b76a.bat"2⤵PID:4128
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:980
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 16523⤵
- Kills process with taskkill
PID:2752
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:4912
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3392
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\8f814691a265f26cbe5462697e67230e\Admin@YQRLKYON_en-US\Browsers\Firefox\Bookmarks.txt
Filesize220B
MD52ab1fd921b6c195114e506007ba9fe05
SHA190033c6ee56461ca959482c9692cf6cfb6c5c6af
SHA256c79cfdd6d0757eb52fbb021e7f0da1a2a8f1dd81dcd3a4e62239778545a09ecc
SHA5124f0570d7c7762ecb4dcf3171ae67da3c56aa044419695e5a05f318e550f1a910a616f5691b15abfe831b654718ec97a534914bd172aa7a963609ebd8e1fae0a5
-
Filesize
6KB
MD5c9c3d516d2d6b1ae4aa82d30a8d88df5
SHA11d4686fcfd73561f2831b694d46970482de9e5e2
SHA256c08d84b922fee399b0789cced5b0a4998d7250f3f7f4ef76febd6ba1fd1ee0fa
SHA5123c602eae150154eefb8adcc386eb1a4ad7d7430d3f8caf5099c12a182d0c6fe11110ef4b44f22b5c707db326bb49ef2b950438b7066c53107d5127d731ed269e
-
C:\Users\Admin\AppData\Local\8f814691a265f26cbe5462697e67230e\Admin@YQRLKYON_en-US\System\Process.txt
Filesize3KB
MD59b61f3b472d285ddac337f6e367624e5
SHA1c589f0417440233c9e1078e82e9c29b7fc769e48
SHA256ce8a3d7fe52adf9cae9e06cee8120ca837d32a431477ae63c587c1bd6b517bec
SHA512f27ff4aa9419f0ecf715d1a0c97d5108c9b2f319e1aad5027874660a906104c2f081299e93ee1671f21af5149fbc421c311458fca98ff41fc1b6333b8fd47d3e
-
C:\Users\Admin\AppData\Local\8f814691a265f26cbe5462697e67230e\Admin@YQRLKYON_en-US\System\Process.txt
Filesize4KB
MD5944504cda1a9f96a20eff9345b54b2d9
SHA1770c8b3cb9c6d8623a839df2d2bff54e66754e97
SHA2569f9f3d49ef0ea651b86000b1a523e784e05a56ff775d19cfa22d9e0f6db27e04
SHA5125228ede58dd873402d60e7dc5d00f1ce6bfed90c9eee833d58479e78a4a33b3063e4add6e5318125668537788f086cacadfc1c152fa346faa0499fc84da6ce95
-
C:\Users\Admin\AppData\Local\8f814691a265f26cbe5462697e67230e\Admin@YQRLKYON_en-US\System\Process.txt
Filesize908B
MD5f2fa07d9e920638dc9e56ba20447e176
SHA1e9403b79394550cfb91b20d4df8fddbf10147bd1
SHA25621f9965dc99e0985c921e59e6cb2b5e7e80e5903ed57b6fd1c52406bbd2abe72
SHA5120d12429332aad93b8fb97d66d5413bdceb464b84b70fce62a6439a4630aa04ad4527251525e02714a4864a75fea9847acc61bd92417926bf998b4f7059423d5a
-
C:\Users\Admin\AppData\Local\8f814691a265f26cbe5462697e67230e\Admin@YQRLKYON_en-US\System\Process.txt
Filesize2KB
MD5f1899b639533f992c2760d2b292aa3b5
SHA1fce74f84b2b10345fb636bdab501fda3a4fa0e29
SHA256fb87ca690d94da6f998fd7f173649ecf3c6344551b11044bf436c563df771125
SHA512c3e67940ee3e30f17be4901a22a08206de5ebc4f3788d1a87d1da9cecd399a99fbae0a9a33b75627bd39530de19a336f4b03aa458880e3106c11cd4404543331
-
Filesize
2B
MD5a684eceee76fc522773286a895bc8436
SHA180e28a51cbc26fa4bd34938c5e593b36146f5e0c
SHA2562fca346db656187102ce806ac732e06a62df0dbb2829e511a770556d398e1a6e
SHA512cfcfd1f0065f20812e51031bd692544218a8441d74e20053530afa0a1633cc12904cb593cb4bf6707b4ffdef727ae9140e052dc0c15117c684286f4adbd9f9d6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD580fb3fa4b96be02f2bc069378ab56a6e
SHA1982233e87e654608fed66180aed9646690a60db2
SHA2562b2fd3893a6b5af3d8bfb3cadb544d77f780adf4298df7c9283dd20b6aa6d693
SHA5122153b6d2ad272b9928fa573278e7bc0130c8a55382daf8a4d123e6000af4ba80f0d72bb6b66cf904369b75b268835c580ec1db7657487309c2852a1beaa65d6a
-
Filesize
63KB
MD567ca41c73d556cc4cfc67fc5b425bbbd
SHA1ada7f812cd581c493630eca83bf38c0f8b32b186
SHA25623d2e491a8c7f2f7f344764e6879d9566c9a3e55a3788038e48b346c068dde5b
SHA5120dceb6468147cd2497adf31843389a78460ed5abe2c5a13488fc55a2d202ee6ce0271821d3cf12bc1f09a4d6b79a737ea3bccfc2bb87f89b3fff6410fa85ec02