Overview
overview
10Static
static
1random.exe
windows7-x64
10random.exe
windows10-2004-x64
10$TEMP/Cm.potm
windows7-x64
3$TEMP/Cm.potm
windows10-2004-x64
1$TEMP/Contents.potm
windows7-x64
3$TEMP/Contents.potm
windows10-2004-x64
1$TEMP/Cont...g.potm
windows7-x64
3$TEMP/Cont...g.potm
windows10-2004-x64
1$TEMP/Elementary.potm
windows7-x64
3$TEMP/Elementary.potm
windows10-2004-x64
3$TEMP/Templates.potm
windows7-x64
3$TEMP/Templates.potm
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 15:29
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$TEMP/Cm.potm
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/Cm.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
$TEMP/Contents.potm
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$TEMP/Contents.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
$TEMP/Contributing.potm
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$TEMP/Contributing.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral9
Sample
$TEMP/Elementary.potm
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$TEMP/Elementary.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
$TEMP/Templates.potm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$TEMP/Templates.potm
Resource
win10v2004-20250207-en
General
-
Target
random.exe
-
Size
899KB
-
MD5
1e854cc21a0a1e0d4529eafa30f00c46
-
SHA1
7d46238f771042bee22b70555e69fbbecc556737
-
SHA256
435eaccabde5605bb4d9a13ae054c63dd4e5ad61025e0515702e8121cf0a9598
-
SHA512
278a7cee7819d5cc685dd9c075639968798341bac23718b15441d3b9b0d723eb7836e0329c5c5f096f54dcce826e8ea871d033385b72464637391a14b61f33fb
-
SSDEEP
24576:vZzss7nmV+EsC9s50bHp4H2gS1YuzusJGuYco03ddH:BI49EsqDH+cTG2NdH
Malware Config
Extracted
vidar
https://t.me/sok33tn
https://steamcommunity.com/profiles/76561199824159981
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Signatures
-
Detect Vidar Stealer 25 IoCs
resource yara_rule behavioral1/memory/2232-313-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-312-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-311-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-447-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-466-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-467-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-486-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-555-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-577-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-574-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-599-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-621-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-622-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-645-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-664-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-667-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-686-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-687-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-753-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-775-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-776-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-795-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-796-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-815-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 behavioral1/memory/2232-816-0x00000000035F0000-0x0000000003612000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 948 chrome.exe 1916 chrome.exe 1992 chrome.exe 2708 chrome.exe -
Executes dropped EXE 1 IoCs
pid Process 2232 Rna.com -
Loads dropped DLL 1 IoCs
pid Process 2320 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 760 tasklist.exe 332 tasklist.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\TakeEmphasis random.exe File opened for modification C:\Windows\OutstandingSpider random.exe File opened for modification C:\Windows\TeMatched random.exe File opened for modification C:\Windows\ArrangementsDark random.exe File opened for modification C:\Windows\EstimateLargely random.exe File opened for modification C:\Windows\FlowerAbroad random.exe File opened for modification C:\Windows\LancasterFocused random.exe File opened for modification C:\Windows\DesperateInserted random.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rna.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Rna.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Rna.com -
Delays execution with timeout.exe 1 IoCs
pid Process 2780 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Rna.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Rna.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Rna.com -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2232 Rna.com 2232 Rna.com 2232 Rna.com 2232 Rna.com 2232 Rna.com 948 chrome.exe 948 chrome.exe 2232 Rna.com 2232 Rna.com -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 760 tasklist.exe Token: SeDebugPrivilege 332 tasklist.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2232 Rna.com 2232 Rna.com 2232 Rna.com 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2232 Rna.com 2232 Rna.com 2232 Rna.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2320 2316 random.exe 31 PID 2316 wrote to memory of 2320 2316 random.exe 31 PID 2316 wrote to memory of 2320 2316 random.exe 31 PID 2316 wrote to memory of 2320 2316 random.exe 31 PID 2320 wrote to memory of 760 2320 cmd.exe 33 PID 2320 wrote to memory of 760 2320 cmd.exe 33 PID 2320 wrote to memory of 760 2320 cmd.exe 33 PID 2320 wrote to memory of 760 2320 cmd.exe 33 PID 2320 wrote to memory of 1936 2320 cmd.exe 34 PID 2320 wrote to memory of 1936 2320 cmd.exe 34 PID 2320 wrote to memory of 1936 2320 cmd.exe 34 PID 2320 wrote to memory of 1936 2320 cmd.exe 34 PID 2320 wrote to memory of 332 2320 cmd.exe 36 PID 2320 wrote to memory of 332 2320 cmd.exe 36 PID 2320 wrote to memory of 332 2320 cmd.exe 36 PID 2320 wrote to memory of 332 2320 cmd.exe 36 PID 2320 wrote to memory of 2020 2320 cmd.exe 37 PID 2320 wrote to memory of 2020 2320 cmd.exe 37 PID 2320 wrote to memory of 2020 2320 cmd.exe 37 PID 2320 wrote to memory of 2020 2320 cmd.exe 37 PID 2320 wrote to memory of 2396 2320 cmd.exe 38 PID 2320 wrote to memory of 2396 2320 cmd.exe 38 PID 2320 wrote to memory of 2396 2320 cmd.exe 38 PID 2320 wrote to memory of 2396 2320 cmd.exe 38 PID 2320 wrote to memory of 2144 2320 cmd.exe 39 PID 2320 wrote to memory of 2144 2320 cmd.exe 39 PID 2320 wrote to memory of 2144 2320 cmd.exe 39 PID 2320 wrote to memory of 2144 2320 cmd.exe 39 PID 2320 wrote to memory of 1728 2320 cmd.exe 40 PID 2320 wrote to memory of 1728 2320 cmd.exe 40 PID 2320 wrote to memory of 1728 2320 cmd.exe 40 PID 2320 wrote to memory of 1728 2320 cmd.exe 40 PID 2320 wrote to memory of 1776 2320 cmd.exe 41 PID 2320 wrote to memory of 1776 2320 cmd.exe 41 PID 2320 wrote to memory of 1776 2320 cmd.exe 41 PID 2320 wrote to memory of 1776 2320 cmd.exe 41 PID 2320 wrote to memory of 2340 2320 cmd.exe 42 PID 2320 wrote to memory of 2340 2320 cmd.exe 42 PID 2320 wrote to memory of 2340 2320 cmd.exe 42 PID 2320 wrote to memory of 2340 2320 cmd.exe 42 PID 2320 wrote to memory of 2232 2320 cmd.exe 43 PID 2320 wrote to memory of 2232 2320 cmd.exe 43 PID 2320 wrote to memory of 2232 2320 cmd.exe 43 PID 2320 wrote to memory of 2232 2320 cmd.exe 43 PID 2320 wrote to memory of 996 2320 cmd.exe 44 PID 2320 wrote to memory of 996 2320 cmd.exe 44 PID 2320 wrote to memory of 996 2320 cmd.exe 44 PID 2320 wrote to memory of 996 2320 cmd.exe 44 PID 2232 wrote to memory of 948 2232 Rna.com 46 PID 2232 wrote to memory of 948 2232 Rna.com 46 PID 2232 wrote to memory of 948 2232 Rna.com 46 PID 2232 wrote to memory of 948 2232 Rna.com 46 PID 948 wrote to memory of 1864 948 chrome.exe 47 PID 948 wrote to memory of 1864 948 chrome.exe 47 PID 948 wrote to memory of 1864 948 chrome.exe 47 PID 948 wrote to memory of 600 948 chrome.exe 48 PID 948 wrote to memory of 600 948 chrome.exe 48 PID 948 wrote to memory of 600 948 chrome.exe 48 PID 948 wrote to memory of 1428 948 chrome.exe 49 PID 948 wrote to memory of 1428 948 chrome.exe 49 PID 948 wrote to memory of 1428 948 chrome.exe 49 PID 948 wrote to memory of 1428 948 chrome.exe 49 PID 948 wrote to memory of 1428 948 chrome.exe 49 PID 948 wrote to memory of 1428 948 chrome.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Elementary.potm Elementary.potm.cmd & Elementary.potm.cmd2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:332
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1902443⤵
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Highest.potm3⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Region" Automobiles3⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 190244\Rna.com + Trials + Tour + Auditor + Indices + Interests + Bk + Not + Assessment 190244\Rna.com3⤵
- System Location Discovery: System Language Discovery
PID:1776
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Contributing.potm + ..\Cm.potm + ..\Contents.potm + ..\Templates.potm v3⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\190244\Rna.comRna.com v3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ec9758,0x7fef6ec9768,0x7fef6ec97785⤵PID:1864
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1320,i,15394641987554631059,9775083324453388355,131072 /prefetch:25⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1540 --field-trial-handle=1320,i,15394641987554631059,9775083324453388355,131072 /prefetch:85⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1320,i,15394641987554631059,9775083324453388355,131072 /prefetch:85⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2204 --field-trial-handle=1320,i,15394641987554631059,9775083324453388355,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2212 --field-trial-handle=1320,i,15394641987554631059,9775083324453388355,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3284 --field-trial-handle=1320,i,15394641987554631059,9775083324453388355,131072 /prefetch:25⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2640 --field-trial-handle=1320,i,15394641987554631059,9775083324453388355,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3512 --field-trial-handle=1320,i,15394641987554631059,9775083324453388355,131072 /prefetch:85⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1384 --field-trial-handle=1320,i,15394641987554631059,9775083324453388355,131072 /prefetch:85⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3720 --field-trial-handle=1320,i,15394641987554631059,9775083324453388355,131072 /prefetch:85⤵PID:760
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\190244\Rna.com" & rd /s /q "C:\ProgramData\kf37q" & exit4⤵
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2780
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:996
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1588
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ccb5d1b93ebb27f45e4090bb141cd0
SHA1bfa07d1a47c47299b0b24d0d3a0d348f07dd725b
SHA256d86e1bb092b24f126f0a6dcbb6f9b82a7f2d0efbb81ff6cfa9ba66274f6895e9
SHA512e092016ee8ba2718aa61662710a833a660cbbb52d9fe082c1bfcb9a19ee96096f333dde52510015a673989e17cd89a33bd877568226020cb3869b973deda4fcd
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
235KB
MD5c569f35663a912fa32a1da699ac19d87
SHA1e0393dccf2930891728f450b63f38576c5daea40
SHA2565cd7a32cc97c08f91b7a7744a8f54799ba0e412b2ec0443712e34375a6a85531
SHA5121296f1ce9efcacc3d49f4fbf51a456766a7897650ab7bb80660b817196dca97fa457d7edd1ca17a1d606b20921d7b667389e66c8e4aecf7fe84c3922bde5fdd3
-
Filesize
255KB
MD57a0bccb93c8a02edd1c5d9e05ddea967
SHA16bc4f53e75666537503e8817f6f56e85ebb9a019
SHA2567bb104d6e23ed9c640b2dd122daecd702820f2c47ed2209046d250d00a72fa74
SHA512a4beddddb1f6b5734f9b7ee68307593eee5c236c8f6f899a13d032aaafad477f40c8d79a308106c554ae6bf85547344e16fb36473fe3582f12e3c1e63fe55a9c
-
Filesize
58KB
MD50bd1586903baca9d97c9d6dca8c8c254
SHA1a6d50245b0d6b27c1ab432587b0ae894aead1e0d
SHA25654862593de36d2c535da78a7feaa625ad65c1b9a20b6748c8783ca86d84a1600
SHA51205ea18ca5a7c867c5b576c14997fab73cc2cdcafe669924f8e65a01454b8cb4cf34a35ec09a7c11a61611096bcf8859217f64654bb77fb6bd2f1919ed489abdc
-
Filesize
147KB
MD5b7a356482dac71856517da3a1d840a1e
SHA1d4f35e28a99e746de5e3595341c299ae1aae461a
SHA256ae6980a117468381369152ddce4327795268203b51d18ebd22758e05d21331fb
SHA512f86e35405370edb869a99d2c2707ca42533310e5f58e47252044cfbda3ef37659194cfd405d71772b6b66021d94254330556f3acceffebad326bef99d420db07
-
Filesize
2KB
MD55520ce6e83b85995a3f57f879e92433b
SHA141916f28b67c393a97a583be39c45434aec8f053
SHA25645048f13b1ef83fe730487316476ef75103b4b0cfcd3991982433140454b2ec8
SHA512531805a93f9ab4365b07f6ad8cc8e714bed300692bc3bbb3e4f092978f3f4500a82d58a121634cb6cec63f71f6c062007eab57df4c1c9d58099404bbbea91cc8
-
Filesize
144KB
MD5596aac015f900ac08aabc3f6e7ebcfe6
SHA188dfb592cb71f0b0a53ffe08c923ee5449b106d3
SHA256673af251fac4c441cd411f0dadc3c4659a96913fa04f8d8e58fbf29124304c83
SHA51265da9cf93d985410c34f7ed9545f9ae27ad52c612e06665aee0753a0e082161f2ee26ade91cde047a12e2951cefb804729d83ee8d370b8030b2b6adb265541e8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
88KB
MD5ea946bdf2f84accd7dfef4aadd7ceba0
SHA12b3e2257cb4132924adb6ffdf79c64ecd2e1bde7
SHA2562625c1467ac13734c7ac9d6440113895a5166f913fb6a48ccc3b1b479d1cbda3
SHA5127f3f9ca44c1ffec0f0b6b419d043c2f8547002e0d2139848787d077976591f01a9e77b960d95ae886ec4d9030293740d2f551851b053e827ffb8a00c6c810953
-
Filesize
68KB
MD53f570eacdb34cdf2de5cdf884b66a478
SHA1795922094e89040c2a901098dba1275f122f6e90
SHA2569fc76a453901a25a61c23c355bb8ffba38698fa841cfc2732c0de803a7167a52
SHA512dea0c493792e13d3e1f9bf64c884dd9b575f0dcd2aadf3a004ffa5c62d5c2b0488b4fb670c5bdbd8f2a5c7da0254c5fc3109255a0ac29831176683b6dc4f921a
-
Filesize
57KB
MD558324423292aba1fe85ce884cc359575
SHA179727d862731765ef1edabb4a42f8c315d525968
SHA25610353a8e746724e0238c59ffe82f8148241a9fd4788f8929e7e8985671a211e9
SHA512ec93064e909ee1aad291c59f09b3c1abb5afefeb4a988df29247aff1551c9525708068e4fb0d72014c6e207efc4e0bb656521be47f46c4b9a61c14034935fa48
-
Filesize
10KB
MD56d2e9bdc77ef7d4073fe0a23d24b7346
SHA133045b56a62059a14756b961a8e4220a09fb035c
SHA2566e44faaef0ad7290e3ecbeec66dde3b959460d650f252b62e6a294758d512313
SHA5128c8d7edcda2c371c06a6bc882e056163e072a40b15df581bd7c7558d5bebf0e67dba3695855c9ad213cf17838f7cee3a340fb7222e0ddfec84b8fb21f999cbf4
-
Filesize
477KB
MD54a77c3ab191f746d3b90e7edd7a690c1
SHA1b21a0452d3128c13f2156ca2d820a082daba8256
SHA256e26de0520cbb1674087230ddcde9666da01f7110ff2a6f93de61d0c1a3dad891
SHA5129484f6904ef6ade3967834b8ac9dce9a968954f20e25ffc5920dc43a64ec0ae308a17845e4c67ab9065aae78d0ce3be1b15b12335e2e1838cb805aa5611af3fe
-
Filesize
142KB
MD5166ac6a1dc2dfcb3c6060a5b9b486139
SHA13f5fd2334a522d0ef491564ee32aa75b60b6381a
SHA25662e5f6a2f8b69ca1c158c35171331911fe425a3f30ae7f1fcd2a729bf58542ea
SHA512b73c722624b7fa96065d6807c2fb2c89dee1a2ea0cbd191eba10f34b072e6b728c896cbd90948c3ded44ee9799dad39185f28bcae8aa66e1132ff2311f28a3ac
-
Filesize
141KB
MD54ca1a161dd4632039343b82db96400cf
SHA1554845c0de18cdae98ad03d5d56fa29bb289a70e
SHA2566fae2d1ff6a92c8baacf4729d4aa4dc86670538c4838c80f3d7e789937161f29
SHA512fa3382bb84a821d88734f625caf6cc49bc45347e16440f9bb1ab66d9e30e387dfece66e345be3f14ab9398c23b4623411189fd7ebdd6d1be660b4eaf1c52c86e
-
Filesize
58KB
MD59989fb1439ad4713d21c95cd32fbb324
SHA162d58a2ef4485af249b93d1b8efc55ec0c3edca5
SHA256825301cc30094a52596d9c65605286cf7b25fd75f81c75d4180b2ad928abeca2
SHA51294efeb94b04a2f561b9336546a14f980d883a2399dabc48c4af45314de5cfe285c79f6a363841d79351015bd74349aa843d962d5f6dec8e3f2b8e010c662681c
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
42KB
MD5d685b3edf1832219412c49c1849c909d
SHA140a8faa278c5f2e815b7d4995f77976503a93bd1
SHA2560012725c1b11f84029a45d7fbbc3a828acc9528b23ef8d56ffa11d6f9666373a
SHA5127fdf0b5e25293bdc6146497e28605c76cdb803d3edb7b509b582a3df7b5695384237dbbcf08ea25d8cfa21c0029ea7392dc34100e2c40ea52083cee6b6259d38
-
Filesize
113KB
MD57485c0fce23354afa6561551c1254076
SHA181fd42d1a52a7527ad93306aacaf08dbe55d3f78
SHA2561316f14c8d58696ab58c7f9a2d1027ce279a545357e803d890804a03a7541904
SHA512fdd06a49afca56e69705798a3b60686d5aea56952cb4af933962f745e2092bc8898c72cf5f9ff599e5de9be4ac823a0d8f0364645922e4ae27e71edc39ed0ba0
-
Filesize
120KB
MD556b7d6178c8dbac508d037cc5adc64b5
SHA15928e363f17ce6c67b7d07e29efe1bfe40a7d80a
SHA256e56bdaa45c504e01d1aee08291b9b1ac3344f18103da42e33067f9f43adec246
SHA512f486b565a6df99dd7d7ef7de7e62d5a155f4ef62314a1992319bfe25b5e672b718470e2ff684be07c7871e760562a14596e217ac70c98f07b224011e3209c31d
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f