Overview
overview
10Static
static
19YWF7_random.exe
windows7-x64
109YWF7_random.exe
windows10-2004-x64
10$TEMP/Cm.potm
windows7-x64
3$TEMP/Cm.potm
windows10-2004-x64
3$TEMP/Contents.potm
windows7-x64
3$TEMP/Contents.potm
windows10-2004-x64
3$TEMP/Cont...g.potm
windows7-x64
3$TEMP/Cont...g.potm
windows10-2004-x64
3$TEMP/Elementary.potm
windows7-x64
3$TEMP/Elementary.potm
windows10-2004-x64
1$TEMP/Templates.potm
windows7-x64
3$TEMP/Templates.potm
windows10-2004-x64
1Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 18:07
Static task
static1
Behavioral task
behavioral1
Sample
9YWF7_random.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9YWF7_random.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$TEMP/Cm.potm
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$TEMP/Cm.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
$TEMP/Contents.potm
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$TEMP/Contents.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
$TEMP/Contributing.potm
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$TEMP/Contributing.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral9
Sample
$TEMP/Elementary.potm
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$TEMP/Elementary.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
$TEMP/Templates.potm
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$TEMP/Templates.potm
Resource
win10v2004-20250207-en
General
-
Target
9YWF7_random.exe
-
Size
899KB
-
MD5
1e854cc21a0a1e0d4529eafa30f00c46
-
SHA1
7d46238f771042bee22b70555e69fbbecc556737
-
SHA256
435eaccabde5605bb4d9a13ae054c63dd4e5ad61025e0515702e8121cf0a9598
-
SHA512
278a7cee7819d5cc685dd9c075639968798341bac23718b15441d3b9b0d723eb7836e0329c5c5f096f54dcce826e8ea871d033385b72464637391a14b61f33fb
-
SSDEEP
24576:vZzss7nmV+EsC9s50bHp4H2gS1YuzusJGuYco03ddH:BI49EsqDH+cTG2NdH
Malware Config
Extracted
vidar
https://t.me/sok33tn
https://steamcommunity.com/profiles/76561199824159981
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Signatures
-
Detect Vidar Stealer 26 IoCs
resource yara_rule behavioral1/memory/2028-311-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-313-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-312-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-455-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-474-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-493-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-494-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-557-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-580-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-577-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-602-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-624-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-625-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-648-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-667-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-670-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-689-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-690-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-691-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-756-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-778-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-779-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-798-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-799-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-800-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 behavioral1/memory/2028-819-0x0000000003C20000-0x0000000003C42000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1520 chrome.exe 796 chrome.exe 3036 chrome.exe 2752 chrome.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 Rna.com -
Loads dropped DLL 1 IoCs
pid Process 2396 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1216 tasklist.exe 1372 tasklist.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\DesperateInserted 9YWF7_random.exe File opened for modification C:\Windows\TakeEmphasis 9YWF7_random.exe File opened for modification C:\Windows\OutstandingSpider 9YWF7_random.exe File opened for modification C:\Windows\TeMatched 9YWF7_random.exe File opened for modification C:\Windows\ArrangementsDark 9YWF7_random.exe File opened for modification C:\Windows\EstimateLargely 9YWF7_random.exe File opened for modification C:\Windows\FlowerAbroad 9YWF7_random.exe File opened for modification C:\Windows\LancasterFocused 9YWF7_random.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9YWF7_random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rna.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Rna.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Rna.com -
Delays execution with timeout.exe 1 IoCs
pid Process 2492 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Rna.com Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Rna.com Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Rna.com -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2028 Rna.com 2028 Rna.com 2028 Rna.com 2028 Rna.com 2028 Rna.com 1520 chrome.exe 1520 chrome.exe 2028 Rna.com 2028 Rna.com -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 1216 tasklist.exe Token: SeDebugPrivilege 1372 tasklist.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2028 Rna.com 2028 Rna.com 2028 Rna.com 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2028 Rna.com 2028 Rna.com 2028 Rna.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 796 wrote to memory of 2396 796 9YWF7_random.exe 29 PID 796 wrote to memory of 2396 796 9YWF7_random.exe 29 PID 796 wrote to memory of 2396 796 9YWF7_random.exe 29 PID 796 wrote to memory of 2396 796 9YWF7_random.exe 29 PID 2396 wrote to memory of 1216 2396 cmd.exe 31 PID 2396 wrote to memory of 1216 2396 cmd.exe 31 PID 2396 wrote to memory of 1216 2396 cmd.exe 31 PID 2396 wrote to memory of 1216 2396 cmd.exe 31 PID 2396 wrote to memory of 540 2396 cmd.exe 32 PID 2396 wrote to memory of 540 2396 cmd.exe 32 PID 2396 wrote to memory of 540 2396 cmd.exe 32 PID 2396 wrote to memory of 540 2396 cmd.exe 32 PID 2396 wrote to memory of 1372 2396 cmd.exe 34 PID 2396 wrote to memory of 1372 2396 cmd.exe 34 PID 2396 wrote to memory of 1372 2396 cmd.exe 34 PID 2396 wrote to memory of 1372 2396 cmd.exe 34 PID 2396 wrote to memory of 1644 2396 cmd.exe 35 PID 2396 wrote to memory of 1644 2396 cmd.exe 35 PID 2396 wrote to memory of 1644 2396 cmd.exe 35 PID 2396 wrote to memory of 1644 2396 cmd.exe 35 PID 2396 wrote to memory of 2176 2396 cmd.exe 36 PID 2396 wrote to memory of 2176 2396 cmd.exe 36 PID 2396 wrote to memory of 2176 2396 cmd.exe 36 PID 2396 wrote to memory of 2176 2396 cmd.exe 36 PID 2396 wrote to memory of 676 2396 cmd.exe 37 PID 2396 wrote to memory of 676 2396 cmd.exe 37 PID 2396 wrote to memory of 676 2396 cmd.exe 37 PID 2396 wrote to memory of 676 2396 cmd.exe 37 PID 2396 wrote to memory of 2528 2396 cmd.exe 38 PID 2396 wrote to memory of 2528 2396 cmd.exe 38 PID 2396 wrote to memory of 2528 2396 cmd.exe 38 PID 2396 wrote to memory of 2528 2396 cmd.exe 38 PID 2396 wrote to memory of 1008 2396 cmd.exe 39 PID 2396 wrote to memory of 1008 2396 cmd.exe 39 PID 2396 wrote to memory of 1008 2396 cmd.exe 39 PID 2396 wrote to memory of 1008 2396 cmd.exe 39 PID 2396 wrote to memory of 1748 2396 cmd.exe 40 PID 2396 wrote to memory of 1748 2396 cmd.exe 40 PID 2396 wrote to memory of 1748 2396 cmd.exe 40 PID 2396 wrote to memory of 1748 2396 cmd.exe 40 PID 2396 wrote to memory of 2028 2396 cmd.exe 41 PID 2396 wrote to memory of 2028 2396 cmd.exe 41 PID 2396 wrote to memory of 2028 2396 cmd.exe 41 PID 2396 wrote to memory of 2028 2396 cmd.exe 41 PID 2396 wrote to memory of 1816 2396 cmd.exe 42 PID 2396 wrote to memory of 1816 2396 cmd.exe 42 PID 2396 wrote to memory of 1816 2396 cmd.exe 42 PID 2396 wrote to memory of 1816 2396 cmd.exe 42 PID 2028 wrote to memory of 1520 2028 Rna.com 44 PID 2028 wrote to memory of 1520 2028 Rna.com 44 PID 2028 wrote to memory of 1520 2028 Rna.com 44 PID 2028 wrote to memory of 1520 2028 Rna.com 44 PID 1520 wrote to memory of 2044 1520 chrome.exe 45 PID 1520 wrote to memory of 2044 1520 chrome.exe 45 PID 1520 wrote to memory of 2044 1520 chrome.exe 45 PID 1520 wrote to memory of 1724 1520 chrome.exe 46 PID 1520 wrote to memory of 1724 1520 chrome.exe 46 PID 1520 wrote to memory of 1724 1520 chrome.exe 46 PID 1520 wrote to memory of 1728 1520 chrome.exe 47 PID 1520 wrote to memory of 1728 1520 chrome.exe 47 PID 1520 wrote to memory of 1728 1520 chrome.exe 47 PID 1520 wrote to memory of 1728 1520 chrome.exe 47 PID 1520 wrote to memory of 1728 1520 chrome.exe 47 PID 1520 wrote to memory of 1728 1520 chrome.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\9YWF7_random.exe"C:\Users\Admin\AppData\Local\Temp\9YWF7_random.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Elementary.potm Elementary.potm.cmd & Elementary.potm.cmd2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:540
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:1644
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1902443⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Highest.potm3⤵
- System Location Discovery: System Language Discovery
PID:676
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Region" Automobiles3⤵
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 190244\Rna.com + Trials + Tour + Auditor + Indices + Interests + Bk + Not + Assessment 190244\Rna.com3⤵
- System Location Discovery: System Language Discovery
PID:1008
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Contributing.potm + ..\Cm.potm + ..\Contents.potm + ..\Templates.potm v3⤵
- System Location Discovery: System Language Discovery
PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\190244\Rna.comRna.com v3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6db9758,0x7fef6db9768,0x7fef6db97785⤵PID:2044
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1180,i,1527428556342386048,6316281808394124427,131072 /prefetch:25⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1180,i,1527428556342386048,6316281808394124427,131072 /prefetch:85⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1580 --field-trial-handle=1180,i,1527428556342386048,6316281808394124427,131072 /prefetch:85⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2344 --field-trial-handle=1180,i,1527428556342386048,6316281808394124427,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2356 --field-trial-handle=1180,i,1527428556342386048,6316281808394124427,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3272 --field-trial-handle=1180,i,1527428556342386048,6316281808394124427,131072 /prefetch:25⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3376 --field-trial-handle=1180,i,1527428556342386048,6316281808394124427,131072 /prefetch:25⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2212 --field-trial-handle=1180,i,1527428556342386048,6316281808394124427,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3504 --field-trial-handle=1180,i,1527428556342386048,6316281808394124427,131072 /prefetch:85⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3616 --field-trial-handle=1180,i,1527428556342386048,6316281808394124427,131072 /prefetch:85⤵PID:2964
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\190244\Rna.com" & rd /s /q "C:\ProgramData\cj58q" & exit4⤵
- System Location Discovery: System Language Discovery
PID:1564 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2492
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:1816
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1548
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53df42bd7fb3f9408971a3b9f83400ed6
SHA1c7333c37a6d36485c239bf9bac4d9f716e10b264
SHA256d6f4c53a70506610f1c19ffa92a93412da4b12d2737a52b6bdba1d481e4fd73e
SHA512dc3fcd12322226d3efb8b8c4b608509657c3018dbe09f7d04a5ae46735a2a7b8ea25afc5a32e2d16b0bdbc60589e3d5121d05e7b4fcbfa6db83c588e421a6cbf
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
2KB
MD53337e98d0dc3cbd9a354d9bee6151471
SHA1ef39c95f8f3b37c9664139f9019bba2834fcdd84
SHA2569f57412db4a30c849f6d1ac5a05cc5ce6dae560ab15cc6b650eefe3211bedd8c
SHA51244cf758e6026bdb8921f9571824935af69a1f67d7c448c919ffa94c34e93f831f829e6421135046dee7d6c6af2d78809e02b6261589fd6fea0661bf3b27ff8e6
-
Filesize
255KB
MD57a0bccb93c8a02edd1c5d9e05ddea967
SHA16bc4f53e75666537503e8817f6f56e85ebb9a019
SHA2567bb104d6e23ed9c640b2dd122daecd702820f2c47ed2209046d250d00a72fa74
SHA512a4beddddb1f6b5734f9b7ee68307593eee5c236c8f6f899a13d032aaafad477f40c8d79a308106c554ae6bf85547344e16fb36473fe3582f12e3c1e63fe55a9c
-
Filesize
58KB
MD50bd1586903baca9d97c9d6dca8c8c254
SHA1a6d50245b0d6b27c1ab432587b0ae894aead1e0d
SHA25654862593de36d2c535da78a7feaa625ad65c1b9a20b6748c8783ca86d84a1600
SHA51205ea18ca5a7c867c5b576c14997fab73cc2cdcafe669924f8e65a01454b8cb4cf34a35ec09a7c11a61611096bcf8859217f64654bb77fb6bd2f1919ed489abdc
-
Filesize
147KB
MD5b7a356482dac71856517da3a1d840a1e
SHA1d4f35e28a99e746de5e3595341c299ae1aae461a
SHA256ae6980a117468381369152ddce4327795268203b51d18ebd22758e05d21331fb
SHA512f86e35405370edb869a99d2c2707ca42533310e5f58e47252044cfbda3ef37659194cfd405d71772b6b66021d94254330556f3acceffebad326bef99d420db07
-
Filesize
2KB
MD55520ce6e83b85995a3f57f879e92433b
SHA141916f28b67c393a97a583be39c45434aec8f053
SHA25645048f13b1ef83fe730487316476ef75103b4b0cfcd3991982433140454b2ec8
SHA512531805a93f9ab4365b07f6ad8cc8e714bed300692bc3bbb3e4f092978f3f4500a82d58a121634cb6cec63f71f6c062007eab57df4c1c9d58099404bbbea91cc8
-
Filesize
144KB
MD5596aac015f900ac08aabc3f6e7ebcfe6
SHA188dfb592cb71f0b0a53ffe08c923ee5449b106d3
SHA256673af251fac4c441cd411f0dadc3c4659a96913fa04f8d8e58fbf29124304c83
SHA51265da9cf93d985410c34f7ed9545f9ae27ad52c612e06665aee0753a0e082161f2ee26ade91cde047a12e2951cefb804729d83ee8d370b8030b2b6adb265541e8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
88KB
MD5ea946bdf2f84accd7dfef4aadd7ceba0
SHA12b3e2257cb4132924adb6ffdf79c64ecd2e1bde7
SHA2562625c1467ac13734c7ac9d6440113895a5166f913fb6a48ccc3b1b479d1cbda3
SHA5127f3f9ca44c1ffec0f0b6b419d043c2f8547002e0d2139848787d077976591f01a9e77b960d95ae886ec4d9030293740d2f551851b053e827ffb8a00c6c810953
-
Filesize
68KB
MD53f570eacdb34cdf2de5cdf884b66a478
SHA1795922094e89040c2a901098dba1275f122f6e90
SHA2569fc76a453901a25a61c23c355bb8ffba38698fa841cfc2732c0de803a7167a52
SHA512dea0c493792e13d3e1f9bf64c884dd9b575f0dcd2aadf3a004ffa5c62d5c2b0488b4fb670c5bdbd8f2a5c7da0254c5fc3109255a0ac29831176683b6dc4f921a
-
Filesize
57KB
MD558324423292aba1fe85ce884cc359575
SHA179727d862731765ef1edabb4a42f8c315d525968
SHA25610353a8e746724e0238c59ffe82f8148241a9fd4788f8929e7e8985671a211e9
SHA512ec93064e909ee1aad291c59f09b3c1abb5afefeb4a988df29247aff1551c9525708068e4fb0d72014c6e207efc4e0bb656521be47f46c4b9a61c14034935fa48
-
Filesize
10KB
MD56d2e9bdc77ef7d4073fe0a23d24b7346
SHA133045b56a62059a14756b961a8e4220a09fb035c
SHA2566e44faaef0ad7290e3ecbeec66dde3b959460d650f252b62e6a294758d512313
SHA5128c8d7edcda2c371c06a6bc882e056163e072a40b15df581bd7c7558d5bebf0e67dba3695855c9ad213cf17838f7cee3a340fb7222e0ddfec84b8fb21f999cbf4
-
Filesize
477KB
MD54a77c3ab191f746d3b90e7edd7a690c1
SHA1b21a0452d3128c13f2156ca2d820a082daba8256
SHA256e26de0520cbb1674087230ddcde9666da01f7110ff2a6f93de61d0c1a3dad891
SHA5129484f6904ef6ade3967834b8ac9dce9a968954f20e25ffc5920dc43a64ec0ae308a17845e4c67ab9065aae78d0ce3be1b15b12335e2e1838cb805aa5611af3fe
-
Filesize
142KB
MD5166ac6a1dc2dfcb3c6060a5b9b486139
SHA13f5fd2334a522d0ef491564ee32aa75b60b6381a
SHA25662e5f6a2f8b69ca1c158c35171331911fe425a3f30ae7f1fcd2a729bf58542ea
SHA512b73c722624b7fa96065d6807c2fb2c89dee1a2ea0cbd191eba10f34b072e6b728c896cbd90948c3ded44ee9799dad39185f28bcae8aa66e1132ff2311f28a3ac
-
Filesize
141KB
MD54ca1a161dd4632039343b82db96400cf
SHA1554845c0de18cdae98ad03d5d56fa29bb289a70e
SHA2566fae2d1ff6a92c8baacf4729d4aa4dc86670538c4838c80f3d7e789937161f29
SHA512fa3382bb84a821d88734f625caf6cc49bc45347e16440f9bb1ab66d9e30e387dfece66e345be3f14ab9398c23b4623411189fd7ebdd6d1be660b4eaf1c52c86e
-
Filesize
58KB
MD59989fb1439ad4713d21c95cd32fbb324
SHA162d58a2ef4485af249b93d1b8efc55ec0c3edca5
SHA256825301cc30094a52596d9c65605286cf7b25fd75f81c75d4180b2ad928abeca2
SHA51294efeb94b04a2f561b9336546a14f980d883a2399dabc48c4af45314de5cfe285c79f6a363841d79351015bd74349aa843d962d5f6dec8e3f2b8e010c662681c
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
42KB
MD5d685b3edf1832219412c49c1849c909d
SHA140a8faa278c5f2e815b7d4995f77976503a93bd1
SHA2560012725c1b11f84029a45d7fbbc3a828acc9528b23ef8d56ffa11d6f9666373a
SHA5127fdf0b5e25293bdc6146497e28605c76cdb803d3edb7b509b582a3df7b5695384237dbbcf08ea25d8cfa21c0029ea7392dc34100e2c40ea52083cee6b6259d38
-
Filesize
113KB
MD57485c0fce23354afa6561551c1254076
SHA181fd42d1a52a7527ad93306aacaf08dbe55d3f78
SHA2561316f14c8d58696ab58c7f9a2d1027ce279a545357e803d890804a03a7541904
SHA512fdd06a49afca56e69705798a3b60686d5aea56952cb4af933962f745e2092bc8898c72cf5f9ff599e5de9be4ac823a0d8f0364645922e4ae27e71edc39ed0ba0
-
Filesize
120KB
MD556b7d6178c8dbac508d037cc5adc64b5
SHA15928e363f17ce6c67b7d07e29efe1bfe40a7d80a
SHA256e56bdaa45c504e01d1aee08291b9b1ac3344f18103da42e33067f9f43adec246
SHA512f486b565a6df99dd7d7ef7de7e62d5a155f4ef62314a1992319bfe25b5e672b718470e2ff684be07c7871e760562a14596e217ac70c98f07b224011e3209c31d
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f