Overview
overview
10Static
static
19YWF7_random.exe
windows7-x64
109YWF7_random.exe
windows10-2004-x64
10$TEMP/Cm.potm
windows7-x64
3$TEMP/Cm.potm
windows10-2004-x64
3$TEMP/Contents.potm
windows7-x64
3$TEMP/Contents.potm
windows10-2004-x64
3$TEMP/Cont...g.potm
windows7-x64
3$TEMP/Cont...g.potm
windows10-2004-x64
3$TEMP/Elementary.potm
windows7-x64
3$TEMP/Elementary.potm
windows10-2004-x64
1$TEMP/Templates.potm
windows7-x64
3$TEMP/Templates.potm
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 18:07
Static task
static1
Behavioral task
behavioral1
Sample
9YWF7_random.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9YWF7_random.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$TEMP/Cm.potm
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$TEMP/Cm.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
$TEMP/Contents.potm
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$TEMP/Contents.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
$TEMP/Contributing.potm
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$TEMP/Contributing.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral9
Sample
$TEMP/Elementary.potm
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$TEMP/Elementary.potm
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
$TEMP/Templates.potm
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$TEMP/Templates.potm
Resource
win10v2004-20250207-en
General
-
Target
9YWF7_random.exe
-
Size
899KB
-
MD5
1e854cc21a0a1e0d4529eafa30f00c46
-
SHA1
7d46238f771042bee22b70555e69fbbecc556737
-
SHA256
435eaccabde5605bb4d9a13ae054c63dd4e5ad61025e0515702e8121cf0a9598
-
SHA512
278a7cee7819d5cc685dd9c075639968798341bac23718b15441d3b9b0d723eb7836e0329c5c5f096f54dcce826e8ea871d033385b72464637391a14b61f33fb
-
SSDEEP
24576:vZzss7nmV+EsC9s50bHp4H2gS1YuzusJGuYco03ddH:BI49EsqDH+cTG2NdH
Malware Config
Extracted
vidar
https://t.me/sok33tn
https://steamcommunity.com/profiles/76561199824159981
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Signatures
-
Detect Vidar Stealer 35 IoCs
resource yara_rule behavioral2/memory/4008-310-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-311-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-312-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-319-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-320-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-321-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-322-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-355-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-356-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-359-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-363-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-364-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-368-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-369-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-370-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-372-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-373-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-404-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-405-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-408-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-412-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-413-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-414-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-418-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-422-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-425-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-429-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-430-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-431-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-432-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-440-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-441-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-442-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-443-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 behavioral2/memory/4008-444-0x00000000007A0000-0x00000000007C2000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1948 chrome.exe 3984 msedge.exe 1236 msedge.exe 4232 msedge.exe 1032 chrome.exe 2652 chrome.exe 1384 chrome.exe 1712 msedge.exe 1148 msedge.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\Control Panel\International\Geo\Nation Rna.com Key value queried \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\Control Panel\International\Geo\Nation 9YWF7_random.exe -
Executes dropped EXE 1 IoCs
pid Process 4008 Rna.com -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2408 tasklist.exe 4684 tasklist.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\FlowerAbroad 9YWF7_random.exe File opened for modification C:\Windows\LancasterFocused 9YWF7_random.exe File opened for modification C:\Windows\DesperateInserted 9YWF7_random.exe File opened for modification C:\Windows\TakeEmphasis 9YWF7_random.exe File opened for modification C:\Windows\OutstandingSpider 9YWF7_random.exe File opened for modification C:\Windows\TeMatched 9YWF7_random.exe File opened for modification C:\Windows\ArrangementsDark 9YWF7_random.exe File opened for modification C:\Windows\EstimateLargely 9YWF7_random.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9YWF7_random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rna.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Rna.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Rna.com Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2356 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4008 Rna.com 4008 Rna.com 4008 Rna.com 4008 Rna.com 4008 Rna.com 4008 Rna.com 4008 Rna.com 4008 Rna.com 4008 Rna.com 4008 Rna.com 1032 chrome.exe 1032 chrome.exe 4008 Rna.com 4008 Rna.com 4008 Rna.com 4008 Rna.com 4652 msedge.exe 4652 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 1712 msedge.exe 1712 msedge.exe 4008 Rna.com 4008 Rna.com 4008 Rna.com 4008 Rna.com -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2408 tasklist.exe Token: SeDebugPrivilege 4684 tasklist.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe Token: SeShutdownPrivilege 1032 chrome.exe Token: SeCreatePagefilePrivilege 1032 chrome.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 4008 Rna.com 4008 Rna.com 4008 Rna.com 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1032 chrome.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4008 Rna.com 4008 Rna.com 4008 Rna.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4296 wrote to memory of 968 4296 9YWF7_random.exe 82 PID 4296 wrote to memory of 968 4296 9YWF7_random.exe 82 PID 4296 wrote to memory of 968 4296 9YWF7_random.exe 82 PID 968 wrote to memory of 2408 968 cmd.exe 84 PID 968 wrote to memory of 2408 968 cmd.exe 84 PID 968 wrote to memory of 2408 968 cmd.exe 84 PID 968 wrote to memory of 3108 968 cmd.exe 85 PID 968 wrote to memory of 3108 968 cmd.exe 85 PID 968 wrote to memory of 3108 968 cmd.exe 85 PID 968 wrote to memory of 4684 968 cmd.exe 87 PID 968 wrote to memory of 4684 968 cmd.exe 87 PID 968 wrote to memory of 4684 968 cmd.exe 87 PID 968 wrote to memory of 748 968 cmd.exe 88 PID 968 wrote to memory of 748 968 cmd.exe 88 PID 968 wrote to memory of 748 968 cmd.exe 88 PID 968 wrote to memory of 1468 968 cmd.exe 89 PID 968 wrote to memory of 1468 968 cmd.exe 89 PID 968 wrote to memory of 1468 968 cmd.exe 89 PID 968 wrote to memory of 4428 968 cmd.exe 90 PID 968 wrote to memory of 4428 968 cmd.exe 90 PID 968 wrote to memory of 4428 968 cmd.exe 90 PID 968 wrote to memory of 4876 968 cmd.exe 91 PID 968 wrote to memory of 4876 968 cmd.exe 91 PID 968 wrote to memory of 4876 968 cmd.exe 91 PID 968 wrote to memory of 3088 968 cmd.exe 92 PID 968 wrote to memory of 3088 968 cmd.exe 92 PID 968 wrote to memory of 3088 968 cmd.exe 92 PID 968 wrote to memory of 3696 968 cmd.exe 93 PID 968 wrote to memory of 3696 968 cmd.exe 93 PID 968 wrote to memory of 3696 968 cmd.exe 93 PID 968 wrote to memory of 4008 968 cmd.exe 94 PID 968 wrote to memory of 4008 968 cmd.exe 94 PID 968 wrote to memory of 4008 968 cmd.exe 94 PID 968 wrote to memory of 392 968 cmd.exe 95 PID 968 wrote to memory of 392 968 cmd.exe 95 PID 968 wrote to memory of 392 968 cmd.exe 95 PID 4008 wrote to memory of 1032 4008 Rna.com 96 PID 4008 wrote to memory of 1032 4008 Rna.com 96 PID 1032 wrote to memory of 2360 1032 chrome.exe 97 PID 1032 wrote to memory of 2360 1032 chrome.exe 97 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98 PID 1032 wrote to memory of 2320 1032 chrome.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\9YWF7_random.exe"C:\Users\Admin\AppData\Local\Temp\9YWF7_random.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Elementary.potm Elementary.potm.cmd & Elementary.potm.cmd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:3108
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:748
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1902443⤵
- System Location Discovery: System Language Discovery
PID:1468
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Highest.potm3⤵
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Region" Automobiles3⤵
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 190244\Rna.com + Trials + Tour + Auditor + Indices + Interests + Bk + Not + Assessment 190244\Rna.com3⤵
- System Location Discovery: System Language Discovery
PID:3088
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Contributing.potm + ..\Cm.potm + ..\Contents.potm + ..\Templates.potm v3⤵
- System Location Discovery: System Language Discovery
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\190244\Rna.comRna.com v3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff879cacc40,0x7ff879cacc4c,0x7ff879cacc585⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2004,i,6600959149778275863,15283846211047376338,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=1996 /prefetch:25⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1872,i,6600959149778275863,15283846211047376338,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=2020 /prefetch:35⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1828,i,6600959149778275863,15283846211047376338,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=2280 /prefetch:85⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,6600959149778275863,15283846211047376338,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=3192 /prefetch:15⤵
- Uses browser remote debugging
PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,6600959149778275863,15283846211047376338,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=3260 /prefetch:15⤵
- Uses browser remote debugging
PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3720,i,6600959149778275863,15283846211047376338,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4552 /prefetch:15⤵
- Uses browser remote debugging
PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4692,i,6600959149778275863,15283846211047376338,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=3848 /prefetch:85⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4792,i,6600959149778275863,15283846211047376338,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=3176 /prefetch:85⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4880,i,6600959149778275863,15283846211047376338,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4804 /prefetch:85⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4820,i,6600959149778275863,15283846211047376338,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=5012 /prefetch:85⤵PID:2612
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff879cb46f8,0x7ff879cb4708,0x7ff879cb47185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,1949494128051739623,6641072180611319040,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:25⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,1949494128051739623,6641072180611319040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,1949494128051739623,6641072180611319040,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:85⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2148,1949494128051739623,6641072180611319040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:15⤵
- Uses browser remote debugging
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2148,1949494128051739623,6641072180611319040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:15⤵
- Uses browser remote debugging
PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2148,1949494128051739623,6641072180611319040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:15⤵
- Uses browser remote debugging
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2148,1949494128051739623,6641072180611319040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:15⤵
- Uses browser remote debugging
PID:4232
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\190244\Rna.com" & rd /s /q "C:\ProgramData\ohd2n" & exit4⤵
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2356
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:392
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2596
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD591aff9098a47bb8e012e47e54f6bceaa
SHA17993f5174f54489cac8b04c1356b7b47da944202
SHA256cc46d5631b8526010ae5e52980fe9fd9b38c4cb27f56cd524b321ab091685cbb
SHA512184defaee159dc93c128c5a7a2ce15e9cbf99bac58ea2372642c30bf6f1f52e178a110e0e86204ba65d82b7a7fd5514cbe7092daacceecb1aab6cc6a208e850b
-
Filesize
152B
MD5a230789a90c3150dde7ed452a9b35a08
SHA1e934d8dce045c99a5d4ce22d6e470f787ca2e027
SHA256b754b918a9236857008c518409ee816120e5f55430218c03a7c9b2af56cdece3
SHA512f258391b4cfa5f4b7537d15af1af661dc58926a63fbf8238fe564e9e80525fc3b4b04719611d1619e036f56808c460363205ae06c835570b77f97b31009371a6
-
Filesize
6KB
MD5b4acdd9d3573738505f3dfecea299303
SHA191ab46721e24c61b7839b3383b0f3e3c3ecee323
SHA25609ad1236fdc421c96edfc8a06a814c67465b3d2f3c79332334cdd6432865bc1e
SHA51276d97aae7c4e66c1e5c99f8255da9f9753bb2f9aa75c1ebbccf5bdedcfce002247415cfce3962ea7dbe03e46aad5923427941e1f4efa3547979540da50ee87d8
-
Filesize
122KB
MD5899b3027096de3f3b4d036d95bdf18db
SHA15c5ed74e408f7432b5408d89e17f4e6f6a684087
SHA256cd0f61469dc644651538c69002b9d65b5b46af7bc453583e835b0e6e219c787a
SHA512413ae9fa84d4cd800618922c31f818b619d5b7768dbf824a7e6e4881729cdd0f924b1e0cdb0d944087999a76f9b1f68152d84a76a0ac4ebcb5facf2c4ced7465
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
255KB
MD57a0bccb93c8a02edd1c5d9e05ddea967
SHA16bc4f53e75666537503e8817f6f56e85ebb9a019
SHA2567bb104d6e23ed9c640b2dd122daecd702820f2c47ed2209046d250d00a72fa74
SHA512a4beddddb1f6b5734f9b7ee68307593eee5c236c8f6f899a13d032aaafad477f40c8d79a308106c554ae6bf85547344e16fb36473fe3582f12e3c1e63fe55a9c
-
Filesize
58KB
MD50bd1586903baca9d97c9d6dca8c8c254
SHA1a6d50245b0d6b27c1ab432587b0ae894aead1e0d
SHA25654862593de36d2c535da78a7feaa625ad65c1b9a20b6748c8783ca86d84a1600
SHA51205ea18ca5a7c867c5b576c14997fab73cc2cdcafe669924f8e65a01454b8cb4cf34a35ec09a7c11a61611096bcf8859217f64654bb77fb6bd2f1919ed489abdc
-
Filesize
147KB
MD5b7a356482dac71856517da3a1d840a1e
SHA1d4f35e28a99e746de5e3595341c299ae1aae461a
SHA256ae6980a117468381369152ddce4327795268203b51d18ebd22758e05d21331fb
SHA512f86e35405370edb869a99d2c2707ca42533310e5f58e47252044cfbda3ef37659194cfd405d71772b6b66021d94254330556f3acceffebad326bef99d420db07
-
Filesize
2KB
MD55520ce6e83b85995a3f57f879e92433b
SHA141916f28b67c393a97a583be39c45434aec8f053
SHA25645048f13b1ef83fe730487316476ef75103b4b0cfcd3991982433140454b2ec8
SHA512531805a93f9ab4365b07f6ad8cc8e714bed300692bc3bbb3e4f092978f3f4500a82d58a121634cb6cec63f71f6c062007eab57df4c1c9d58099404bbbea91cc8
-
Filesize
144KB
MD5596aac015f900ac08aabc3f6e7ebcfe6
SHA188dfb592cb71f0b0a53ffe08c923ee5449b106d3
SHA256673af251fac4c441cd411f0dadc3c4659a96913fa04f8d8e58fbf29124304c83
SHA51265da9cf93d985410c34f7ed9545f9ae27ad52c612e06665aee0753a0e082161f2ee26ade91cde047a12e2951cefb804729d83ee8d370b8030b2b6adb265541e8
-
Filesize
88KB
MD5ea946bdf2f84accd7dfef4aadd7ceba0
SHA12b3e2257cb4132924adb6ffdf79c64ecd2e1bde7
SHA2562625c1467ac13734c7ac9d6440113895a5166f913fb6a48ccc3b1b479d1cbda3
SHA5127f3f9ca44c1ffec0f0b6b419d043c2f8547002e0d2139848787d077976591f01a9e77b960d95ae886ec4d9030293740d2f551851b053e827ffb8a00c6c810953
-
Filesize
68KB
MD53f570eacdb34cdf2de5cdf884b66a478
SHA1795922094e89040c2a901098dba1275f122f6e90
SHA2569fc76a453901a25a61c23c355bb8ffba38698fa841cfc2732c0de803a7167a52
SHA512dea0c493792e13d3e1f9bf64c884dd9b575f0dcd2aadf3a004ffa5c62d5c2b0488b4fb670c5bdbd8f2a5c7da0254c5fc3109255a0ac29831176683b6dc4f921a
-
Filesize
57KB
MD558324423292aba1fe85ce884cc359575
SHA179727d862731765ef1edabb4a42f8c315d525968
SHA25610353a8e746724e0238c59ffe82f8148241a9fd4788f8929e7e8985671a211e9
SHA512ec93064e909ee1aad291c59f09b3c1abb5afefeb4a988df29247aff1551c9525708068e4fb0d72014c6e207efc4e0bb656521be47f46c4b9a61c14034935fa48
-
Filesize
10KB
MD56d2e9bdc77ef7d4073fe0a23d24b7346
SHA133045b56a62059a14756b961a8e4220a09fb035c
SHA2566e44faaef0ad7290e3ecbeec66dde3b959460d650f252b62e6a294758d512313
SHA5128c8d7edcda2c371c06a6bc882e056163e072a40b15df581bd7c7558d5bebf0e67dba3695855c9ad213cf17838f7cee3a340fb7222e0ddfec84b8fb21f999cbf4
-
Filesize
477KB
MD54a77c3ab191f746d3b90e7edd7a690c1
SHA1b21a0452d3128c13f2156ca2d820a082daba8256
SHA256e26de0520cbb1674087230ddcde9666da01f7110ff2a6f93de61d0c1a3dad891
SHA5129484f6904ef6ade3967834b8ac9dce9a968954f20e25ffc5920dc43a64ec0ae308a17845e4c67ab9065aae78d0ce3be1b15b12335e2e1838cb805aa5611af3fe
-
Filesize
142KB
MD5166ac6a1dc2dfcb3c6060a5b9b486139
SHA13f5fd2334a522d0ef491564ee32aa75b60b6381a
SHA25662e5f6a2f8b69ca1c158c35171331911fe425a3f30ae7f1fcd2a729bf58542ea
SHA512b73c722624b7fa96065d6807c2fb2c89dee1a2ea0cbd191eba10f34b072e6b728c896cbd90948c3ded44ee9799dad39185f28bcae8aa66e1132ff2311f28a3ac
-
Filesize
141KB
MD54ca1a161dd4632039343b82db96400cf
SHA1554845c0de18cdae98ad03d5d56fa29bb289a70e
SHA2566fae2d1ff6a92c8baacf4729d4aa4dc86670538c4838c80f3d7e789937161f29
SHA512fa3382bb84a821d88734f625caf6cc49bc45347e16440f9bb1ab66d9e30e387dfece66e345be3f14ab9398c23b4623411189fd7ebdd6d1be660b4eaf1c52c86e
-
Filesize
58KB
MD59989fb1439ad4713d21c95cd32fbb324
SHA162d58a2ef4485af249b93d1b8efc55ec0c3edca5
SHA256825301cc30094a52596d9c65605286cf7b25fd75f81c75d4180b2ad928abeca2
SHA51294efeb94b04a2f561b9336546a14f980d883a2399dabc48c4af45314de5cfe285c79f6a363841d79351015bd74349aa843d962d5f6dec8e3f2b8e010c662681c
-
Filesize
42KB
MD5d685b3edf1832219412c49c1849c909d
SHA140a8faa278c5f2e815b7d4995f77976503a93bd1
SHA2560012725c1b11f84029a45d7fbbc3a828acc9528b23ef8d56ffa11d6f9666373a
SHA5127fdf0b5e25293bdc6146497e28605c76cdb803d3edb7b509b582a3df7b5695384237dbbcf08ea25d8cfa21c0029ea7392dc34100e2c40ea52083cee6b6259d38
-
Filesize
113KB
MD57485c0fce23354afa6561551c1254076
SHA181fd42d1a52a7527ad93306aacaf08dbe55d3f78
SHA2561316f14c8d58696ab58c7f9a2d1027ce279a545357e803d890804a03a7541904
SHA512fdd06a49afca56e69705798a3b60686d5aea56952cb4af933962f745e2092bc8898c72cf5f9ff599e5de9be4ac823a0d8f0364645922e4ae27e71edc39ed0ba0
-
Filesize
120KB
MD556b7d6178c8dbac508d037cc5adc64b5
SHA15928e363f17ce6c67b7d07e29efe1bfe40a7d80a
SHA256e56bdaa45c504e01d1aee08291b9b1ac3344f18103da42e33067f9f43adec246
SHA512f486b565a6df99dd7d7ef7de7e62d5a155f4ef62314a1992319bfe25b5e672b718470e2ff684be07c7871e760562a14596e217ac70c98f07b224011e3209c31d