Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
08/02/2025, 17:32
Behavioral task
behavioral1
Sample
filw.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
filw.exe
Resource
win10v2004-20250207-en
General
-
Target
filw.exe
-
Size
6.1MB
-
MD5
a5dc5dfb3d20c67a35c1ee67e010fc7b
-
SHA1
94694b8cf4d9558014f78037e1fd6fcfe4ddd4e3
-
SHA256
1d810a842c4a71e7490f0a88bb9b0d3c82b084147e73fb2e4ef3c32456055d04
-
SHA512
e8c552eff3537974ef552cf500f7c1060c5bff409fdc8ff34f98544f27afa86fb15edd0930a3b9a699977c452c2115697354772d1b4e0f095744cf7491cc9a48
-
SSDEEP
196608:RaiSkSIlLTUcwti7TQl2NgVg01MWAXAkuujCPX9YG9he5GnQCAJKN:QkSopwtQQl2aOtXADu8X9Y95GQLJ
Malware Config
Extracted
stealerium
https://api.telegram.org/bot7043342993:AAH3tTE7nerxLSr5-SkYKVrmJwCoBBaGRCU/sendMessage?chat_id=
-
url
https://szurubooru.zulipchat.com/api/v1/messages
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 70 1876 Process not Found -
Uses browser remote debugging 2 TTPs 6 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1848 chrome.exe 3004 chrome.exe 2228 chrome.exe 4432 chrome.exe 2648 msedge.exe 940 msedge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Control Panel\International\Geo\Nation filw.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 filw.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 filw.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 filw.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 raw.githubusercontent.com 11 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 icanhazip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1660 MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1764 cmd.exe 1100 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 filw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier filw.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133835765892059057" chrome.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 1848 chrome.exe 1848 chrome.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 3856 filw.exe 552 msedge.exe 552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3856 filw.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeShutdownPrivilege 1848 chrome.exe Token: SeCreatePagefilePrivilege 1848 chrome.exe Token: SeSecurityPrivilege 5012 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1848 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3856 wrote to memory of 1848 3856 filw.exe 90 PID 3856 wrote to memory of 1848 3856 filw.exe 90 PID 1848 wrote to memory of 2408 1848 chrome.exe 91 PID 1848 wrote to memory of 2408 1848 chrome.exe 91 PID 3856 wrote to memory of 1764 3856 filw.exe 92 PID 3856 wrote to memory of 1764 3856 filw.exe 92 PID 1764 wrote to memory of 1944 1764 cmd.exe 94 PID 1764 wrote to memory of 1944 1764 cmd.exe 94 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1700 1848 chrome.exe 95 PID 1848 wrote to memory of 1780 1848 chrome.exe 96 PID 1848 wrote to memory of 1780 1848 chrome.exe 96 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 PID 1848 wrote to memory of 2172 1848 chrome.exe 97 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 filw.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 filw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\filw.exe"C:\Users\Admin\AppData\Local\Temp\filw.exe"1⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe4848cc40,0x7ffe4848cc4c,0x7ffe4848cc583⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-logging --headless=new --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --disable-logging --field-trial-handle=1908,i,13899314581662656483,14890394719601143612,262144 --disable-features=PaintHolding --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=1904 /prefetch:23⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=2068,i,13899314581662656483,14890394719601143612,262144 --disable-features=PaintHolding --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=2080 /prefetch:33⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=2152,i,13899314581662656483,14890394719601143612,262144 --disable-features=PaintHolding --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=2332 /prefetch:83⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3076,i,13899314581662656483,14890394719601143612,262144 --disable-features=PaintHolding --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3112 /prefetch:13⤵
- Uses browser remote debugging
PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,13899314581662656483,14890394719601143612,262144 --disable-features=PaintHolding --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3256 /prefetch:13⤵
- Uses browser remote debugging
PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4440,i,13899314581662656483,14890394719601143612,262144 --disable-features=PaintHolding --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4444 /prefetch:13⤵
- Uses browser remote debugging
PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=4612,i,13899314581662656483,14890394719601143612,262144 --disable-features=PaintHolding --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4716 /prefetch:83⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=4616,i,13899314581662656483,14890394719601143612,262144 --disable-features=PaintHolding --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4768 /prefetch:83⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=4740,i,13899314581662656483,14890394719601143612,262144 --disable-features=PaintHolding --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4728 /prefetch:83⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --disable-logging --field-trial-handle=4744,i,13899314581662656483,14890394719601143612,262144 --disable-features=PaintHolding --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=5052 /prefetch:83⤵PID:2960
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1944
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1100
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:4692
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵PID:552
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:320
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4504
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
PID:2648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffe483446f8,0x7ffe48344708,0x7ffe483447183⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1460,4142702811143720353,16498137997073151195,131072 --disable-features=PaintHolding --disable-logging --headless=new --headless --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --override-use-software-gl-for-tests --disable-logging --mojo-platform-channel-handle=1468 /prefetch:23⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1460,4142702811143720353,16498137997073151195,131072 --disable-features=PaintHolding --lang=en-US --service-sandbox-type=none --use-gl=swiftshader-webgl --headless --disable-logging --mojo-platform-channel-handle=1828 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-logging --remote-debugging-port=9222 --allow-pre-commit-input --field-trial-handle=1460,4142702811143720353,16498137997073151195,131072 --disable-features=PaintHolding --disable-gpu-compositing --lang=en-US --headless --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1980 /prefetch:13⤵
- Uses browser remote debugging
PID:940
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU4NjAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODIxNjMwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTEyNjU5NjQxIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1660
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5012
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5516994b70d89293fc97bd84e5d13f248
SHA1ea0a00c9dab8df95fddd729277a2bfa11711b901
SHA2562d45181fb62d1ed4c643dc93a6f97ab16821e9183d9262d7f5164e8ee14101ca
SHA512e3a636b3653b9134c1f12207d2753f949d6c268a2d50d9e62af7716a7ad1e19090a1aaa83665e75f1d7aa44af6abdb6f36ad1bf0a33885860df0c7af03a6fcaf
-
C:\Users\Admin\AppData\Local\62136cdd3597da39fafbad9d3d71a2b3\Admin@KSMACIVP_en-US\System\Process.txt
Filesize1KB
MD57503c9c235319c5b9452eee50690afff
SHA1561fcaebb5d968c47230bb6e820007644477dfea
SHA256a4e363841bc264a3482f5d418da3bc737fff75110ef73324f04e09fec6b70940
SHA512b76549cf15939a624f3e366e3a3b44fbc92c23ce24adb5872d01ed6a2343282242e51925d0f410a16e8999a3c5bef40533b7682455b3227117993d649b800774
-
C:\Users\Admin\AppData\Local\62136cdd3597da39fafbad9d3d71a2b3\Admin@KSMACIVP_en-US\System\Process.txt
Filesize1KB
MD55ad3efe0aef71c0e89d5ae23d375e861
SHA1fe1dc19db7f1efead51d4c14c8dd1c8f92a843ef
SHA256877d76ae57a3a7f49619627f18fdb0ce70852b3834191e90a79a7d0c259934b3
SHA5124c44a7e9a913f01acec0e22698dcedd2517b6b8ac8337d3ab31a607ad32f1575d34d04b3d0aa547689a770b6843842bf35a3b15e25e6d431d5f21546776e6fb5
-
C:\Users\Admin\AppData\Local\62136cdd3597da39fafbad9d3d71a2b3\Admin@KSMACIVP_en-US\System\Process.txt
Filesize2KB
MD5dbbd3d6c5ecce171bfafbf0eead7999b
SHA169ad6c7d64a3948286b61a85ff672c39cd554a3a
SHA25648ac7e17118c82bb40106a677fe5f24e28b837ab7965b58a2e23276f15c8e50c
SHA512964d52b41acbd68bb99006bf1d152693c87657503199491d767bcf1602aa349dae80692187c87353dbfb549d6f79224ecfa23006bd86c4947e5b3ff4cab24b9d
-
C:\Users\Admin\AppData\Local\62136cdd3597da39fafbad9d3d71a2b3\Admin@KSMACIVP_en-US\System\Process.txt
Filesize3KB
MD5fb63cb837b2b1db5f6f7acb3de1fcc31
SHA1dc8f8f274cbc518b7da0e2377887303e905fff5c
SHA256dea9cb3939c097bcad76fc105b5135283e7da6fd4c7d437cf9357b3a1c1b27f9
SHA512e1c66047b93ece08f56f98c5f6d65e4d832492f16e76271ec4bcca3481d893ac68a5b46a1b66b4d15908dab30dd4c04c0884d6c5a74e2aecc5a0045aa1f65e5c
-
C:\Users\Admin\AppData\Local\62136cdd3597da39fafbad9d3d71a2b3\Admin@KSMACIVP_en-US\System\Process.txt
Filesize4KB
MD508b7c7b6cb6cdce4d08d08ba1c150fe7
SHA130383c5500ea09893cc24a8b89f2cabea652bb4c
SHA256045b694cd4c8ebfc7663884027558357b1e2ca98d85f1e4d55377c4cee4f9534
SHA512487afe342c9f6816dbab714afd3103efe187757f1537ca416b62dc40538f2895133b7e002d7735a769f6c06753517bf67249402a29d92f486cc1cca886442437
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
4KB
MD563e8e3adf97b4f5eec14a9585aa65c0f
SHA1fd188ef8eb23f7bbe3f29330afd91724e44b0ad3
SHA256af16369a938c9515e6a1cc6e861fab8c4e8ab9cb324883c87e5fb245fa1b9837
SHA512db240970a2aee2af04f4686eb6619c44f29059a1bae3b5fdc07ff9edb10bff62d5496a5947ed99d98a0bd76afaac0aba04892b6a677a349bd16940650c6a8380
-
Filesize
1KB
MD51de14e09d0116763ccf16c86e4548ca6
SHA159202e1e03b2735112eb781cf5bad15fcff14e34
SHA256229533ccb78c0f0d2727fdd5cf6bddc68791338cda21402bcbce4f516b02c591
SHA5127ebf6d4a8dda399f190df6caacd5716ce370b021a5bd0319c02432cbcfdff44655f11bea2e38b6587c06f539669229f1c03ba88555a94b655be8ca888febe5f0
-
Filesize
2KB
MD587551c6b9ac2ce59935b5a17004c4d06
SHA110c38bbb5e27a8912f5acd1a120e2efb2b52e143
SHA256e7a6e9e8ce1ea7846502011c894b2ba7b494f17ae65dc750ebf20ea9303e596f
SHA5121197e90f1bb40c931565527b7c55b1401fde376bb58a814c1c2fefc1d579269fae4366d7fcce93dae1aab3156daa41d967750e9b9986f6b3054b1eb07a81fb67