Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2025 09:05
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe
Resource
win10v2004-20250207-en
General
-
Target
SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe
-
Size
4.8MB
-
MD5
9c34d1555408e02bf79d305e14da648f
-
SHA1
3ade53d77f21861819565b4902d42d17b26b0771
-
SHA256
81a16262857bdc1497888c2196a6abb068da74a736724f34828b048777560cce
-
SHA512
be426e3af1d0888cf1b9dd61f01f9010f4f2f83a979acdafb27eae99b21b96e96391ecd73d01f60d087c36adce9538ce8f307bf9660a8b6cf4306e7b6dca1a46
-
SSDEEP
49152:8Uocec9UxniW/mQU/KgxyPZqsHsehXnMuCtHVZK7umnSZHjew1zdRm8y7PSZp5Jn:84ec9KnirhCWyQegK7B8Cy
Malware Config
Extracted
vidar
https://t.me/b4cha00
https://steamcommunity.com/profiles/76561199825403037
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:137.0) Gecko/20100101 Firefox/137.0
Signatures
-
Detect Vidar Stealer 33 IoCs
resource yara_rule behavioral2/memory/3420-4-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-5-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-12-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-13-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-14-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-15-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-16-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-51-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-52-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-55-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-59-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-60-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-64-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-65-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-67-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-68-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-69-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-100-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-101-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-104-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-108-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-109-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-113-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-118-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-119-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-122-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-123-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-124-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-125-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-130-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-131-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-132-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3420-135-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Vidar family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 29 3188 Process not Found -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1936 chrome.exe 3840 chrome.exe 4976 msedge.exe 928 msedge.exe 4480 chrome.exe 2124 chrome.exe 3428 msedge.exe 4776 msedge.exe 952 msedge.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2168 set thread context of 3420 2168 SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2156 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 928 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133839111719168295" chrome.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3420 BitLockerToGo.exe 3420 BitLockerToGo.exe 3420 BitLockerToGo.exe 3420 BitLockerToGo.exe 1936 chrome.exe 1936 chrome.exe 3420 BitLockerToGo.exe 3420 BitLockerToGo.exe 3420 BitLockerToGo.exe 3420 BitLockerToGo.exe 2328 msedge.exe 2328 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 4976 msedge.exe 4976 msedge.exe 3420 BitLockerToGo.exe 3420 BitLockerToGo.exe 3420 BitLockerToGo.exe 3420 BitLockerToGo.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe Token: SeShutdownPrivilege 1936 chrome.exe Token: SeCreatePagefilePrivilege 1936 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 1936 chrome.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3420 2168 SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe 96 PID 2168 wrote to memory of 3420 2168 SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe 96 PID 2168 wrote to memory of 3420 2168 SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe 96 PID 2168 wrote to memory of 3420 2168 SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe 96 PID 2168 wrote to memory of 3420 2168 SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe 96 PID 2168 wrote to memory of 3420 2168 SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe 96 PID 2168 wrote to memory of 3420 2168 SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe 96 PID 2168 wrote to memory of 3420 2168 SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe 96 PID 2168 wrote to memory of 3420 2168 SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe 96 PID 2168 wrote to memory of 3420 2168 SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe 96 PID 2168 wrote to memory of 3420 2168 SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe 96 PID 3420 wrote to memory of 1936 3420 BitLockerToGo.exe 98 PID 3420 wrote to memory of 1936 3420 BitLockerToGo.exe 98 PID 1936 wrote to memory of 2452 1936 chrome.exe 99 PID 1936 wrote to memory of 2452 1936 chrome.exe 99 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 3432 1936 chrome.exe 100 PID 1936 wrote to memory of 4244 1936 chrome.exe 101 PID 1936 wrote to memory of 4244 1936 chrome.exe 101 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102 PID 1936 wrote to memory of 3968 1936 chrome.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Malware-gen.25942.5770.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffabb8acc40,0x7ffabb8acc4c,0x7ffabb8acc584⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,8673439754259830785,17650622101644260140,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=1924 /prefetch:24⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,8673439754259830785,17650622101644260140,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=2196 /prefetch:34⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,8673439754259830785,17650622101644260140,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=2404 /prefetch:84⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3208,i,8673439754259830785,17650622101644260140,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=3216 /prefetch:14⤵
- Uses browser remote debugging
PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3232,i,8673439754259830785,17650622101644260140,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=3272 /prefetch:14⤵
- Uses browser remote debugging
PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4364,i,8673439754259830785,17650622101644260140,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4500 /prefetch:14⤵
- Uses browser remote debugging
PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4292,i,8673439754259830785,17650622101644260140,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4728 /prefetch:84⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,8673439754259830785,17650622101644260140,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4680 /prefetch:84⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5008,i,8673439754259830785,17650622101644260140,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4748 /prefetch:84⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4828,i,8673439754259830785,17650622101644260140,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=5072 /prefetch:84⤵PID:5044
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabb8b46f8,0x7ffabb8b4708,0x7ffabb8b47184⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,5063449446270290802,14001179937577127022,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:24⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,5063449446270290802,14001179937577127022,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,5063449446270290802,14001179937577127022,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:84⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2084,5063449446270290802,14001179937577127022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:14⤵
- Uses browser remote debugging
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2084,5063449446270290802,14001179937577127022,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:14⤵
- Uses browser remote debugging
PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2084,5063449446270290802,14001179937577127022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:14⤵
- Uses browser remote debugging
PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2084,5063449446270290802,14001179937577127022,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:14⤵
- Uses browser remote debugging
PID:952
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\yu37g" & exit3⤵
- System Location Discovery: System Language Discovery
PID:32 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:928
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource core1⤵
- System Location Discovery: System Language Discovery
PID:3084
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5ODUiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODQ0NDQzNjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTIwMDYwNjk1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2156
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:400
Network
MITRE ATT&CK Enterprise v15
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5c9fb55e2d5fe62d9c5037d55558a1b9c
SHA1e32f710d3ede3c48680ea75c067c858968bbf335
SHA2568525aabcb013e514b36022cfbabc90c6860f2ef09b335521585aca527dee2a13
SHA5124661bac8aacf4afca2ef7c688d5290cdca1b1f30d33b60cde253abed0b8af035c4fa7766afd3415a224e48b47fe98aab37ca6d0cd00c075eb1fca9dccbb6d9f6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD591aff9098a47bb8e012e47e54f6bceaa
SHA17993f5174f54489cac8b04c1356b7b47da944202
SHA256cc46d5631b8526010ae5e52980fe9fd9b38c4cb27f56cd524b321ab091685cbb
SHA512184defaee159dc93c128c5a7a2ce15e9cbf99bac58ea2372642c30bf6f1f52e178a110e0e86204ba65d82b7a7fd5514cbe7092daacceecb1aab6cc6a208e850b
-
Filesize
152B
MD5a230789a90c3150dde7ed452a9b35a08
SHA1e934d8dce045c99a5d4ce22d6e470f787ca2e027
SHA256b754b918a9236857008c518409ee816120e5f55430218c03a7c9b2af56cdece3
SHA512f258391b4cfa5f4b7537d15af1af661dc58926a63fbf8238fe564e9e80525fc3b4b04719611d1619e036f56808c460363205ae06c835570b77f97b31009371a6
-
Filesize
6KB
MD5e9c182c163fc82ba137bb0e1110cea11
SHA1e1feeb184c59e5c38c9ababef1e299616a3b7cda
SHA2563aa032c5961cb0ad6323c340d7f769e59a1ce049052f4345b5ce2c5429cd0dc9
SHA51252d3c12908c067891d0fcb65ada534305a4d777b2a91a075234f8129089d6ffe8e577cd76d7bb07983ddef477adc1d5859607d34164fe14d59c663b5a3555bcf