Analysis
-
max time kernel
110s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
16/02/2025, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe
Resource
win10v2004-20250207-en
General
-
Target
6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe
-
Size
1.8MB
-
MD5
4bec7cca24d57b4da653d93dd6c80b1c
-
SHA1
f42b31551ce22fa400419562af7a7e7677a7e947
-
SHA256
6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4
-
SHA512
48c47ed918f8f73261210aa3c532d7b5902bae86c1a55f9bf577e3df074f4c91dec5d943d1a1ab8c099d7211156bb815510152de3be7ece21b29421a9ed0e8ea
-
SSDEEP
49152:QGck28YDYSldTatcjXY4mkI0X2HkjqcXGkMraxj:MVnDDukXYGI0XoyzXIY
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe -
Downloads MZ/PE file 4 IoCs
flow pid Process 106 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 78 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 78 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 97 1752 Process not Found -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3696 chrome.exe 2220 chrome.exe 2444 msedge.exe 1144 msedge.exe 4068 chrome.exe 4524 chrome.exe 4408 msedge.exe 3380 msedge.exe 4140 msedge.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-194335498-2604837297-537231065-1000\Software\Wine 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2652 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133842019684353552" chrome.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 3696 chrome.exe 3696 chrome.exe 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 524 msedge.exe 524 msedge.exe 524 msedge.exe 524 msedge.exe 1712 msedge.exe 1712 msedge.exe 2444 msedge.exe 2444 msedge.exe 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe Token: SeShutdownPrivilege 3696 chrome.exe Token: SeCreatePagefilePrivilege 3696 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 3696 chrome.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5108 wrote to memory of 3696 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 97 PID 5108 wrote to memory of 3696 5108 6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe 97 PID 3696 wrote to memory of 4384 3696 chrome.exe 98 PID 3696 wrote to memory of 4384 3696 chrome.exe 98 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 4876 3696 chrome.exe 99 PID 3696 wrote to memory of 2000 3696 chrome.exe 100 PID 3696 wrote to memory of 2000 3696 chrome.exe 100 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101 PID 3696 wrote to memory of 4168 3696 chrome.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe"C:\Users\Admin\AppData\Local\Temp\6c4670501df76e9dc5dcf5a5f62fee61a1f659f2c2cee7be8f585f7340388bf4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb93f6cc40,0x7ffb93f6cc4c,0x7ffb93f6cc583⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,15062859538271857010,11531187206154026561,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=1936 /prefetch:23⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1556,i,15062859538271857010,11531187206154026561,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=2212 /prefetch:33⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,15062859538271857010,11531187206154026561,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=2272 /prefetch:83⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,15062859538271857010,11531187206154026561,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3216 /prefetch:13⤵
- Uses browser remote debugging
PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,15062859538271857010,11531187206154026561,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3264 /prefetch:13⤵
- Uses browser remote debugging
PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4292,i,15062859538271857010,11531187206154026561,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4556 /prefetch:13⤵
- Uses browser remote debugging
PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4620,i,15062859538271857010,11531187206154026561,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4548 /prefetch:83⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4600,i,15062859538271857010,11531187206154026561,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4612 /prefetch:83⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4868,i,15062859538271857010,11531187206154026561,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4880 /prefetch:83⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4736,i,15062859538271857010,11531187206154026561,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4896 /prefetch:83⤵PID:3288
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe8,0x108,0x7ffb93f746f8,0x7ffb93f74708,0x7ffb93f747183⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6098176183579713736,10320823859600659200,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:23⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,6098176183579713736,10320823859600659200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,6098176183579713736,10320823859600659200,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:83⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,6098176183579713736,10320823859600659200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:13⤵
- Uses browser remote debugging
PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,6098176183579713736,10320823859600659200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:13⤵
- Uses browser remote debugging
PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,6098176183579713736,10320823859600659200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:13⤵
- Uses browser remote debugging
PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,6098176183579713736,10320823859600659200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:13⤵
- Uses browser remote debugging
PID:4140
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4264
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4492
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI5IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDcxNzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTY4MDM3MTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTQzMjY3NTUwIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2652
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD59a70ac2c07f63d5719d883f8fdcfac89
SHA15adc69d6b2f4c713c5765502ac17d357ca911057
SHA2561ba57402334100d1b2ab12c308c7a805ec43cf2568fe2211ea6ffb7ef195fe6f
SHA512b909be8d68f26256311d13c1a5c59eb8115271b35efe81ee0c44f4a79557e4c1abb9bf52d79eafe15d9aba60da07ab492f39fa8f5ebdbb74745310e9e7ee9919
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
246KB
MD5dcfa188c4917b88cd2f23d77b4514a12
SHA187b6dc1217938a0b0f3216b38e62325eb4d92acd
SHA256f505a30c53e9a5586aeecbdd6c284910c14c30a10099268060ba7abd3a2596c7
SHA512eb1130a8930f0666835e86dc4cd6d14d07c8c6e55f32bee146ac429a414affd62b5d276c3e4bfd5ea33fc68e4594c804c0cfd79a76a45d49ec334717e6276da6
-
Filesize
152B
MD5d44f6d6e7efe70fab6c852bb5b7455a0
SHA10e10115d677f55f7cb4b5721e1275df5c01ea842
SHA256aa26ea90b867a3f439ee88c55f31b5a7890b3503ab814fea2d27f0149c9aafc4
SHA512ee5f719de53d37e809361d56039002e974f0cf1561079ada1f5cd2ea2db310cb80226ba8b9bca687c2ddf9696b71abcfffd8d5dba4a07198e1e4d3b4e2e0c3e7
-
Filesize
152B
MD5cb0cb9bc9bc47b241cea8a15930aaf18
SHA1bea4efbadb649764c8c0dde5ffb550e2a5f91a26
SHA2567ba3da7afec53ca47958b26551707592ea453b1af13688f37fe0e1ef411a8b8a
SHA5129eccc1a158c23dc034e4676ee071414bf9c67912b5e2ab6181d325167ce008e13c916967be62c845d4c7f637c03cca9676af0c41ec5e946925050090d0b49e1f
-
Filesize
6KB
MD56aafadf55150353b8e7a794c0537ed4f
SHA1ceff74b27e9406fd9b108ed1e98982c55013d0d2
SHA2565c74be79f3c187ec845976cafc181c59182d9ee8f3cbf60d2bb5368abd181b0a
SHA512ea9bd63868df759a85ab085d959c3c8abb4d74d7df0cf240619de4443e26db4a2561158a39fd9aa3d46bcb43051599327b0f262801c4325fc16e62ea0060d5f3