Analysis
-
max time kernel
127s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2025, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe
Resource
win10v2004-20250217-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe
-
Size
1.7MB
-
MD5
74183fecff41da1e7baf97028fee7948
-
SHA1
b9a7c4a302981e7e447dbf451b7a8893efb0c607
-
SHA256
04032a467e48ca2cc8b1310fa8e27225faf21479126d4f61e356fa356ef2128a
-
SHA512
9aae3f12feb4fba81e29754ba3eac17d00e5f8db9b1319d37dcec636d1b4dea2022b679498303900fdb8956bf11cffd0be1c6e873781ab656d260f48f0872584
-
SSDEEP
49152:nKejB4Y9a+rOZ3jDptJx1LXVQL079kWi:KjYdrOZ/VL2LMk
Malware Config
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Signatures
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe -
Downloads MZ/PE file 7 IoCs
flow pid Process 46 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 46 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 46 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 46 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 46 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 46 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 47 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5036 chrome.exe 2520 chrome.exe 4396 msedge.exe 2604 msedge.exe 4528 msedge.exe 2832 msedge.exe 3112 chrome.exe 4008 chrome.exe 2300 msedge.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe -
Executes dropped EXE 1 IoCs
pid Process 3220 BAFCFHDHII.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe -
Loads dropped DLL 2 IoCs
pid Process 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 5036 chrome.exe 5036 chrome.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 1244 msedge.exe 1244 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 4396 msedge.exe 4396 msedge.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe Token: SeShutdownPrivilege 5036 chrome.exe Token: SeCreatePagefilePrivilege 5036 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 5036 chrome.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 5036 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 85 PID 4124 wrote to memory of 5036 4124 SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe 85 PID 5036 wrote to memory of 3016 5036 chrome.exe 86 PID 5036 wrote to memory of 3016 5036 chrome.exe 86 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 5092 5036 chrome.exe 87 PID 5036 wrote to memory of 3968 5036 chrome.exe 88 PID 5036 wrote to memory of 3968 5036 chrome.exe 88 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89 PID 5036 wrote to memory of 2684 5036 chrome.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.26918.12600.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory=""2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff95d64cc40,0x7ff95d64cc4c,0x7ff95d64cc583⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,16990863766864297738,15584767939643037849,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1888 /prefetch:23⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2168,i,16990863766864297738,15584767939643037849,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2220 /prefetch:33⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2152,i,16990863766864297738,15584767939643037849,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2496 /prefetch:83⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,16990863766864297738,15584767939643037849,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3188 /prefetch:13⤵
- Uses browser remote debugging
PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3288,i,16990863766864297738,15584767939643037849,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3440 /prefetch:13⤵
- Uses browser remote debugging
PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4508,i,16990863766864297738,15584767939643037849,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4464 /prefetch:13⤵
- Uses browser remote debugging
PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4624,i,16990863766864297738,15584767939643037849,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4648 /prefetch:83⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4700,i,16990863766864297738,15584767939643037849,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4720 /prefetch:83⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4836,i,16990863766864297738,15584767939643037849,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4948 /prefetch:83⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4756,i,16990863766864297738,15584767939643037849,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4984 /prefetch:83⤵PID:3144
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff95d6546f8,0x7ff95d654708,0x7ff95d6547183⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,16048037556247028480,3573429924466975610,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:23⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2260,16048037556247028480,3573429924466975610,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2260,16048037556247028480,3573429924466975610,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:83⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2260,16048037556247028480,3573429924466975610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:13⤵
- Uses browser remote debugging
PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2260,16048037556247028480,3573429924466975610,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:13⤵
- Uses browser remote debugging
PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2260,16048037556247028480,3573429924466975610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2804 /prefetch:13⤵
- Uses browser remote debugging
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2260,16048037556247028480,3573429924466975610,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:13⤵
- Uses browser remote debugging
PID:2832
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\BAFCFHDHII.exe"2⤵
- System Location Discovery: System Language Discovery
PID:372 -
C:\ProgramData\BAFCFHDHII.exe"C:\ProgramData\BAFCFHDHII.exe"3⤵
- Executes dropped EXE
PID:3220
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3816
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD5d7e38a38a286054581bb44d2f6a7a516
SHA1cf7b06cbee121ba9bd42c10de81922c9c503f77c
SHA25660a8e8a2c4b0ed8c3fc7998234beb5481f51edf9ad9c8457a10d1edf562928b0
SHA51212ad5c7236a1efd1a16ec0cee46d2ca5199d204b7f4b33f5bb8eeaa0b01fc036bdc6cb66f7d5a775f9f9673aa85dba45a40cd1e883779322317823144b7bf976
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
40B
MD505347574d072059398ca8469139546b5
SHA1b0ea682e2cf912e316e457364b5ae91ae428ed6d
SHA256373210dcebacba9ff6058df3564f518f77243a7ce14117114dc62ff6da65b8e0
SHA51251e8d6441b4ff135fc0ac43b236dc80d3cf6bc536408138525073e570a2f4c2f10958e7b34cc100032aafc9209e526632c738295f6718f9f3358005aa197caf7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
289B
MD5541c42f1c98b3e1b011d22eba854e707
SHA1db30188de1f22e3077e7044be1386a5d0ecaed9d
SHA2560768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b
SHA51247828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604
-
Filesize
12KB
MD59d0658d7f2a96f5352b71ce068fa6f2e
SHA1ed9983dc4854cb679f7117b33c1aa12b6ea6b280
SHA256cc2cf41858abdd718b4d5ca1b02ba31ab698aab947bb7d884c58457bfb0b9ef7
SHA5127e202ac46e67d18bbf74227d95ee9a167448a2c3505648e414058a79691bd78eb0f9b4f3328530a31b34138bbe88c75910fffd3993fd46536334654ccc69c49f
-
Filesize
1KB
MD51ea80fa2e473d1825b1c9c27556c690d
SHA139d75015fcc8a6e1b89a7aebc21e3560a3ffc511
SHA256fc569d864f61319499941d46017ad9f1373b2e7e3c3bbff8091e9bbb5bee6273
SHA512ebbab137c4bc4c207a1e81c033a3e25cb1bc07b3656cb64336748344c1da94623668bac6faf11d214660591c2cc96199c94b80e30649ca30de40ef4ad978b825
-
Filesize
48KB
MD55a1706ef2fb06594e5ec3a3f15fb89e2
SHA1983042bba239018b3dced4b56491a90d38ba084a
SHA25687d62d8837ef9e6ab288f75f207ffa761e90a626a115a0b811ae6357bb7a59dd
SHA512c56a8b94d62b12af6bd86f392faa7c3b9f257bd2fad69c5fa2d5e6345640fe4576fac629ed070b65ebce237759d30da0c0a62a8a21a0b5ef6b09581d91d0aa16
-
Filesize
152B
MD594bd9c36e88be77b106069e32ac8d934
SHA132bd157b84cde4eaf93360112d707056fc5b0b86
SHA2568f49a43a08e2984636b172a777d5b3880e6e82ad25b427fef3f05b7b4f5c5b27
SHA5127d4933fae6a279cc330fde4ae9425f66478c166684a30cec9c5c3f295289cf83cbdf604b8958f6db64b0a4b1566db102fbcbdcdb6eca008d86d9a9c8b252ff16
-
Filesize
152B
MD525f87986bcd72dd045d9b8618fb48592
SHA1c2d9b4ec955b8840027ff6fd6c1f636578fef7b5
SHA256d8b542281740c12609279f2549f85d3c94e6e49a3a2a4b9698c93cca2dce486c
SHA5120c8a0d1a3b0d4b30773b8519a3d6e63d92973733da818ca9838599a9639e18df18ce31ebf56f46f6bbb7d89d10c726f4d73781e154d115a6068a3be7dd12b314
-
Filesize
6KB
MD5167a9d67d4acb661786d9524fdcb9916
SHA12ddee724fbd42eabc635fc001cfabf1d64084836
SHA2568cba8cea041b50836a8cf96be37e73799a2198df93d775d7b5bb1ca5007b8679
SHA5121df145a4989da3635bc20e5e3225644efc90b9fc2fd771a2b7c648744e61a332a7f1e91e12185150f6fb5d1259dd3cc511897adbc54d769780530ac30b1b7b5b
-
Filesize
99B
MD5ba92e5bbca79ea378c3376187ae43eae
SHA1f0947098577f6d0fe07422acbe3d71510289e2fc
SHA256ccf4c13cd2433fe8a7add616c7d8e6b384cf441e4d948de5c6fc73e9315c619f
SHA512aa1d8b7eb9add6c5ed5635295f501f950914affc3fa9aa1ee58167ed110f99a1760b05e4efb779df8e432eab1b2a0fc9cf9d67a05b2d5432ff8f82c620a38a62
-
Filesize
160B
MD52e19a9040ed4a0c3ed82996607736b8f
SHA15a78ac2b74f385a12b019c420a681fd13e7b6013
SHA2562eeb6d38d7aad1dc32e24d3ffd6438698c16a13efd1463d281c46b8af861a8ce
SHA51286669994386b800888d4e3acb28ab36296594803824d78e095eb0c79642224f24aca5d2892596ac33b7a01b857367ed3a5e2c2fb3405f69a64eb8bf52c26753f
-
Filesize
395B
MD500d904ad6df3029bba65b45027bb0a38
SHA1f08bb20ba002489e699bb62d4ea1325ad192bbf8
SHA2564f4a47205c9ad09ce1e2833db5aa6ddfb301f2b90b8a247eb3c78d3aa8368891
SHA512be35062071f473f2db9516a70ec60b28a649d711a47d914a59c37426ff45fc640c6687cf8294507aae1d632aae78df08ac7f1b929989f44b08ca2261e3d0f448