Resubmissions
21-02-2025 16:13
250221-tpfv6avqgl 10Analysis
-
max time kernel
193s -
max time network
203s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-02-2025 16:13
Static task
static1
Behavioral task
behavioral1
Sample
trigger.ps1
Resource
win10ltsc2021-20250217-en
General
-
Target
trigger.ps1
-
Size
28B
-
MD5
fbde43d916bb7ec62d1863fe3de8edbf
-
SHA1
61787be021ab6e3e9f20f759da7b4e85747a7e22
-
SHA256
f8b0d88d7094f254631363ddf906efc52ae7f71482c0c4041f07f7d069f89b43
-
SHA512
05b22324b60a44f6b757f5a1df5566872ca08ef1b82e99947ba30415cc69454ef1927de0ff7b5e7927809d62bf89896c6a9ac9377bd4ad29971f4927fdd38421
Malware Config
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Signatures
-
Detect Vidar Stealer 34 IoCs
resource yara_rule behavioral2/memory/4408-79-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-80-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-89-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-90-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-91-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-92-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-133-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-135-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-136-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-139-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-143-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-144-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-145-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-149-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-151-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-152-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-153-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-225-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-228-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-231-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-235-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-236-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-237-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-241-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-245-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-246-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-249-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-250-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-257-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-258-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-263-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-264-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-265-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4408-268-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Vidar family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 1380 powershell.exe 4 1380 powershell.exe 6 1380 powershell.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2560 chrome.exe 4392 chrome.exe 3068 chrome.exe 1064 msedge.exe 3936 msedge.exe 2800 msedge.exe 1320 chrome.exe 488 msedge.exe 792 msedge.exe -
Executes dropped EXE 1 IoCs
pid Process 3132 updater.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3132 set thread context of 4408 3132 updater.exe 81 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
pid Process 1380 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1956 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133846281280322752" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ powershell.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1380 powershell.exe 1380 powershell.exe 4408 BitLockerToGo.exe 4408 BitLockerToGo.exe 4408 BitLockerToGo.exe 4408 BitLockerToGo.exe 1320 chrome.exe 1320 chrome.exe 4408 BitLockerToGo.exe 4408 BitLockerToGo.exe 4408 BitLockerToGo.exe 4408 BitLockerToGo.exe 3480 msedge.exe 3480 msedge.exe 488 msedge.exe 488 msedge.exe 2052 identity_helper.exe 2052 identity_helper.exe 880 msedge.exe 880 msedge.exe 4408 BitLockerToGo.exe 4408 BitLockerToGo.exe 4408 BitLockerToGo.exe 4408 BitLockerToGo.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1380 powershell.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe Token: SeShutdownPrivilege 1320 chrome.exe Token: SeCreatePagefilePrivilege 1320 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 1320 chrome.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe 488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1380 wrote to memory of 3132 1380 powershell.exe 80 PID 1380 wrote to memory of 3132 1380 powershell.exe 80 PID 1380 wrote to memory of 3132 1380 powershell.exe 80 PID 3132 wrote to memory of 4408 3132 updater.exe 81 PID 3132 wrote to memory of 4408 3132 updater.exe 81 PID 3132 wrote to memory of 4408 3132 updater.exe 81 PID 3132 wrote to memory of 4408 3132 updater.exe 81 PID 3132 wrote to memory of 4408 3132 updater.exe 81 PID 3132 wrote to memory of 4408 3132 updater.exe 81 PID 3132 wrote to memory of 4408 3132 updater.exe 81 PID 3132 wrote to memory of 4408 3132 updater.exe 81 PID 3132 wrote to memory of 4408 3132 updater.exe 81 PID 3132 wrote to memory of 4408 3132 updater.exe 81 PID 3132 wrote to memory of 4408 3132 updater.exe 81 PID 4408 wrote to memory of 1320 4408 BitLockerToGo.exe 82 PID 4408 wrote to memory of 1320 4408 BitLockerToGo.exe 82 PID 1320 wrote to memory of 2168 1320 chrome.exe 83 PID 1320 wrote to memory of 2168 1320 chrome.exe 83 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 400 1320 chrome.exe 84 PID 1320 wrote to memory of 2216 1320 chrome.exe 85 PID 1320 wrote to memory of 2216 1320 chrome.exe 85 PID 1320 wrote to memory of 3476 1320 chrome.exe 86 PID 1320 wrote to memory of 3476 1320 chrome.exe 86 PID 1320 wrote to memory of 3476 1320 chrome.exe 86 PID 1320 wrote to memory of 3476 1320 chrome.exe 86 PID 1320 wrote to memory of 3476 1320 chrome.exe 86 PID 1320 wrote to memory of 3476 1320 chrome.exe 86 PID 1320 wrote to memory of 3476 1320 chrome.exe 86 PID 1320 wrote to memory of 3476 1320 chrome.exe 86 PID 1320 wrote to memory of 3476 1320 chrome.exe 86 PID 1320 wrote to memory of 3476 1320 chrome.exe 86 PID 1320 wrote to memory of 3476 1320 chrome.exe 86 PID 1320 wrote to memory of 3476 1320 chrome.exe 86 PID 1320 wrote to memory of 3476 1320 chrome.exe 86 PID 1320 wrote to memory of 3476 1320 chrome.exe 86
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\trigger.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\e8cd3796-629f-497e-b1a1-2a8509ce9cc9\updater.exe"C:\Users\Admin\AppData\Local\e8cd3796-629f-497e-b1a1-2a8509ce9cc9\updater.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7435cc40,0x7ffa7435cc4c,0x7ffa7435cc585⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,9558783386982660905,12559016836712278016,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1928 /prefetch:25⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1784,i,9558783386982660905,12559016836712278016,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2060 /prefetch:35⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1852,i,9558783386982660905,12559016836712278016,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2372 /prefetch:85⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,9558783386982660905,12559016836712278016,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3124 /prefetch:15⤵
- Uses browser remote debugging
PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,9558783386982660905,12559016836712278016,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3168 /prefetch:15⤵
- Uses browser remote debugging
PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4172,i,9558783386982660905,12559016836712278016,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4184 /prefetch:85⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4348,i,9558783386982660905,12559016836712278016,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4580 /prefetch:15⤵
- Uses browser remote debugging
PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4784,i,9558783386982660905,12559016836712278016,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4876 /prefetch:85⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4788,i,9558783386982660905,12559016836712278016,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4980 /prefetch:85⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4760,i,9558783386982660905,12559016836712278016,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4752 /prefetch:85⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4756,i,9558783386982660905,12559016836712278016,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5180 /prefetch:85⤵PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4868,i,9558783386982660905,12559016836712278016,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5144 /prefetch:85⤵PID:4000
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa74363cb8,0x7ffa74363cc8,0x7ffa74363cd85⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1836 /prefetch:25⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:85⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:15⤵
- Uses browser remote debugging
PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:15⤵
- Uses browser remote debugging
PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1796 /prefetch:25⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2588 /prefetch:25⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2272 /prefetch:25⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2192 /prefetch:25⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2148 /prefetch:25⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2164 /prefetch:15⤵
- Uses browser remote debugging
PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4496 /prefetch:15⤵
- Uses browser remote debugging
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:85⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1828,7364503577286751821,12526181282773422087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\xt2db" & exit4⤵
- System Location Discovery: System Language Discovery
PID:3708 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1956
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3340
Network
MITRE ATT&CK Enterprise v15
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD553c68f0f93ab9a94804c00720a0bcd9a
SHA19009307d51e1fd60f9a90d77007e377c7f893434
SHA256a38f0777d4ca9e777191cc924c22eb1847ae805ab79ff224860e8c70d7f49422
SHA512a1d5b92fced821328a668fbfe9ad694b99c873ffa3ed28aa5bf1e8ef8054486289b5ddb26236cfa7c1ca0db993f306cdfc5878480b6a543aca1620075f77d670
-
Filesize
152B
MD54815ecce34e90c0f6ca91c7e35be703f
SHA161ec0042ccee59f6bdf6b96eb9f412cc97717702
SHA2565db366717739338c23e07ca15aea2b48924a3b3ecacb214221239333b11ae7d6
SHA512751dfd6eea90fc4efb557611e8afc6ef1634c4e2bdd97f3c72638def09f644ebd8bf5696b9ed8379973106524d08c67188f7f64c0f941e8f95109920120dae05
-
Filesize
5KB
MD52618c9459fc4a88f5d2eb6e6b00ca0b4
SHA1caef6a026eafeb652dd74f8b4ea1db4699d243c6
SHA2561de9dcd9b1c42890bff074cd5f398a9eb520370bde4d1ce9a310d52383fd42a6
SHA51210413fd8b9308a269e082709d5b4ccb83a5e403d94016624396203ea4db7c0d6be649b9567d675b3eacc447ec860237447f9a50c1b6af9bd8606dc5d880454de
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.2MB
MD5fcdd5d8bbdd7e9c70b30904c37267bb2
SHA16c8c923851462e0c97b48b3826643eea441ed8b6
SHA256d9b7cd71505bd423ba63c900c792c585314c44d9515cd2767f6c9826e8237979
SHA5122ea5167cb7c6f4d87d2e3a595cdd40a2be9e24098841a40c64bf50db9e55f954ae7da0646d9ae10f4e833ba793a94fb304791445c8f9f78197e11ce04af012eb