Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 01:52
Behavioral task
behavioral1
Sample
2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe
-
Size
14.1MB
-
MD5
4d20db0bfded7146b49934bc064e055e
-
SHA1
c0ae8d11c306dab8e17d07424c82cf44719adb85
-
SHA256
19e8bb6559c77ea1c127538eb917303191bd9b51b8cf6c8ac4a2af84aeea0d4d
-
SHA512
f07a004b179739e53b7b98f9ac244aafb627632fb82eadbfaf79e3f369d86b3b1add50f1ef09fc270abee88dedf29375cd2db06014a3ef7b713ad7b543aa1a08
-
SSDEEP
98304:L7gCHjx7UjQutriizduJI/Zff3ssQQjz47NsUaE4JXe6JmwQc5V1Y1XDYOq2:Ltd7UjQutFzEyfBzUH4JmeV1I9
Malware Config
Signatures
-
Enumerates VirtualBox DLL files 2 TTPs 10 IoCs
description ioc Process File opened (read-only) \??\c:\windows\system32\vboxdisp.dll 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\vboxhook.dll 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\vboxmrxnp.dll 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\vboxoglcrutil.dll 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\vboxoglfeedbackspu.dll 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\vboxoglpackspu.dll 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\vboxogl.dll 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\vboxoglarrayspu.dll 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\vboxoglerrorspu.dll 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\vboxoglpassthroughspu.dll 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Identifies Xen via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\xen 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\xen 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\xen 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Looks for Parallels drivers on disk. 2 TTPs 6 IoCs
description ioc Process File opened (read-only) \??\c:\windows\system32\drivers\prltime.sys 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\drivers\prl_pv32.sys 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\drivers\prleth.sys 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\drivers\prlfs.sys 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\drivers\prlmouse.sys 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\drivers\prlvideo.sys 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Looks for VirtualBox drivers on disk 2 TTPs 4 IoCs
description ioc Process File opened (read-only) \??\c:\windows\system32\drivers\VBoxMouse.sys 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\drivers\VBoxGuest.sys 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\drivers\VBoxSF.sys 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\drivers\VBoxVideo.sys 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Looks for VirtualBox executables on disk 2 TTPs 3 IoCs
description ioc Process File opened (read-only) \??\c:\windows\system32\VBoxControl.exe 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\vboxservice.exe 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\vboxtray.exe 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\VMware, Inc.\VMware Tools 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Looks for VMWare drivers on disk 2 TTPs 2 IoCs
description ioc Process File opened (read-only) \??\c:\windows\system32\drivers\vmmouse.sys 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe File opened (read-only) \??\c:\windows\system32\drivers\vmhgfs.sys 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Looks for VMWare services registry key. 1 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VMMEMCTL 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\vmware 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\vmci 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\vmx86 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\vmdebug 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\vmmouse 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VMTools 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Looks for Xen service registry key. 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\xenvdb 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\xenevtchn 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\xennet 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\xennet6 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\xensvc 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4672 msedge.exe 836 chrome.exe 1936 chrome.exe 2960 msedge.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Maps connected drives based on registry 3 TTPs 5 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\Disk\Enum\ 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\Disk\Enum\ 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\ 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\DeviceDesc 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\FriendlyName 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Checks system information in the registry 2 TTPs 1 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe -
pid Process 3676 powershell.exe 3068 powershell.exe 2664 powershell.exe 2364 powershell.exe 1664 powershell.exe 3120 powershell.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\ 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\BIOS\ 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Kills process with taskkill 7 IoCs
pid Process 676 taskkill.exe 1600 taskkill.exe 4548 taskkill.exe 3096 taskkill.exe 3716 taskkill.exe 2328 taskkill.exe 3536 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\Local Settings explorer.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 0400000001000000100000003e455215095192e1b75d379fb187298a0f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b1d00000001000000100000006ee7f3b060d10e90a31ba3471b9992367f000000010000000c000000300a06082b060105050703097a000000010000000c000000300a06082b060105050703097e00000001000000080000000000042beb77d501030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c190000000100000010000000a823b4a20180beb460cab955c24d7e21200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 5c000000010000000400000000080000190000000100000010000000a823b4a20180beb460cab955c24d7e21030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c7e00000001000000080000000000042beb77d5017a000000010000000c000000300a06082b060105050703097f000000010000000c000000300a06082b060105050703091d00000001000000100000006ee7f3b060d10e90a31ba3471b999236140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c990b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b060105050703080f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d0400000001000000100000003e455215095192e1b75d379fb187298a200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5000 vlc.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3676 powershell.exe 3676 powershell.exe 3676 powershell.exe 3068 powershell.exe 3068 powershell.exe 3068 powershell.exe 2664 powershell.exe 2664 powershell.exe 2364 powershell.exe 2364 powershell.exe 3120 powershell.exe 3120 powershell.exe 3120 powershell.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5000 vlc.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 3676 powershell.exe Token: SeDebugPrivilege 3068 powershell.exe Token: 33 3912 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3912 AUDIODG.EXE Token: 33 5000 vlc.exe Token: SeIncBasePriorityPrivilege 5000 vlc.exe Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 2364 powershell.exe Token: SeDebugPrivilege 3120 powershell.exe Token: SeDebugPrivilege 3536 taskkill.exe Token: SeDebugPrivilege 676 taskkill.exe Token: SeDebugPrivilege 1600 taskkill.exe Token: SeDebugPrivilege 4548 taskkill.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeDebugPrivilege 3096 taskkill.exe Token: SeDebugPrivilege 3716 taskkill.exe Token: SeDebugPrivilege 2328 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe 5000 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4848 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 88 PID 4068 wrote to memory of 4848 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 88 PID 2300 wrote to memory of 5000 2300 explorer.exe 90 PID 2300 wrote to memory of 5000 2300 explorer.exe 90 PID 4068 wrote to memory of 3676 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 92 PID 4068 wrote to memory of 3676 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 92 PID 4068 wrote to memory of 3068 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 94 PID 4068 wrote to memory of 3068 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 94 PID 4068 wrote to memory of 2664 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 106 PID 4068 wrote to memory of 2664 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 106 PID 4068 wrote to memory of 2364 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 108 PID 4068 wrote to memory of 2364 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 108 PID 4068 wrote to memory of 1664 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 110 PID 4068 wrote to memory of 1664 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 110 PID 4068 wrote to memory of 3120 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 112 PID 4068 wrote to memory of 3120 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 112 PID 4068 wrote to memory of 3536 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 114 PID 4068 wrote to memory of 3536 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 114 PID 4068 wrote to memory of 676 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 116 PID 4068 wrote to memory of 676 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 116 PID 4068 wrote to memory of 1600 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 118 PID 4068 wrote to memory of 1600 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 118 PID 4068 wrote to memory of 4548 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 120 PID 4068 wrote to memory of 4548 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 120 PID 4068 wrote to memory of 836 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 122 PID 4068 wrote to memory of 836 4068 2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe 122 PID 836 wrote to memory of 2700 836 chrome.exe 123 PID 836 wrote to memory of 2700 836 chrome.exe 123 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124 PID 836 wrote to memory of 2996 836 chrome.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-02_4d20db0bfded7146b49934bc064e055e_frostygoop_golang_luca-stealer_poet-rat_sliver_snatch.exe"1⤵
- Enumerates VirtualBox DLL files
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Xen via ACPI registry values (likely anti-VM)
- Looks for Parallels drivers on disk.
- Looks for VirtualBox Guest Additions in registry
- Looks for VirtualBox drivers on disk
- Looks for VirtualBox executables on disk
- Looks for VMWare Tools registry key
- Looks for VMWare drivers on disk
- Looks for VMWare services registry key.
- Looks for Xen service registry key.
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks system information in the registry
- Enumerates system info in registry
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\preview_1.mp42⤵PID:4848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-Process | Select-Object -ExpandProperty ProcessName"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-Process | Select-Object -ExpandProperty ProcessName"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-WmiObject Win32_Processor | Select-Object -ExpandProperty Name"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-WmiObject Win32_VideoController | Select-Object -ExpandProperty Name"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-WmiObject Win32_OperatingSystem | Select-Object -ExpandProperty TotalVisibleMemorySize"2⤵
- Command and Scripting Interpreter: PowerShell
PID:1664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-Process | Select-Object Id, ProcessName | ConvertTo-Json | Out-File -FilePath \"C:\Users\Admin\AppData\Local\Temp\Goignwej\ProcessSnapshot.json\" -Encoding utf8"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM msedge.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM firefox.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --restore-last-session --remote-debugging-port=49422 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" https://greyshare.pics/home2⤵
- Uses browser remote debugging
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd61efcc40,0x7ffd61efcc4c,0x7ffd61efcc583⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --use-angle=swiftshader-webgl --headless --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --field-trial-handle=1444,i,17339296424275493785,1392253818213652557,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1328 /prefetch:23⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --field-trial-handle=1648,i,17339296424275493785,1392253818213652557,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1644 /prefetch:33⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --remote-debugging-port=49422 --allow-pre-commit-input --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --field-trial-handle=1808,i,17339296424275493785,1392253818213652557,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1800 /prefetch:13⤵
- Uses browser remote debugging
- Drops file in Program Files directory
PID:1936
-
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM msedge.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --restore-last-session --remote-debugging-port=49422 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" https://greyshare.pics/home2⤵
- Uses browser remote debugging
PID:2960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffd61f046f8,0x7ffd61f04708,0x7ffd61f047183⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1456,759081772909138873,5818887879559268062,131072 --disable-features=PaintHolding --headless --headless --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --override-use-software-gl-for-tests --mojo-platform-channel-handle=1484 /prefetch:23⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1456,759081772909138873,5818887879559268062,131072 --disable-features=PaintHolding --lang=en-US --service-sandbox-type=none --use-gl=swiftshader-webgl --headless --mojo-platform-channel-handle=1868 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=49422 --allow-pre-commit-input --field-trial-handle=1456,759081772909138873,5818887879559268062,131072 --disable-features=PaintHolding --lang=en-US --headless --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2044 /prefetch:13⤵
- Uses browser remote debugging
PID:4672
-
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM msedge.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\preview_1.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5000
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x474 0x3041⤵
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1360
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
12Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bb924686a541b7af75d0e50e21a24963
SHA159f75e51e57a62c4fac4f476bbe1984101a05d9a
SHA256fdb0779ff9d463998ff9f3bd1d63562212dc4669cd921826eee6a992429925bc
SHA512becf83de8dd36d81a0389d8844819bac185377f17504c548d989975bc579444cf50a157dd7bc625d26619936bd1d009fd1df650a12f3394897ad513891a7272d
-
Filesize
1KB
MD55dfb3e86f895056b34c3b685f46464df
SHA19a955177aaf9abb00beee23ff570d8e8bdc08046
SHA256f95f92b0b130cd43434d2a1996ac22b81d0fb2c9c543b27f01649a9de7968081
SHA512e8deded4a37c6626c0d848f33ff3c61ce5e8eeb2436ad75548be8c9e273e2b0c0a8d5c94918a537511a365282ba5f00ee904bd9885c8d78e42afd6bef03735bc
-
Filesize
1KB
MD53523cf2254ecc0e5201d285ac26b6558
SHA18c51b038249d00f2e3db9a59b7566c1d9a3dd8eb
SHA256fe6dbcf09a063aa5ef77e97bc10769484e465688f5d91e2485f4478539bd426b
SHA5124cca0430edf887f85e83c2eeb73ee0b3dbfa7a1fdaa6edf1d991a87fea51d4eb5e4def1514baa28ac51da34bed1dcc0623c1a9a53bf254312b06095197ff67f4
-
Filesize
1KB
MD5d221db4c51d194007e73e0803c799522
SHA1d758c137944f764fa8a31bd4f229fb818f63a99b
SHA256bdd1e2931430c30f8f9267961e6fefb9906beb141deb39ff4e0a8e18a7043ae6
SHA512ec48034f3db9dfa66a0701b6e2caef43ad515de40141d2878a2b9345829ee2e5e333640d0133f54851aa7246f1ef2fccd61fa8e54dd37c22dd49ee52a52c110d
-
Filesize
1KB
MD5c23eafb18fc7b4d393d1a2b005acf6a1
SHA18f4e8135eedc72254daa513607ac85c2af7e3068
SHA2566d1ffb37f8e778378788d3e859cb26f6947a267faecf8b4152547aedc6cbaf37
SHA5124ccef206d65c2adb0b3e1ca00f1c7b33ce8c6e6d50b459a365e0aa745056a694f32a6f776cf90d0b5810ec2bdb62aba6b82afe5cb396a6966d08f0178823f1af
-
Filesize
6KB
MD5177ae3f66161caedd25d37cb3e019a31
SHA1d6bb15a6e5f6e78f1478d32c891df6f1a2a11884
SHA2569ab9271c3b208f8d1a5d894ea0b8691a53867e5480c051df534caebb5c60d172
SHA512d5f588990813f3272ad29db8c0b6182ba74a6347c30d22cc5b07149c20201ae91874591a6d8c4d677da20c7f37f2acbba3cc2ba5437f2193652355e6d7d09edd
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
831KB
MD568cc711207098a3eceba85a915c9b7c5
SHA1b5dc2fbf612a2f42a9bb6de3f1e62ac103b50f5d
SHA256f07ae91ec92d78ec20532e6b49665945f6e572b3461a116b26343066a6a50de7
SHA5123224209542c6472b1105c70b4ac16c6835733bcb1920ac2d0ea79df3e6554b3bf1cc6e4de55215b118aae9ea3a26e4fab8322168128fc40c704bd1f56e5867fb