Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2025, 12:35
Behavioral task
behavioral1
Sample
build22.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
build22.exe
Resource
win10v2004-20250314-en
General
-
Target
build22.exe
-
Size
7.0MB
-
MD5
0176388641637593938f5278b326a494
-
SHA1
39d6cf486e4f292605f8cf0f6a19097e59462d6f
-
SHA256
3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158
-
SHA512
b00cd6c016b4844b8ac7b434f2bd7d621879eed815210e9a846741efd49121348755ef4d6ef9609965abbf1a154c0017c56b9fee79854bd031e3eaddfc4e4ca7
-
SSDEEP
196608:XMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:AA403qakSoR7tfI7ZtXADu8X9Y95GQLJ
Malware Config
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3288 chrome.exe 1672 chrome.exe 4264 chrome.exe 2904 msedge.exe 2448 chrome.exe 4836 chrome.exe 1776 msedge.exe 4292 msedge.exe 1784 msedge.exe 4816 msedge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Control Panel\International\Geo\Nation build22.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41 icanhazip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 3932 cmd.exe 1888 netsh.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 build22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier build22.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1376 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 3140 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133867749272086989" chrome.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 2448 chrome.exe 2448 chrome.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe 4032 build22.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 2448 chrome.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4032 build22.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeSecurityPrivilege 4980 msiexec.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeShutdownPrivilege 2448 chrome.exe Token: SeCreatePagefilePrivilege 2448 chrome.exe Token: SeDebugPrivilege 3140 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2448 chrome.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4032 wrote to memory of 2448 4032 build22.exe 92 PID 4032 wrote to memory of 2448 4032 build22.exe 92 PID 2448 wrote to memory of 3260 2448 chrome.exe 93 PID 2448 wrote to memory of 3260 2448 chrome.exe 93 PID 4032 wrote to memory of 3932 4032 build22.exe 94 PID 4032 wrote to memory of 3932 4032 build22.exe 94 PID 3932 wrote to memory of 1584 3932 cmd.exe 96 PID 3932 wrote to memory of 1584 3932 cmd.exe 96 PID 2448 wrote to memory of 380 2448 chrome.exe 98 PID 2448 wrote to memory of 380 2448 chrome.exe 98 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 3164 2448 chrome.exe 99 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 PID 2448 wrote to memory of 1940 2448 chrome.exe 100 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-869607583-2483572573-2297019986-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\build22.exe"C:\Users\Admin\AppData\Local\Temp\build22.exe"1⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffe066dcf8,0x7fffe066dd04,0x7fffe066dd103⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2052,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2044 /prefetch:33⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2016,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2008 /prefetch:23⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2404,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2400 /prefetch:83⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3016,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3012 /prefetch:13⤵
- Uses browser remote debugging
PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2992,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2988 /prefetch:13⤵
- Uses browser remote debugging
PID:3288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4116,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4112 /prefetch:23⤵
- Uses browser remote debugging
PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4556,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4508 /prefetch:13⤵
- Uses browser remote debugging
PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5184,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5172 /prefetch:83⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5452,i,4348890665838711689,11547331707073651647,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5448 /prefetch:83⤵PID:5104
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1584
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1888
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:3880
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵PID:1136
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:4636
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2512
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x29c,0x7fffdcacf208,0x7fffdcacf214,0x7fffdcacf2203⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2212,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2208 /prefetch:33⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2172,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2164 /prefetch:23⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2632,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2628 /prefetch:83⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3472,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3468 /prefetch:13⤵
- Uses browser remote debugging
PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3520,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3508 /prefetch:13⤵
- Uses browser remote debugging
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4160,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4156 /prefetch:13⤵
- Uses browser remote debugging
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4204,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4288 /prefetch:23⤵
- Uses browser remote debugging
PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5044,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4388 /prefetch:83⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5184,i,17378389883781911555,16114877129120312376,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5168 /prefetch:83⤵PID:2700
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\c0e15053-a07b-4f3b-89fe-4c47c42ebc91.bat"2⤵PID:2304
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:1600
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 40323⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:1376
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2424
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1652
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1152
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5bace49cf00968389e1287531fa5583d8
SHA14567515430fdcf5139b0edad5b2b19f38783f1f3
SHA256809b70a4b53bea4b4cb83a49025b783cbe18e3f43946c3381e9ac7510d19554e
SHA51268dcb5fea5f2e6aa42507e1779e3b67763d266803dffd18ebfb54be66d8f7e98e09cdcde7bcb7e4086c2f612a8172f80a8ec993b0c3ec4c15a356680f6dafbf4
-
Filesize
280B
MD5049e5a246ed025dee243db0ba8e2984c
SHA115ec2d2b28dcfc17c1cfb5d0c13482d0706f942d
SHA25633071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12
SHA512bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b
-
Filesize
280B
MD54facd0ff10154cde70c99baa7df81001
SHA165267ea75bcb63edd2905e288d7b96b543708205
SHA256a13534df0cd0a79a3a1b91085a6d575b47d5a9aad7fc6d712fd2616c0e95a23b
SHA512ad8d2b965851c0ddc23e92ae151b3b0b2bcda850c446f4278bdb0754d6b42ead8fc034b394749578a27b33ad7e4ab0633f974dfd4773fbe4d93ae477f00b73f2
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc742e8e-8d86-4c2c-a946-d520a388195f\index-dir\the-real-index
Filesize1KB
MD579cfa396fe50ab43108336ca42352432
SHA1e1f5af3db0582f87f3a177149040b43f45220cd0
SHA25660fe790283f02740d32e42cb6b096586417e3d4d3cdd637c53ce25bbc4490ad2
SHA512488576995fd432283441fb61e71632c7e2b0a65ef81637ddb2178b376d224e204ffa8c7a972db452c3f3675cd345f07aa2e0ddf36fd499a6ca24c15f8e6b4a2c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc742e8e-8d86-4c2c-a946-d520a388195f\index-dir\the-real-index~RFe57e639.TMP
Filesize1KB
MD5ee2cdbfe8db0d81d85cfa6d6669818d8
SHA1b74d34db6ac386e48891c5243350357a77d50df8
SHA256fe34b1099594c0ce45b166a9753269c87a282c460ccdc9a919406431b4ea79f5
SHA5123b54d7c6ce04d787b15305beb2a363cce366ea410893bc6455c1b41ae40b13e1b81f05e3eb1046b5e804b86f4f427ac8e463ae0e5d3f0c8a1c002f89d901f4e0
-
Filesize
6KB
MD59de93a7508bcec6159e8fe9b197c12c3
SHA1a0f0a8a30cd2e6e87398b8a0a22116c01bc0bb6a
SHA256ad4f791cbc0c59ff972afac9028f68d5ba59716cd282b34e56577fccaa4d3571
SHA512232c045fb6f755400fd3339e28950a552b20fcc98225e13f6b4920bda43df417db03d9a519692bdf9caf2e113b18be49eafee1f897e853ad2a98493d3c1de29f
-
Filesize
7KB
MD5c5ae734176a496c652598a1b903f63b4
SHA18fddb685c1b8c2254dda09eaf7af574cb1f447a8
SHA256955b52483212796979935ec845ea2d6bc2a7e1a6315d53cf22d3067897aac7c0
SHA512fc6d450709fb6a135e41ee0a53e7932464879744b18117fe44b4c16d3046b58c32c5f07f57d0c301c0d769605ae8f99008e430ebf0c2bd28356c08772a7a89fd
-
Filesize
152B
MD52415b4db26f526d787a581cbdbc86595
SHA1dfb04b6abfaacaa4bb6857e272c11cfaa6982ab7
SHA2565fef0f969efd45bc70c150c8d43400c1e21e7624ab7c4bfe9070c97684447d3f
SHA51210e11f23ed3325f4de5aec0a3bc2ba94ee9600e698770cfb9154dc1c0f95cfdbfe67ce4acfbc6dc49419989fb4069295861fe919e15610803ad6c54d2753c2e0
-
C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\Browsers\Firefox\Bookmarks.txt
Filesize173B
MD570e1643c50773124c0e1dbf69c8be193
SHA10e2e6fd8d0b49dddf9ea59013a425d586cb4730c
SHA2564fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a
SHA512664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679
-
C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\Browsers\Microsoft Edge\Cookies.txt
Filesize1KB
MD56caecbd237bf9a627d697986f534561a
SHA1564533f95a1adbcd0b5d4d1a8a79cbd6f516b335
SHA2561501d94d1f3aa150ec16aa10032cef7ee90a528e53a6608aebf77bd3d707f661
SHA512c4510e379dd673e8e256c0d7747497264d3cd1b418467802b85cf4202df18c005a0e49339d32f3fc1587fa0675d04b02eb125bc99662bd8f155064386489f672
-
Filesize
846B
MD5810c1a2dc826cfe53b97393087e70545
SHA1664813d995f98b54c1a57992bbf827901a7be644
SHA2563bb06f31828639a6740c269217c1135a24aff002ce1ca87226ea1f1fb185bbe0
SHA51254007e7636e689e8c4f6b1bc768a48413587a2c5add1c64bcaf6c317f9cd29ffd4d0150f2163e0f2f819b8397604e0cd33e6af6335a95c63a1a0dacee60ed700
-
Filesize
6KB
MD5286b8dc0b1a7469ef63c4577e6a0a17b
SHA17f6f1a19dfeb67fdf7f1f3512c3b67f1c6eb4a55
SHA25622990aaf8d380c99d0dd9593b6f607fc889e3064cdb78735e62c75556922038b
SHA5126ca0dc36d4a0f6d2363772762a2c32abdaa520a9d41113b3839657b1330f703a3f1e573dfd071abc038ef98a1d33dc11af31f08931e88f307b565f4b472c1b56
-
C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Process.txt
Filesize3KB
MD53f256aa76b239378f703bc49f57978f8
SHA1993b598f90c479f475b7a6e147970b7c1b4111a8
SHA256d7b47636d892dea3afd56aebdb0714cab03ae2f2b3c0ade0c1043c22e5cbc2ba
SHA51289df2d2d8705c2c4133357f8010e69792718a22379429545ce61e88d417af4e5e3be1ec1b1859812316ff6acada56f812abcb34c50888a848f7671be84e45afe
-
C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Process.txt
Filesize3KB
MD50738e0bb4c58bd206953002da41b22b3
SHA1a9d2ea6c22812c5c28310cb6bfc1e0d056f58df9
SHA2565fcb3bb9d5f2168ee99e2596e5f02626af515c64310d80a164b4676fdc1d5852
SHA512b5caf3771323b6468d75db4483dc83e19044799e628e419df9f4e13aef6f02cad0d95d7524aca53fd4ab603ea683c53467df68e79e0555b8787bba8b0b4ea160
-
C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Process.txt
Filesize4KB
MD58be27b84b49603f2d7621658c15a6da0
SHA120472ac08d320c7e90bd2988d1e0b027d37e22cc
SHA2568e291623e70e6972c79071624a974acd8e1248bc742e6c69cba90295db16c58c
SHA51228071ee6e20adaeda79aad62b575ecdb5927213d71ab53bac8611c0781c6edb1977efc85434c6fe45989ac1ca415d237425c10ffcf77b855c9263130ce03ec2f
-
C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Process.txt
Filesize773B
MD563619097a19aabe5543969d5363b4878
SHA112d2d84ad9c639bcff461805f5aa6a679ea87351
SHA2564cdaf79ed834e2c4572c44b3af6178af7a5d62e80db59f7f1237bfaab9f8bcaa
SHA5126ec2e77c703825d4dd0e2b19c3cede950c206a75982da1a36eef6d8ec051f98b5b11f393c6e6658387ad789b8e1f5e7bedad876e8f1a8127ba1b8bd7b1a7f8a4
-
C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Process.txt
Filesize1KB
MD5828c5b1ad51450a736116534eca04030
SHA1803d282808898fe528186ed497cb3a36431b1408
SHA256bbfaed6465a120fe949d716305e0135ec6a80a39843104a8f25731c2e808e836
SHA5127a84efce2d76dee577346d55ee9c7678affb3f38fe236b57e3a6cddb14e3eeb2b85a117cce01225daac53da4da28ebb48b9781ac451686b872252b4a037846d6
-
C:\Users\Admin\AppData\Local\d06a1a8fd02627f641597a24c74fe1f7\Admin@BMIVDHSR_en-US\System\Process.txt
Filesize2KB
MD5d05e1fa96a2adb3bbb06b12775c55107
SHA178c57e7d350bf222bed7a072b7f26e5faeb3a3ea
SHA256285e680314a3ff5a5d02882ca9ac4f608f26945933b5036e600953215d0c37bf
SHA512c0063fd479ce74fb5b9dad8151d3e40b11fb910c559a4124546d2da18f7c23bb639acc9195a3c9bf1c9e0fc2a1f948b48e1d9eb88acd6feb35409ad619995a4a
-
Filesize
4B
MD5e8dfff4676a47048d6f0c4ef899593dd
SHA1b64b34db6b0bccc0a3efb43d0d0fb014e40dccb7
SHA2569e645831962e43f534afd60532328ba5ab4eefea6e73765fb9690e4d395112f8
SHA5129f4ecf9a843114685ec8b12e7e7ab3f5e006da1146ac5d5628fff8c6ee5a073ea87de4b2de95e3e4b0978cf6a155154e3a1d7d9c44d63fca1bc5cab87214cfe8