Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2025, 12:44
Behavioral task
behavioral1
Sample
build22.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
build22.exe
Resource
win10v2004-20250314-en
General
-
Target
build22.exe
-
Size
7.0MB
-
MD5
0176388641637593938f5278b326a494
-
SHA1
39d6cf486e4f292605f8cf0f6a19097e59462d6f
-
SHA256
3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158
-
SHA512
b00cd6c016b4844b8ac7b434f2bd7d621879eed815210e9a846741efd49121348755ef4d6ef9609965abbf1a154c0017c56b9fee79854bd031e3eaddfc4e4ca7
-
SSDEEP
196608:XMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:AA403qakSoR7tfI7ZtXADu8X9Y95GQLJ
Malware Config
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 6028 msedge.exe 5176 msedge.exe 1984 msedge.exe 4496 chrome.exe 5084 chrome.exe 2064 chrome.exe 3268 chrome.exe 5152 chrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation build22.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41 icanhazip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4224 netsh.exe 4812 cmd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 build22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier build22.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4064 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 3748 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133867754699801032" chrome.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 4496 chrome.exe 4496 chrome.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe 6000 build22.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 4496 chrome.exe 6028 msedge.exe 6028 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 6000 build22.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeSecurityPrivilege 3976 msiexec.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeShutdownPrivilege 4496 chrome.exe Token: SeCreatePagefilePrivilege 4496 chrome.exe Token: SeDebugPrivilege 3748 taskkill.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4496 chrome.exe 6028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 6000 wrote to memory of 4496 6000 build22.exe 88 PID 6000 wrote to memory of 4496 6000 build22.exe 88 PID 4496 wrote to memory of 4492 4496 chrome.exe 89 PID 4496 wrote to memory of 4492 4496 chrome.exe 89 PID 6000 wrote to memory of 4812 6000 build22.exe 90 PID 6000 wrote to memory of 4812 6000 build22.exe 90 PID 4812 wrote to memory of 4772 4812 cmd.exe 92 PID 4812 wrote to memory of 4772 4812 cmd.exe 92 PID 4812 wrote to memory of 4224 4812 cmd.exe 93 PID 4812 wrote to memory of 4224 4812 cmd.exe 93 PID 4812 wrote to memory of 3312 4812 cmd.exe 94 PID 4812 wrote to memory of 3312 4812 cmd.exe 94 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4348 4496 chrome.exe 95 PID 4496 wrote to memory of 4380 4496 chrome.exe 96 PID 4496 wrote to memory of 4380 4496 chrome.exe 96 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 PID 4496 wrote to memory of 2196 4496 chrome.exe 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\build22.exe"C:\Users\Admin\AppData\Local\Temp\build22.exe"1⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:6000 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe2e9adcf8,0x7ffe2e9add04,0x7ffe2e9add103⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1960,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=1952 /prefetch:23⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2136,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2132 /prefetch:33⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2280,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2276 /prefetch:83⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3012,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3008 /prefetch:13⤵
- Uses browser remote debugging
PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3052,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3048 /prefetch:13⤵
- Uses browser remote debugging
PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4148,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4144 /prefetch:23⤵
- Uses browser remote debugging
PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4588,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4584 /prefetch:13⤵
- Uses browser remote debugging
PID:5152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5116,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5112 /prefetch:83⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5400,i,2549973803807192845,3992576145819266235,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5396 /prefetch:83⤵PID:5672
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4772
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4224
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:3312
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵PID:872
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:4008
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5716
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x254,0x7ffe2ce0f208,0x7ffe2ce0f214,0x7ffe2ce0f2203⤵PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2212,i,975868797165471255,6471958975750008305,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2208 /prefetch:33⤵PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2172,i,975868797165471255,6471958975750008305,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2164 /prefetch:23⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2252,i,975868797165471255,6471958975750008305,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2936 /prefetch:83⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3492,i,975868797165471255,6471958975750008305,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3488 /prefetch:13⤵
- Uses browser remote debugging
PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3536,i,975868797165471255,6471958975750008305,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3544 /prefetch:13⤵
- Uses browser remote debugging
PID:5176
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\56a38433-58a3-4270-beb7-9918367c59af.bat"2⤵PID:5796
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:5836
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 60003⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:4064
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2264
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1252
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2896
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\Browsers\Firefox\Bookmarks.txt
Filesize173B
MD570e1643c50773124c0e1dbf69c8be193
SHA10e2e6fd8d0b49dddf9ea59013a425d586cb4730c
SHA2564fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a
SHA512664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679
-
C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\Browsers\Microsoft Edge\Cookies.txt
Filesize1KB
MD57dcd9f390d45bdd4e6e68b3e02b5a081
SHA159eb5dd7bd0feeda37f23494934077cc8fe36178
SHA256c81f4f600d1743d00c90a84892a4b1b9dfd479f0df74b3a0aa4f8e57391bb816
SHA512b86f2d50aba9f8ce6c9ba30c441a695d38ca65a3f9508c0af4f64cbde0378b0b3c3b8842aa9a48daba80020996696fd4897b7c2ca8550c407c8298b77e1abcb5
-
Filesize
2KB
MD53e3d169b3c3dc0a1d3b69dc6fe081c01
SHA1308fb934b327e2731d7b3504af462944cadc9245
SHA256ee7b70d356882b2221d413b697d8552fbbe252b8e6c73a66df4a03e72bdb8654
SHA5126da26caa4cfcba082890755d22f869895cca53a9e2c7582975c4f45794c2c5b0e31dd2b4e2bbe2550fc935ed1252a9cb232846cb262709c3f14ee5af6ec47da1
-
Filesize
3KB
MD518649d5924d8048eec12b9b525efac79
SHA1598592e19fc69e3f86d229d219229a3b0dc22272
SHA25601e5b309e5239a00c88cfcdf2dcbf094fe25f29f55915d589f4a76d362edea81
SHA51253edd1072e9421c7af2bb6d27fa9d5d8729be9144d4ac781b9506799abf115446fdec57b84d77d59bb6e45a088db957873260d582c9c0a99ecf5be290d4ba160
-
Filesize
6KB
MD5286b8dc0b1a7469ef63c4577e6a0a17b
SHA17f6f1a19dfeb67fdf7f1f3512c3b67f1c6eb4a55
SHA25622990aaf8d380c99d0dd9593b6f607fc889e3064cdb78735e62c75556922038b
SHA5126ca0dc36d4a0f6d2363772762a2c32abdaa520a9d41113b3839657b1330f703a3f1e573dfd071abc038ef98a1d33dc11af31f08931e88f307b565f4b472c1b56
-
C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt
Filesize4KB
MD5e7efefe7c34f962eb711bb3b9ebb3353
SHA157aa04fc8d7d5559bbb13a99f7e607e013ca30d1
SHA25645978f900da87f6f8172cd83c54d309aac1ee852562bcb9c501cfa0a78d38bd8
SHA51253a83103045a8e7848227b647f17d65428c2d7238e8cfafc5d51fb3414339c590c9aac1f2335c415d4f4283b5f6b13ba7588a62a7d955eb39662a6506f147fe2
-
C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt
Filesize673B
MD5aeb5b6dc5bf00a3e5e3d596427f243a4
SHA1cb9cfe191db1ca6d7ac0da9660f7fca8513b9eff
SHA2567c9cd37f146db5807bbe1d4b5911ddd68fb05a240892b34d50b571e68981cf45
SHA512b0395a89821b4fb6864af7218fa5819971c8abf5c899d04a20ac65f89fa49cfae2344a91eeb87dba26b8294910d30033812a123e72771b58a1a70a2a7e29bce1
-
C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt
Filesize1KB
MD52cfe7a68df27c4d2aa103198ca976dff
SHA16cd41b4b5d4a41eb1e078066fbafaa8f63d66a3d
SHA2567a57786a3b12c566ee8c027b9259e23eb1d8b31a2e3368de770e2956e91bd187
SHA512d6cf77d7a0b3c63a4bff196dc0790ca731e6f3bc45584ff5e01ecb4b214c7e64d2ac2e79485a6b6bc1eaed4aea87926129a958d97893062bd71afc1c1b563c2e
-
C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt
Filesize1KB
MD52bf9d8c23d4ca2c4cc426172fdeb51cd
SHA12a3b5e2a1d03c58134409c79fc13d284074707dc
SHA256e984b673cfac99a9e25a1d9221ee128f2739369b35db9ae5ce3f6a10be48a946
SHA5127e41aa100c7f4b4a70aabe43d939a38e7c157599544bc769881844c722fa5e0ef47b7df810ef7b2671f40c69b1fa806a7cf20a934dc701266ef61786cbae43ad
-
C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt
Filesize2KB
MD547df7580061f96c251acbfec8f4e7bf7
SHA16a2fa20a6683f26410f50184556bc0c1c4312890
SHA2562039ce0e76d2a8aa379e4b61f97fd277fe18d0bb5f2379a74d2065b3b5a8839d
SHA5124270baca6ee110a1e517751a58ba25ef1bdda4166dffcb6ee274470942309c4a08f4befa6a742df9a5b076837e40f9c8987fa6b6c899f195ce6ad2cb388d3751
-
C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt
Filesize2KB
MD51635a235bf8b22c2e0c47a45ba13fd69
SHA1384e77fa1e2672ffeab6a9a0cdf75be273434ca3
SHA256938c67621c50f1e363c0a24368c96aa03abe26b01733425f2d9d76a85e558b93
SHA51239daaa2b49546f343d2becdd7dde3aebc35c201a1a35d8a71d1dc7e1b47343940da800b888e1ccff3566d43f7ab7d3762dd152adbc6d9894125f9e700de6499a
-
C:\Users\Admin\AppData\Local\556494ffe4490614c2a79f51f90487a1\Admin@EPFPAFGQ_en-US\System\Process.txt
Filesize3KB
MD59500813727e70387d26ea7d264f43b23
SHA101f7902a9a3849885844681b6ca34f0bb2e3f40a
SHA25618a70567b1d09e97cc22093afc6847e129838d83b209b2ba1c43c814b22b2e08
SHA512dad92849f1a4d968112b9592792e247d0963f0f03cbeec41bdbad178da242d26f412718598ea371bb63c7de98892799118e31193a66d4ba416131078e36e028b
-
Filesize
4B
MD56ae07dcb33ec3b7c814df797cbda0f87
SHA16d400b9aec194fd0ea123061c6710c794a9bd517
SHA2563b7dc65fd47fd991000d80844da28c8699590a1cb30988782bcade39f67794c1
SHA51211fc9b39c8db974cba7cba31267530482824694774dd0b410454e04b0f0bb8b898fe6cb29fbb7344c7c3aa0188b7fd0fede95c7107fb92ab30018bb8d58c6df6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD510ca21a7a1176dc97f4992afe32437f7
SHA1092e99163038a1085a609737590a30af5bb54a5f
SHA256bc1206f520052294d53bbbd91781b9818e79e82c70b2a715b5f3919f70958399
SHA512687f018de7bce6a41f2f10d816c6d1dc1dcd2f84bbb78eab572bb1b01023f2a6c6b979271f7d48c84d6e7caff9e3c5948e849ad312059c3e62f3a00494005bc8
-
Filesize
280B
MD560d40d2b37759323c10800b75df359b8
SHA1f5890e7d8fc1976fe036fea293832d2e9968c05c
SHA256c3a2f26d5aef8b5ed1d23b59ed6fce952b48194bed69e108a48f78aec72126e0
SHA5120c339563594cc9f930a64903281589886308d4412ee267e976520a58d86b2c339d7b2320e1b3fd6fbf81f092ff1735f0710c669af2986ea5b63d2c1e0a6df902
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\548e3de4-5f7a-478f-be3d-50e211f1a149\index-dir\the-real-index
Filesize1KB
MD50df59f0f74961f2ceabefdbad4b5d45b
SHA170c27ff01327b6d0f320373f6e8fc8f0d0ed9395
SHA25683b83fb1ba0049c9e7abebef8c09e48597af76b4a2a23427a49bbc98e5e196d8
SHA5124385aed2ae06187502271874d8d0d53f314268e4364da2f02035be72d5e20932980ff29beda7d7b10c0656b998b5c1be3753cad0799451d4bab7eaf3b12976ba
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\548e3de4-5f7a-478f-be3d-50e211f1a149\index-dir\the-real-index~RFe577196.TMP
Filesize1KB
MD5f663259ff39f29a9e4318b2c856c5273
SHA1ed48e6e4c6fc6c5de22deec72cd8d966ffb56203
SHA2564c58856afc5364fdf405d3a419a02bb02150b3ce038fe66569165c4fce626e5b
SHA512ff8e53f8a69c3375442b520b4a2d68f5876cdb10fe83724817f67e2a9787e6703909123481cd7f38f19ca2e2a3186bffed2e2d7dde9f3a4724832e05320e116a
-
Filesize
40KB
MD5bcd397ed93a428311500397616b95ed7
SHA1d65e7f25b57d1b4e2b15fb492032edf9ceea448a
SHA256a6e96ec73352c0af6d8ea6f63603c6edb9a328758e97c9eb8175ef5aa14e8084
SHA5122d69011f42c4b30ecc1fc2dbd09b1eabe904441bba58ffa46ea3e672da80feac477fdff1bad20f3521194ea98c3af13c5d471850e0bb9950aa88bc67b6a0b087
-
Filesize
152B
MD564c4233ebfed6e44b9dcaea74adf6e86
SHA154f0727a8ea1a823e94e3ef046ee833eeaa919a8
SHA256307530ac412897904df279f7d4b97a6d4efcb3546be4a83033e4a4ef1e5188e7
SHA512959b400d32a3fb35f6ca7e89f9563ed4590f0a7df87cd53619d8f341e63f6c132ed90441acf52d2dfa39939cf745bc203226152baec3769ffa0fccb8013ef1c3