Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2025, 02:33
Behavioral task
behavioral1
Sample
3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe
Resource
win10v2004-20250314-en
General
-
Target
3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe
-
Size
7.0MB
-
MD5
0176388641637593938f5278b326a494
-
SHA1
39d6cf486e4f292605f8cf0f6a19097e59462d6f
-
SHA256
3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158
-
SHA512
b00cd6c016b4844b8ac7b434f2bd7d621879eed815210e9a846741efd49121348755ef4d6ef9609965abbf1a154c0017c56b9fee79854bd031e3eaddfc4e4ca7
-
SSDEEP
196608:XMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:AA403qakSoR7tfI7ZtXADu8X9Y95GQLJ
Malware Config
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5960 msedge.exe 4836 msedge.exe 1228 msedge.exe 5668 chrome.exe 5140 chrome.exe 1460 chrome.exe 2568 chrome.exe 2736 chrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe Key opened \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe Key opened \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 icanhazip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4564 cmd.exe 1440 netsh.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 868 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 5512 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133868252035648335" chrome.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 5668 chrome.exe 5668 chrome.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5668 chrome.exe 5668 chrome.exe 5668 chrome.exe 5668 chrome.exe 5960 msedge.exe 5960 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe Token: SeShutdownPrivilege 5668 chrome.exe Token: SeCreatePagefilePrivilege 5668 chrome.exe Token: SeSecurityPrivilege 100 msiexec.exe Token: SeShutdownPrivilege 5668 chrome.exe Token: SeCreatePagefilePrivilege 5668 chrome.exe Token: SeShutdownPrivilege 5668 chrome.exe Token: SeCreatePagefilePrivilege 5668 chrome.exe Token: SeShutdownPrivilege 5668 chrome.exe Token: SeCreatePagefilePrivilege 5668 chrome.exe Token: SeDebugPrivilege 5512 taskkill.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5668 chrome.exe 5960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3944 wrote to memory of 5668 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 91 PID 3944 wrote to memory of 5668 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 91 PID 5668 wrote to memory of 5288 5668 chrome.exe 92 PID 5668 wrote to memory of 5288 5668 chrome.exe 92 PID 3944 wrote to memory of 4564 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 93 PID 3944 wrote to memory of 4564 3944 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe 93 PID 4564 wrote to memory of 2492 4564 cmd.exe 95 PID 4564 wrote to memory of 2492 4564 cmd.exe 95 PID 4564 wrote to memory of 1440 4564 cmd.exe 96 PID 4564 wrote to memory of 1440 4564 cmd.exe 96 PID 5668 wrote to memory of 1288 5668 chrome.exe 98 PID 5668 wrote to memory of 1288 5668 chrome.exe 98 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 5668 wrote to memory of 6000 5668 chrome.exe 99 PID 4564 wrote to memory of 4524 4564 cmd.exe 100 PID 4564 wrote to memory of 4524 4564 cmd.exe 100 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 PID 5668 wrote to memory of 6072 5668 chrome.exe 101 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe"C:\Users\Admin\AppData\Local\Temp\3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158.exe"1⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5668 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc8e44dcf8,0x7ffc8e44dd04,0x7ffc8e44dd103⤵PID:5288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2016,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=1944 /prefetch:33⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1808,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=1796 /prefetch:23⤵PID:6000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2280,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2276 /prefetch:83⤵PID:6072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2936,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2932 /prefetch:13⤵
- Uses browser remote debugging
PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2960,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2956 /prefetch:13⤵
- Uses browser remote debugging
PID:5140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4108,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4104 /prefetch:23⤵
- Uses browser remote debugging
PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4392,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4396 /prefetch:13⤵
- Uses browser remote debugging
PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5144,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5140 /prefetch:83⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5384,i,12622075688426337538,14212697031735794830,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5380 /prefetch:83⤵PID:4536
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2492
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1440
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:4524
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵PID:536
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:5592
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2928
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x25c,0x7ffc8dd4f208,0x7ffc8dd4f214,0x7ffc8dd4f2203⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2212,i,14816422194352660105,3275009408119394763,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2208 /prefetch:33⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2176,i,14816422194352660105,3275009408119394763,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2156 /prefetch:23⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2592,i,14816422194352660105,3275009408119394763,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2588 /prefetch:83⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3444,i,14816422194352660105,3275009408119394763,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3436 /prefetch:13⤵
- Uses browser remote debugging
PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3460,i,14816422194352660105,3275009408119394763,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3448 /prefetch:13⤵
- Uses browser remote debugging
PID:4836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\c1d8d12c-7f28-4a07-8236-dc64dda61b99.bat"2⤵PID:1536
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:452
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 39443⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5512
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:868
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1164
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2940
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5fdf842e9aa964aef18ea74dce351bf17
SHA174d5cbcbf09bb61041dc06bf6c4ec24986bb596e
SHA256ab22788eb0daa510b51658b7a14be6a847b2fc3648bea87de18f106bb1985aaf
SHA5124f9f997526518ad8e1bb8f736617fa5c808896d6cc4dc41f0307b089d42170e598905998b6037342d29ec02e5ec6466af0efd4900fb3c1161214c56c12182e03
-
Filesize
280B
MD5c37f9d2c357647fca20f2eaa89c18edd
SHA1cfd1035ed2d057c317b48546f467209cbbe15f2e
SHA2562ea3a0b7e6145fd110653b1a77cb827ad7e4a145c29378344bd3d28f595b2072
SHA5123563f4aca9e47f35de8cb38e42a3c0448bb3ec4c9183fa392abc28fee4ca08bf16da028ffbf31cf0c0f8301ed810238961e745590e5c71621bc5a2a889dd12f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4b544b14-1843-4673-a1cd-26e23142833b\index-dir\the-real-index
Filesize1KB
MD57a9c348ac048a620e4ca0aec2a33f485
SHA1fcb271239ef5f392cfc414df5dae630a12ae9c2b
SHA256887bce29c94baa1883c6c0ec33b324b3809b1a7eef68cfca6c7460c1c088ebd0
SHA512f6ec7e3bdfff14a2ab47740ba962c1eda18775e0f4081c54bd6b2aff007a840b3e496946e1aae56b3158ae2de270f4fdc003b296d7f2049c34332dab74a674c8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4b544b14-1843-4673-a1cd-26e23142833b\index-dir\the-real-index~RFe57bdc2.TMP
Filesize1KB
MD55e13f2a74897bfe462b55c2bcadcd1ed
SHA10a4983ce85080e0beb96d66d7c7b518aec791847
SHA256c46d822959fd672b6466f30b6bef31c8474a7c8cfb14b91b137f5c725c8cd9e8
SHA512802043b7fc8a0acc7b46187938070c87cc5d750c493ce8163bda62decc70eb7a4c68037c93121fa2f41a29a05600dd8586492b94a8ed1f53ebf56442fef1afb6
-
Filesize
40KB
MD542cacfa5eeace7082db4096227748f12
SHA1268ce692e05e31381bf40bbe23333d35f3110338
SHA2563822ed89ae578f5cdf1070d9f943065b9f4e33d7bef0abdbce63bd2571d314b7
SHA5120d050b6fe32e0b19d25b458c6223ad3f497f051c163b489430720e504c548a9177d32391f216aefd9c605ccbc8237b32006de2114537138dd7b32fa1e36a741b
-
Filesize
152B
MD587c5cd74ed15e037858a832576799f60
SHA1d8d482a9d1da45a9bf1caaf564176d3febd4dbdf
SHA256acccfd5277e3f58a670175e8a5f79f3c141ed9065940c346d066e0711dbe9a5a
SHA51266b4bead3e721b15862e162c41593e7a6f1cd1cc185c3a72c89cd1915fa3ad0c594232bdff17f08fc12f39e2f5f42d54eb7894aece1b3539dc4338abe6855398
-
C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\Browsers\Firefox\Bookmarks.txt
Filesize173B
MD570e1643c50773124c0e1dbf69c8be193
SHA10e2e6fd8d0b49dddf9ea59013a425d586cb4730c
SHA2564fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a
SHA512664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679
-
C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\Browsers\Microsoft Edge\Cookies.txt
Filesize1KB
MD58992b7cac2426aed96f34d9d5125ff10
SHA1c5c50c302e0515789b96bda08cb4ce2e316de8ef
SHA25643f8d2715f7ac556841bcf16bcef414e2e2b8501b284c956ce8b76fe114fd9e2
SHA51254c2327031f1f817b9eaa1b99030d11a7e7a674a5706319a5788e9051d562316bac46727c5c017b81b7b656944eaef995e5f2a4ab7c6861af0131b26e958b556
-
Filesize
6KB
MD5a326e1a219c861d13c44bf505f69abd5
SHA1dcdf586a0f8d3259bb0f7fe4b2d5b2440e325bbb
SHA256ed8d869d56019ef4674af179a339ceb5a8deb7e0e66adb0918bdcd6729d957da
SHA512fba4e715f05fc00ddbb2123c4f0010fd29e83647eec0cb2309730344c9d433ae6d192894e960320f8d1abe64c949d5eb3101d3c2b8dc6d4ba81a5b49fa6552e3
-
C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\System\Process.txt
Filesize3KB
MD5594b262b926d793798fa692b39e561ff
SHA1b033f964d3e2f4203285fab116fdd1b17a437eb1
SHA25602f7847d5ba7fa7287e814e4e65e0c95a68acd142bf4d5520ef9112a268cd741
SHA512c441e7738f47aaba06e2e372ba1b67db4b77be136a56ec61f3d3764bb52c76f39e7850cdc73299fc92c3506c894bdf3ed4d7305a6f28e25f995712973084b752
-
C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\System\Process.txt
Filesize4KB
MD5b74b8138cd82bea07128549febd29fc3
SHA1f490748aee387a103505bf010e51b6b11da4e3f4
SHA2566b50339ff63748155f0ec01bd9a2614bfeb1580a38247dff4127888b6c87a7d7
SHA51267794c7128e070663df56e7e50e3c818ef0a9862ff4934f9a6cf349a28cb93e741d73efc3edffebabb992c610663963596493d124bf131a38b3e4ee8529b424e
-
C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\System\Process.txt
Filesize404B
MD50abdf062a08d0fdef746e11a294f6796
SHA16625e10f254db540f5963be4fc8db8f11cc9d1a0
SHA2563d8f7a2987a91983e11c49ddfddb9151f8b34ab138e9ac48bf6d306bbdc02624
SHA51280ed2da6dd81fcaef5fab5e621b846876335ed224993b411c73f1c05ba8329e13ab4ccf25d4d660cf05ebb867a40c40c3307d72786a0bee72d268bc683b3231f
-
C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\System\Process.txt
Filesize986B
MD5a4899c269973b966545f1eed8e742263
SHA1bfd80ac178a10212c3b836b35507d910c98b66f9
SHA256476870a3914e1f70e7eec2e779e523e63d81f4a4c60311c8bd97bd37f6e1c922
SHA5120277dc746331f3e9a777fcbc9399b01178cde9e646cf5fbfb6ab20d4b85717560ca5134b1857ce128166eddd3339c96268a29d95d44155614e22db20d0a61e0e
-
C:\Users\Admin\AppData\Local\a205a6f7ab0e061fec2d089d3b0140fd\Admin@BLPWGAPS_en-US\System\Process.txt
Filesize2KB
MD5b91f3c0dc9de5873bebb9e95b2c515ee
SHA16ee604b099d6564a2acf2ce5385ea4f590f035c4
SHA256da34cec73013ac166abc7fc93543c1ff2035f2a95cbcac4548ab329f1fc482bf
SHA512079f2df7883c8823ba5d4d669f4b4b5860df22d6d897b073e427e5696d4db4c13398d6520f5078e97048a51748ce6e44a17b60cedd13e03ffbab49385c5aeb74
-
Filesize
4B
MD5b59307fdacf7b2db12ec4bd5ca1caba8
SHA179e3f0cbcea375142c38c2f8de09344cb9f8eef4
SHA256b39885a157fd0cbf181d1c17bcc1517638727e04513097d6ddc4c1d51ea5f4b1
SHA5125ad258728081dd7d142275374fd6b4644dda088abc0f15b5d08fc33c18bbd16f18683ae15b257c9ba2d55c3cfd2b3d7187b175ea2f6d9fac0ca79ae1acf7cf11