Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2025, 00:16
Behavioral task
behavioral1
Sample
build22.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
build22.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
build22.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
build22.exe
Resource
win11-20250314-en
General
-
Target
build22.exe
-
Size
7.0MB
-
MD5
0176388641637593938f5278b326a494
-
SHA1
39d6cf486e4f292605f8cf0f6a19097e59462d6f
-
SHA256
3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158
-
SHA512
b00cd6c016b4844b8ac7b434f2bd7d621879eed815210e9a846741efd49121348755ef4d6ef9609965abbf1a154c0017c56b9fee79854bd031e3eaddfc4e4ca7
-
SSDEEP
196608:XMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:AA403qakSoR7tfI7ZtXADu8X9Y95GQLJ
Malware Config
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4632 msedge.exe 1204 msedge.exe 3320 chrome.exe 2052 chrome.exe 392 chrome.exe 916 msedge.exe 3036 chrome.exe 4980 chrome.exe 4876 msedge.exe 2596 msedge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation build22.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 43 icanhazip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2492 cmd.exe 1320 netsh.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier build22.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 build22.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3284 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 2240 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133869033869342564" chrome.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 3320 chrome.exe 3320 chrome.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe 1044 build22.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1044 build22.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeSecurityPrivilege 1336 msiexec.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeDebugPrivilege 2240 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3320 chrome.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1044 wrote to memory of 3320 1044 build22.exe 90 PID 1044 wrote to memory of 3320 1044 build22.exe 90 PID 3320 wrote to memory of 2056 3320 chrome.exe 91 PID 3320 wrote to memory of 2056 3320 chrome.exe 91 PID 1044 wrote to memory of 2492 1044 build22.exe 92 PID 1044 wrote to memory of 2492 1044 build22.exe 92 PID 2492 wrote to memory of 920 2492 cmd.exe 94 PID 2492 wrote to memory of 920 2492 cmd.exe 94 PID 2492 wrote to memory of 1320 2492 cmd.exe 95 PID 2492 wrote to memory of 1320 2492 cmd.exe 95 PID 2492 wrote to memory of 64 2492 cmd.exe 96 PID 2492 wrote to memory of 64 2492 cmd.exe 96 PID 3320 wrote to memory of 2636 3320 chrome.exe 98 PID 3320 wrote to memory of 2636 3320 chrome.exe 98 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 4720 3320 chrome.exe 99 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 PID 3320 wrote to memory of 5084 3320 chrome.exe 100 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\build22.exe"C:\Users\Admin\AppData\Local\Temp\build22.exe"1⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbea40dcf8,0x7ffbea40dd04,0x7ffbea40dd103⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2920,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2916 /prefetch:33⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2888,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2880 /prefetch:23⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2996,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2956 /prefetch:83⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3068,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3064 /prefetch:13⤵
- Uses browser remote debugging
PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3336,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3332 /prefetch:13⤵
- Uses browser remote debugging
PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4168,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4164 /prefetch:23⤵
- Uses browser remote debugging
PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4504,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4440 /prefetch:13⤵
- Uses browser remote debugging
PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5160,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5156 /prefetch:83⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5360,i,7961182525095065872,3147551916505948965,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5356 /prefetch:83⤵PID:2044
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:920
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1320
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:64
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵PID:3916
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:4196
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3432
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x2b0,0x7ffbe8a1f208,0x7ffbe8a1f214,0x7ffbe8a1f2203⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2164,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2156 /prefetch:23⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2220,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2216 /prefetch:33⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2392,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2388 /prefetch:83⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3476,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3472 /prefetch:13⤵
- Uses browser remote debugging
PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3488,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3456 /prefetch:13⤵
- Uses browser remote debugging
PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4500,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4496 /prefetch:13⤵
- Uses browser remote debugging
PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4516,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4544 /prefetch:23⤵
- Uses browser remote debugging
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=3620,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3648 /prefetch:83⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5132,i,14145811008808466150,17791530453398588568,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5124 /prefetch:83⤵PID:2644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\a37dee5d-8b26-49ac-a893-2cee5c3943e0.bat"2⤵PID:2420
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:4896
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 10443⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:3284
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4840
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3172
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4284
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\39608079-1bf7-4d32-bdf9-b3e1550e420a.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5f693e00e2c30d7bbfbcb6fb0c0ecf2d6
SHA1cd851f39f3b34c584156221a545e080e03b9a636
SHA2563b5be385976b5fa6a5db4282d4c800db9d8da9a2fcd1e2dbb862260def71f287
SHA512ad228d23811107d42f906beaae476fff98416284303fbb2eb44c291d6c3975a6e32d0124cff307f065f5bd77b25e94bda20cc7348c006c8073dd95f87b0013b2
-
Filesize
280B
MD58734b4a181214bb62f91cfa36c7e2c98
SHA19cff323f10778a23d73ac3dcffc038d3bf661b78
SHA256e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5
SHA512e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36
-
Filesize
280B
MD50db1d88802048ff847bfcf47035335bd
SHA1bb54059e5b145da464f6521ae67353889ce00771
SHA256416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a
SHA51232c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\564f2dcc-19ba-47c1-ab9b-337426fce503.tmp
Filesize69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
Filesize
6KB
MD5a391b32b7752918c765e6fe24cf60db3
SHA19c1a57e367db75a4e74d3a05bad8096cb2f00199
SHA25656131a6fba5bd423ad18748d6b92729cdd004d751d8e59bc86f61dc0b7ab882f
SHA512f423a97f173415a4e80f2d3068c7c2ace411a5b9ded9e44c1a6d00242a3e14d1fc2aaddaa5a1e095c5b0c29442adc2a6ec0b9b03b8041edcfda57f8fa337b2b8
-
Filesize
7KB
MD59f015074359b6541b4de5bbd233f5035
SHA1ba4d45764340b3bf141ce55a50f47ab2fbaea67e
SHA2568263f6612c65f5bae7503d447432481e90c738144a86ac066682ecf239757ccc
SHA512e3054753669af342a5038444a2d697fa7d13eff7e6f8c3f7ed024daf708b4697474c594fc4fa3d7a17650bc115256bf97f11c96774cd4f076f43be1ef07342d8
-
Filesize
152B
MD5f14d44e1cbc696482dbec08f2f4c2f89
SHA1b9f42dbbc3de9ed6523631e4d43e0d8735d77c6c
SHA256b31e04c6a2ed9e57e85e872ba15808d074d1ef140355cf23a7131098f4b22cbe
SHA512c30462aa5e1ef76bcc1f4a516d905db04a87960179d6e6f632f6f3c2cde975a8b1081b1faf337ad624012d04996f2446c2c83c49b2d041e2fd186ace6a3fc851
-
C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\Browsers\Firefox\Bookmarks.txt
Filesize173B
MD570e1643c50773124c0e1dbf69c8be193
SHA10e2e6fd8d0b49dddf9ea59013a425d586cb4730c
SHA2564fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a
SHA512664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679
-
C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\Browsers\Microsoft Edge\Cookies.txt
Filesize1KB
MD59f4f3b6085ef3aeb869bc1298330da0a
SHA10965c734d6ead16d3cd407711766c6b00932e399
SHA2566758281d56e338fb59284f77037795e56c871e64737da421859db28e242dc791
SHA512f2166533ddb3ac68dc4c487f897e01806a25c8dd645934e2dcb29f11499e2a7a0edd6aa7a94dd39d766863856ada85de6577f285bdc26842b7b877be8866c085
-
Filesize
846B
MD52d8a541571dcb2f16fc07676bff7aea7
SHA1c9a233068b97845dc4a52612a4cd6d284745f1ba
SHA256683a1cac2cdca1bed6d448d8681ff75c1ffd86290627313424530208a5835b11
SHA5123e91e2d7510e55b1013459993633489991d8ab90e0ec60da0e36aa1514980e6ffe1fba7465f28949ea0d77ddf843383b6853a28d4b581a3368eaa82862d7b548
-
Filesize
1KB
MD5cb499444f2a7386daf360a0544518432
SHA1ffd5bc9b9370f1c205b34984f7f85b6a1e643b20
SHA256d6977cc1738ee682a8c3f6530e75580643fffb36c8346fcab84d6c62c7a60475
SHA512903d0f3679a746e902f2f2a036446610a995bf3f3f0341922990a93392c1e11c575d017e95956746999cc2496f1a81c7070e4ba15aeba814012593dd738e8bbd
-
Filesize
4KB
MD5b64258be0f03d4f4668dcf0a91b754a8
SHA1713f36f478b1d93a5e7b15aa078a8d433e5fb9f1
SHA2568045434c6bfc172d84e036ab73e37c8ac392427a40252d12850b56b1351f5dad
SHA512ec180a1cc5e66821cc3c0ab0a157e83b1d23dc533fe93555c993fb347bdcd2962dce695409624d24009d50d663a400223845377953ff6585c0c245544ac1c8de
-
C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\System\Process.txt
Filesize3KB
MD57f7286ea671ee8b34bc48a1c959961de
SHA1cbf73c57b3056be35a9fd59e769ff565880d509f
SHA256f3b10921708d9c5afeb3ea0369ab453cd13f9f7608e443740a74abe88f0d1878
SHA512049a203260c3425741dafe800f3de1810f13eb733255645ff8a02c57120c54b0b13b06b34d9c401828ec9e61b502427890b454c0c4e74f742f6b01510cec2080
-
C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\System\Process.txt
Filesize4KB
MD57ae0700171f8b45e7c64fd54a5f1697f
SHA1f8ebe8650b9fedeaf17f0c4e0ef2aebcd21de1a1
SHA2567731da1c18a79b9dc64d8e62b09be5c19bbfa4663a92c9ce1f823e27c84c1c69
SHA512758a2f7390c60f84c2e0ad436adbcfa74e6f42d67ac356f42e62a7b1cb0e5d228480a5aaf4ef672676b98c66e19becb36b1fc871b06643c1ed08ffbf093676ae
-
C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\System\Process.txt
Filesize1KB
MD5da5698c72d3c326538a9594aed16d777
SHA1118b6e7c5e5131a3cedb51746e816302fdf1a586
SHA2564d52a6bb0878a076bb70d227cd613b5d6d1b3f8bd95193945f3551b468234273
SHA512a1f906e5c1235ebf6959acd6de6ed057a4f899875b0b28693cc8970c31f683b47b920a5cb4eb464433edd82aa6472a966e3ba41625933e0623ed2ae60456a129
-
C:\Users\Admin\AppData\Local\d7d8d559d9b2175ca18bf0386b032e93\Admin@QJHNVQMW_en-US\System\Process.txt
Filesize2KB
MD59e16c289f07b9c8e14836c2538b79d10
SHA111fbeb5a548b1f5e8646749c52ab9f3168fdf08f
SHA25609bb34c915287a09ce24705f3fe5be90f45432911b134798730f8f159c5ef2ef
SHA51243b8feda019289ac8661032f8632174e28f0e938647fa68ed1bd3e656f317864ac0469545bfb28c8ecb1c3b7054eb0ceea2c8fddc0d2f0db4b9e1878a15d4117
-
Filesize
4B
MD58abfe8ac9ec214d68541fcb888c0b4c3
SHA15b1329f11769d8f4915936ad063125dcc2bfad71
SHA2564978f72a379aaa535c5bc1dbbadeb26807e3e821ed16889b498f8eb7274ce1a4
SHA512098b2ef78e07619275606a7bb999fcd92151980c017a95b2a8158f2a6b0e8c8e0eb8da81cbbe4ca1a20eaff89920c3bad039b1f7702ea768e2532ce171970bb5