Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
27s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
20/03/2025, 00:16
Behavioral task
behavioral1
Sample
build22.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
build22.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
build22.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
build22.exe
Resource
win11-20250314-en
General
-
Target
build22.exe
-
Size
7.0MB
-
MD5
0176388641637593938f5278b326a494
-
SHA1
39d6cf486e4f292605f8cf0f6a19097e59462d6f
-
SHA256
3c62a4a3091cd0f0a91da1e92bf88c96e0da5f81dd0b434ffb5fb55948928158
-
SHA512
b00cd6c016b4844b8ac7b434f2bd7d621879eed815210e9a846741efd49121348755ef4d6ef9609965abbf1a154c0017c56b9fee79854bd031e3eaddfc4e4ca7
-
SSDEEP
196608:XMbuV25DeTD+oqzukSIlLtIY79n8SI75bWAXAkuujCPX9YG9he5GnQCAJKNc:AA403qakSoR7tfI7ZtXADu8X9Y95GQLJ
Malware Config
Extracted
stealerium
https://api.telegram.org/bot1616004787:AAH60oNqVa82nffKp0gB2yn5A_jmiTy0_XY/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2336 chrome.exe 788 msedge.exe 4152 msedge.exe 2720 msedge.exe 4224 msedge.exe 3332 msedge.exe 2644 chrome.exe 652 chrome.exe 1940 chrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3174447216-2582055397-1659630574-1000\Control Panel\International\Geo\Nation build22.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3174447216-2582055397-1659630574-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe Key opened \REGISTRY\USER\S-1-5-21-3174447216-2582055397-1659630574-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe Key opened \REGISTRY\USER\S-1-5-21-3174447216-2582055397-1659630574-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 icanhazip.com -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 896 cmd.exe 3984 netsh.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier build22.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 build22.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1704 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 3056 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133869033880399258" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 2644 chrome.exe 2644 chrome.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe 4392 build22.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2644 chrome.exe 2644 chrome.exe 2644 chrome.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4392 build22.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeSecurityPrivilege 2968 msiexec.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeShutdownPrivilege 2644 chrome.exe Token: SeCreatePagefilePrivilege 2644 chrome.exe Token: SeDebugPrivilege 3056 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2644 chrome.exe 4224 msedge.exe 4224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 2644 4392 build22.exe 81 PID 4392 wrote to memory of 2644 4392 build22.exe 81 PID 2644 wrote to memory of 564 2644 chrome.exe 82 PID 2644 wrote to memory of 564 2644 chrome.exe 82 PID 4392 wrote to memory of 896 4392 build22.exe 83 PID 4392 wrote to memory of 896 4392 build22.exe 83 PID 896 wrote to memory of 3876 896 cmd.exe 85 PID 896 wrote to memory of 3876 896 cmd.exe 85 PID 896 wrote to memory of 3984 896 cmd.exe 86 PID 896 wrote to memory of 3984 896 cmd.exe 86 PID 896 wrote to memory of 3004 896 cmd.exe 87 PID 896 wrote to memory of 3004 896 cmd.exe 87 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 4832 2644 chrome.exe 88 PID 2644 wrote to memory of 1696 2644 chrome.exe 89 PID 2644 wrote to memory of 1696 2644 chrome.exe 89 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 PID 2644 wrote to memory of 4272 2644 chrome.exe 90 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3174447216-2582055397-1659630574-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3174447216-2582055397-1659630574-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build22.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\build22.exe"C:\Users\Admin\AppData\Local\Temp\build22.exe"1⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff8771edcf8,0x7ff8771edd04,0x7ff8771edd103⤵PID:564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1992,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=1984 /prefetch:23⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2144,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2140 /prefetch:33⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2440,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2436 /prefetch:83⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3136 /prefetch:13⤵
- Uses browser remote debugging
PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3160 /prefetch:13⤵
- Uses browser remote debugging
PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4288,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4376 /prefetch:13⤵
- Uses browser remote debugging
PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5108,i,17388871595481926658,12806487847890770228,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5096 /prefetch:83⤵PID:3576
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3876
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3984
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:3004
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵PID:1904
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:1884
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4184
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging2⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x260,0x264,0x268,0x25c,0x308,0x7ff87695f208,0x7ff87695f214,0x7ff87695f2203⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2520,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2512 /prefetch:33⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2460,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2452 /prefetch:23⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2532,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2524 /prefetch:83⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3452,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3444 /prefetch:13⤵
- Uses browser remote debugging
PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3468,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3456 /prefetch:13⤵
- Uses browser remote debugging
PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4072,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4068 /prefetch:13⤵
- Uses browser remote debugging
PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4088,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4076 /prefetch:23⤵
- Uses browser remote debugging
PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5072,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3604 /prefetch:83⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5256,i,12465868640205611982,15585589392323366243,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5252 /prefetch:83⤵PID:5084
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\67e8af48-495a-45bb-b6af-fadbbab14eb3.bat"2⤵PID:852
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:2888
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 43923⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:1704
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2824
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2444
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1904
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\Browsers\Firefox\Bookmarks.txt
Filesize173B
MD570e1643c50773124c0e1dbf69c8be193
SHA10e2e6fd8d0b49dddf9ea59013a425d586cb4730c
SHA2564fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a
SHA512664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679
-
C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\Browsers\Microsoft Edge\Cookies.txt
Filesize1KB
MD502d949e63660e175153314e26124db9f
SHA14cc221212641b3dd0b51c9badd1bc05bb6124b7f
SHA2564509fec21e46c6a9d88281d27c3422771b7ca6b94d54dbb6f0bc5d00085f76c5
SHA512e96c9e089c7b8609fe79bea3daddfa14928cc88dc688e346333940b3afa884ee3dcc6ef18d9feb6067858186beae72aa237233aa46b2af101bab04bcb126e161
-
Filesize
987B
MD55910dd35339b766631033522caea88b5
SHA1c87534522075568495ec691f823922d2a540e194
SHA256d456ef7a1b3fc616b649e6352d46cf60ccf78049130c63ebac52c78472d5bcff
SHA512dbf890cb1561df34c12171f3d21f9b6430c2a5666085c932f59b36b802f1d50e4072e3feeb082c0aa9a4c1b5f2a08e1237e21e5ef9f6f9def6e08825ffd90bb5
-
Filesize
6KB
MD5e4ded193433bfaed46da466eefcc2c35
SHA156151b0cb50efcac84e88cb623af4fc10f82087d
SHA256b5190a32744b506ceec36dcdade88886a20d999ff72c93f960665cb90defe05c
SHA5122948192405d25b8b18258d8f30183d082ae5bd53cc2c17743b6cd48b499f98e0820df59ac99c03dfe719202f95d39e761b3881e79dcb1b07504971e0c6a9bcfb
-
C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt
Filesize4KB
MD55c305a5b5ebf819c3a267c0a8aadb848
SHA17a39fbda595cbfaee929095e9e9c5aa4da92a4de
SHA256a60f124980e8409e7a8eeddd5e3e09cf384f1e9e468036e2742b850b53713352
SHA512b35d8ad7926bfe76f2f46ba5a2019b8f1fcb896eb96bcf96bcb02e599ae9f3901d4598192372e721e3b938dd81d6aa73ec6fdfbd558a08cf178d7e14a95ccec6
-
C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt
Filesize573B
MD5d5ef92b0ddf0ef311c45f7e90f77560a
SHA1796eedd4871c62477de907d7cb6835fb51cde722
SHA2564a4a666a553efbebe7ac2c82dc1d847baca15a0dbd1635b68ea0cb78cf9f44f7
SHA51260b060ae780d6dea3c760322f2327cd1384a42d6b37791fe0522c21d1898a9a64b6d6b67b009764c40eedaaf0adb4d78f23d244fe13cd1391e2a4e6fa147e83f
-
C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt
Filesize1KB
MD5d22b8c735b7a771000a3dcc8ff03561b
SHA1d99eb8b03a9ff9a674a530447e91ee3af97811e7
SHA256eecb838a62aebf597b7ccd8c0dd8660bf016114d0f267e6da49968d955774d7b
SHA5120b11b5cec2bcab98a8f73024e931d63da82a85fa0b3ae34a0bcb95dd417230b73dfb0fb267ea95fd97b41a6db26c6cec0b7bda33bbd5f2010d58066d96bf98c3
-
C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt
Filesize2KB
MD513f511d662ced77a25ba804866afc15b
SHA15036e9d0c6eda56cd89ec205c659a2a7e04242d2
SHA2563c8bb5bab50dbefde7234cb5150898f6ff29cc0a3024e8b3eb3c73fd923bb8b8
SHA512be88ed3b3245b6dcfbab5aaf7e13c74a94a55745a91377cf2972ba7af9e961c8c02caa80809ac226b8e539d0786d0e88ed096b9e622ce4888473b2bad9595b96
-
C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt
Filesize2KB
MD5bf12552d215aba8cc8a041bd67bd1c0b
SHA19cf6c798f9316e2c454b69031eedb9839243b8da
SHA2563ac67ff7bf60c1cb0e4e3e4bb51bdd231d7af9ef04a21622662f28e470d462ce
SHA512a8e86d64b461ac443b92d6c9313172f62c40a54ffe896a0687cde1c496eaa6312c1be53606c381e661dda41747a13aab06f4aa42ecc92a3e5daf48cbe69d8837
-
C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt
Filesize3KB
MD5bf4444b53a5114e67f46b2bbd7b62eb6
SHA10f805cc80c674568c4e31ea3d115e69eb65f5254
SHA256d90547e9e43a1d3b6e454e0b225971b034b81804387632749b7a6dc4343c8d98
SHA512ef5849a927a1fb8a4bc0f3ac443d12322ede9dfe245eb772d3cfa8cd430fe24c5769898dd0a4c43a9967e215d2e11e63c5a9464ebf0a9578931c0f7791b51cce
-
C:\Users\Admin\AppData\Local\7d14b13b146bd92967f257c2552f5c25\Admin@FAJJWSRF_en-US\System\Process.txt
Filesize3KB
MD53a862a349799bdd80c7bc623e9d2eabf
SHA1100ecfbb89474d0ce1ef1df09fb915a83c36561c
SHA256c8e0cbfdfa8393656900428bed104b45e71d5c446bb80a2a3e0da11a1c5e8449
SHA5122c86ffc472bb1ae93a7aa67934a0825d9241169797809cb7abf12ba9a58d72c7ab60c03d99ec85ee3b3c00ca9686b507ebf2cd7f688bbc4da1dfc599915b235b
-
Filesize
4B
MD5882735cbdfd9f810814d17892ae50023
SHA1bb3e29ac93b725f6eefbfcf1bf0bee67783cd519
SHA2560670783b46c5906cf84d0501e8a44dc5a1e446dad06a4b2f443d54242cb78054
SHA512adb55476e0a049af61e2382c6dfcc512af68439dc4a7e92ccc4b54d36d3f1682b391e27f426c3749fd1add9fd92ee383545a6f6431ce19dbac14ff9f9dd023b6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5dd54d39df5db4f91911498a905a4eb36
SHA1015c5702767bca6876042c34a09f294bf9e9ae5c
SHA25605f7815ca0c9176c117af1d29ba5e25b17d1fc787efb3ddeeed8931611df53c8
SHA512ef41d7f18e955b40434c59acbb3022c3a864d903564e66c3debe8ca116d70809c19140a6d59956ccb2413b3d5505aeadfdeb6828c7292526fdf985ef28fe58df
-
Filesize
280B
MD5632acbd01044af3d96e0f44fb0f15691
SHA15ebb0fb12ab66a70cba8a11e2115a296126ff4e3
SHA25640305632b5754f1dbe0b05dbc249cee00a2774abd2160d7c7a1612e5967039c9
SHA5120876c300d769ee764886a2b1b542c7421129b1c796a18d220ff9cd7681ab0001f98b1420a685c9cae49a34f5b58586c6313ed27776b703763e978864f4b8eae5
-
Filesize
280B
MD55df6a0445942b5f7817d6658ccb534a6
SHA144ce1e163d04d8513faed7f85384783167add22e
SHA25651e05249c6a2f4b0dfbdf04fc331b18deca176024c134e901e9319e1b54c6bba
SHA512ec867d77c784e30e6cc163b3178d79af0383d2d50cd6f396fa52133a8227aa517d8e64d16b1083d58dd5810b8e47bd5b6356bd21a1b653b853c5624b5f18519b
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4ad0fc24-14c3-4a53-bdc8-24ae321a49ae\index-dir\the-real-index
Filesize1KB
MD5ea65991c5ddeac9e7aeea8982fec4508
SHA1d4453e21e9e6f1f3f6384e54bc186d955a18fede
SHA256d0a9fd43999bc3c972dceb78a7daafd43d9e7c4c22028a05088e3d8f5e08eccc
SHA512e36567166daed028eaf49f8874afc2aa82aeee7d8d82c5e73603998f1ecc8b600519b2a32c3087f9c8705a7dec5300342f93a13123a58acb14ff3adf2e9ada87
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4ad0fc24-14c3-4a53-bdc8-24ae321a49ae\index-dir\the-real-index~RFe57b5c3.TMP
Filesize1KB
MD5647e4b1c571ab0736ad8345575730d67
SHA16037b70159ceb9de49cd5ba11454bccf678342aa
SHA256813c1eec147b3c3a64fb6f8e8d8cf4b9c6678fefb729ef6dc490fd5ccd479a25
SHA5121f9d0e1b153a593d2ed94de27a453e6947e52d49904dcf003901d5cb92ba3827429964a527bfbebf43aee21727ef82a0a195560c4e8ae998bd81320dee7e5274
-
Filesize
6KB
MD52281700256fd7d2cd8b5a3b83f574035
SHA1e84e6da2b538eee930142abafc3a70657ff82cb9
SHA256fecef52b42f657323dcb0ca552024ab7cd5f203f89676c7c87a7da97d1144c21
SHA512d42dc62e24af15b1a3b84eb5098440bb7f64a2a1eadfadf508b111eb275a6f3a001de3d0d9670ab9618c5233b828988ae6db7ab7c5d5ed5c4c35ab93a8f95744
-
Filesize
7KB
MD50db262d50edad023a84f8827bea797c4
SHA1d1b5a154860ba963f88fa0864a4244ff4a29b7ef
SHA256adac4813a8008c551cb493f495572cc87f7a8dd4169399042827a48ce418c800
SHA51263e4a08cc2af4058d9d52d1563d5afced93fac6d96b6d3e7cc33c4bd61b5004a5bf530f2114308871f96f66b6034ae989d1f8e3eb90e53c15dbce9088dcd434e
-
Filesize
152B
MD5d620b0fbd6ab4049dee1c2fb3abc1cf4
SHA145104aafce5017f86ebaaf5f44bbc5190ca3d99b
SHA256e90425bdccea58891bbfd4aa3450d34c7569174e0b7756ac922d68db23a62d1c
SHA5129e3bc2ae7f85f10959f216f6d8d6ec3fc81e73841c0f30609123a8d7cd59164055097ca496c16fff76c98a9b5a34a305e6f45b058fcfe50921b298729578cd28