Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2025, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
JUSTIFICANTE PAGO.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JUSTIFICANTE PAGO.exe
Resource
win10v2004-20250314-en
General
-
Target
JUSTIFICANTE PAGO.exe
-
Size
78KB
-
MD5
54ddfa5b86eb29bb7741f52c84572d0d
-
SHA1
e1ffbd76d7cea33c9b7a3356ce7e016e30cc197e
-
SHA256
edbf5b0f2d51a788719d2c38ea765fc9cd52c6d9887ff30d2e98898bda24d2f3
-
SHA512
7b6993a6c0d88d24fcba6fa44196c959dbbb7d3858a040b35570abb5f04b6bd59fe5371315482e3b004783e18c30396fce19ff00d14a566dde4f3a3336f61fb8
-
SSDEEP
1536:nV4paZS6dDU47eJa+M8xSXwSO/z4BWGpxNqN6Q2qg/:nV4AA6dDUxm8cer0WCrQlg/
Malware Config
Extracted
stealerium
https://api.telegram.org/bot7756107542:AAEhuCgRX-ckFVwps3xqgrtyb3JVRKo9Tog/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4944 created 3512 4944 JUSTIFICANTE PAGO.exe 56 -
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4500 msedge.exe 5012 chrome.exe 1140 chrome.exe 3604 chrome.exe 1928 msedge.exe 3764 msedge.exe 2396 msedge.exe 2272 msedge.exe 3884 chrome.exe 4716 chrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation JUSTIFICANTE PAGO.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 JUSTIFICANTE PAGO.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 JUSTIFICANTE PAGO.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 JUSTIFICANTE PAGO.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 64 icanhazip.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4944 set thread context of 764 4944 JUSTIFICANTE PAGO.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4664 cmd.exe 4480 netsh.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 JUSTIFICANTE PAGO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier JUSTIFICANTE PAGO.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3040 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 880 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133869230265344594" chrome.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 4944 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 3884 chrome.exe 3884 chrome.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe 764 JUSTIFICANTE PAGO.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 3884 chrome.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 4944 JUSTIFICANTE PAGO.exe Token: SeDebugPrivilege 4944 JUSTIFICANTE PAGO.exe Token: SeDebugPrivilege 764 JUSTIFICANTE PAGO.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeSecurityPrivilege 2252 msiexec.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeShutdownPrivilege 3884 chrome.exe Token: SeCreatePagefilePrivilege 3884 chrome.exe Token: SeDebugPrivilege 880 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3884 chrome.exe 1928 msedge.exe 1928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4944 wrote to memory of 764 4944 JUSTIFICANTE PAGO.exe 92 PID 4944 wrote to memory of 764 4944 JUSTIFICANTE PAGO.exe 92 PID 4944 wrote to memory of 764 4944 JUSTIFICANTE PAGO.exe 92 PID 4944 wrote to memory of 764 4944 JUSTIFICANTE PAGO.exe 92 PID 4944 wrote to memory of 764 4944 JUSTIFICANTE PAGO.exe 92 PID 4944 wrote to memory of 764 4944 JUSTIFICANTE PAGO.exe 92 PID 764 wrote to memory of 3884 764 JUSTIFICANTE PAGO.exe 93 PID 764 wrote to memory of 3884 764 JUSTIFICANTE PAGO.exe 93 PID 764 wrote to memory of 4664 764 JUSTIFICANTE PAGO.exe 94 PID 764 wrote to memory of 4664 764 JUSTIFICANTE PAGO.exe 94 PID 3884 wrote to memory of 3184 3884 chrome.exe 95 PID 3884 wrote to memory of 3184 3884 chrome.exe 95 PID 4664 wrote to memory of 4036 4664 cmd.exe 97 PID 4664 wrote to memory of 4036 4664 cmd.exe 97 PID 4664 wrote to memory of 4480 4664 cmd.exe 98 PID 4664 wrote to memory of 4480 4664 cmd.exe 98 PID 4664 wrote to memory of 4936 4664 cmd.exe 99 PID 4664 wrote to memory of 4936 4664 cmd.exe 99 PID 3884 wrote to memory of 348 3884 chrome.exe 100 PID 3884 wrote to memory of 348 3884 chrome.exe 100 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3564 3884 chrome.exe 101 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 PID 3884 wrote to memory of 3796 3884 chrome.exe 102 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 JUSTIFICANTE PAGO.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 JUSTIFICANTE PAGO.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTE PAGO.exe"C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTE PAGO.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTE PAGO.exe"C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTE PAGO.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:764 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging3⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9d48adcf8,0x7ff9d48add04,0x7ff9d48add104⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2072,i,13914057076258841950,7385738255659199400,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2068 /prefetch:34⤵PID:348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1976,i,13914057076258841950,7385738255659199400,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=1964 /prefetch:24⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2416,i,13914057076258841950,7385738255659199400,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2420 /prefetch:84⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,13914057076258841950,7385738255659199400,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3136 /prefetch:14⤵
- Uses browser remote debugging
PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,13914057076258841950,7385738255659199400,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3192 /prefetch:14⤵
- Uses browser remote debugging
PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4152,i,13914057076258841950,7385738255659199400,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4148 /prefetch:24⤵
- Uses browser remote debugging
PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4604,i,13914057076258841950,7385738255659199400,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4600 /prefetch:14⤵
- Uses browser remote debugging
PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5196,i,13914057076258841950,7385738255659199400,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5192 /prefetch:84⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5404,i,13914057076258841950,7385738255659199400,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5400 /prefetch:84⤵PID:4512
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:4036
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4480
-
-
C:\Windows\system32\findstr.exefindstr All4⤵PID:4936
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵PID:376
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:1044
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2688
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2f0,0x7ff9d472f208,0x7ff9d472f214,0x7ff9d472f2204⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2024,i,2510967346384096309,7547947056825657242,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2016 /prefetch:24⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2076,i,2510967346384096309,7547947056825657242,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2072 /prefetch:34⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2616,i,2510967346384096309,7547947056825657242,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2612 /prefetch:84⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3520,i,2510967346384096309,7547947056825657242,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3516 /prefetch:14⤵
- Uses browser remote debugging
PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3580,i,2510967346384096309,7547947056825657242,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3576 /prefetch:14⤵
- Uses browser remote debugging
PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4136,i,2510967346384096309,7547947056825657242,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4132 /prefetch:14⤵
- Uses browser remote debugging
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4152,i,2510967346384096309,7547947056825657242,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4140 /prefetch:24⤵
- Uses browser remote debugging
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5068,i,2510967346384096309,7547947056825657242,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5076 /prefetch:84⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5140,i,2510967346384096309,7547947056825657242,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5128 /prefetch:84⤵PID:3340
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\b70e3978-fcea-4883-b141-fed69d1e97af.bat"3⤵PID:4932
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:2780
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 7644⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:3040
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:740
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1984
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1144
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\662168476a28c8adbdc6a073c54e05db\Admin@IQNFYLSS_en-US\Browsers\Firefox\Bookmarks.txt
Filesize173B
MD570e1643c50773124c0e1dbf69c8be193
SHA10e2e6fd8d0b49dddf9ea59013a425d586cb4730c
SHA2564fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a
SHA512664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679
-
C:\Users\Admin\AppData\Local\662168476a28c8adbdc6a073c54e05db\Admin@IQNFYLSS_en-US\Browsers\Microsoft Edge\Cookies.txt
Filesize1KB
MD57a8b1a726cf206f3affd10b06ff8486f
SHA1ab361cde9109d7355c9da7ac90bd20c7ed4c342b
SHA256226a7f3842ccf254454f0e8f7e384e468d798063fbb9a27f8a594abaf60542e2
SHA5128c823d68c825818cc801475699c8cf7951164a6ad4c054a583d54fbadc6196b3ff2c0e0da32ff5c3396e357559d44830540db999e54324dec7ced4cac6dfa7b9
-
Filesize
987B
MD55910dd35339b766631033522caea88b5
SHA1c87534522075568495ec691f823922d2a540e194
SHA256d456ef7a1b3fc616b649e6352d46cf60ccf78049130c63ebac52c78472d5bcff
SHA512dbf890cb1561df34c12171f3d21f9b6430c2a5666085c932f59b36b802f1d50e4072e3feeb082c0aa9a4c1b5f2a08e1237e21e5ef9f6f9def6e08825ffd90bb5
-
Filesize
4KB
MD50b7663b9bc89752bbe9066576e821542
SHA1d94208d9fffc253c46eeca7155b87dce995a577f
SHA256b226298128ed99021ef78c5009ef0c4c114c1dd9eb4f512c4d6f0b2aca6ef21d
SHA5128960d65c8a68a32d10e64b119744085282fc5fb663d01c8e320ecc6c9e08f902907cb83ffabb605cf6f67c83967928b6037a18e20776bf724812978faba1c9a1
-
C:\Users\Admin\AppData\Local\662168476a28c8adbdc6a073c54e05db\Admin@IQNFYLSS_en-US\System\Process.txt
Filesize319B
MD58b302b6fb513df2f1bc1714b9fbbcfc1
SHA1c5c04dcee1f3418528a2d0c6466ea9ad27dfd01f
SHA2565f16af36cd257f48f8128d478f707a724c58c816f221005fb764d80b27e49ad8
SHA5127b97bee3dfedc399e73fccfa2fdbc99d6903f6bb594ec69fa087cb96a529aade799e92036f9f4f6af13d7271f0683117ee003d9794b03b5bd3728351aba2ce2e
-
C:\Users\Admin\AppData\Local\662168476a28c8adbdc6a073c54e05db\Admin@IQNFYLSS_en-US\System\Process.txt
Filesize1KB
MD582e653644db893ccc0f5ff724cd0d874
SHA17b5ccf757bb03eb5a71d7d449757e3f33cbefb4d
SHA2561432bd182c37a6a1a16a9a1190e88624bfa60a62531dfe2c8475473e764c0678
SHA512194927a6eee5a5d3482f181a944ffedbb429fedf9e4a44ba897e05628fe921879787e9ea7bd46fcb6f51a3e720abc5d5e4839d32ad518d58c9e14a6d72f71cd9
-
C:\Users\Admin\AppData\Local\662168476a28c8adbdc6a073c54e05db\Admin@IQNFYLSS_en-US\System\Process.txt
Filesize1KB
MD507a41db6f890984351511bac97887638
SHA16b21f2ec13a88fccec0913019429b2fa6bb45a84
SHA25614edc18ec95b22eab59056aa4823a47676bfdcf22ae349e91d944446b72ea7cc
SHA512fe2e4139b67afad3e7cb86a5c4c03d82545a53ad404171938bf79f0b902484b87032590d2d8b21d9de999c3370342439c1a97b13e46983d0f001ee17ff9eff73
-
C:\Users\Admin\AppData\Local\662168476a28c8adbdc6a073c54e05db\Admin@IQNFYLSS_en-US\System\Process.txt
Filesize2KB
MD538e48ca868d611d9a7db55b2fc2869dd
SHA190df2a7c3a109dda8f83f0a9b8019ce47dc346d2
SHA256305f2efb35531f41253afa3f582afc857a027759eef7fe416edd3c973aceabee
SHA51239ee74bdf3374ddc5f9c7baf6ed8bedfc3624b884c8a859e8a7460d43703244d5a5b6a9a86a0f30c4f2245b5ce753fff18e54af21145bfb01758e569db5fb07a
-
C:\Users\Admin\AppData\Local\662168476a28c8adbdc6a073c54e05db\Admin@IQNFYLSS_en-US\System\Process.txt
Filesize3KB
MD54f698a2dacbf62e8f4c68f12cf11ac25
SHA1328432479aedd266b93678607f101a5e2143c6b2
SHA2567651c70d6280afff25ee28d32d2846305ccc910f3dc1403b6e222fe49ce2329b
SHA51277c7d6d7809bce722377dc19dc92ee39177383be0f52084e36bf2ac94c517c7de53e61cf1c43ecc88ff8541a429cd32955ead245981dc23b0ba70b608c1e99e4
-
C:\Users\Admin\AppData\Local\662168476a28c8adbdc6a073c54e05db\Admin@IQNFYLSS_en-US\System\Process.txt
Filesize3KB
MD54bbd47adbe33fc104e2a03dd7be55b6c
SHA1f11f9341e624757d0bc173078a66d51abcaa1ed3
SHA25624b15dfd37a3c38414a0458edcf1cc3a65e5901d9b15649f9d0fa0f179a2dea5
SHA51254dbf14195e1dfea134a43a580c32dad72a6ae220ea51b82d6539ca68458ced2acbfd115b3cc8ca8e29bd3253527301fe3b492e69bc5031a5b1df50b34069944
-
C:\Users\Admin\AppData\Local\662168476a28c8adbdc6a073c54e05db\Admin@IQNFYLSS_en-US\System\Process.txt
Filesize4KB
MD5ea62f2aa11fa22c910d571f91804ae04
SHA17e420dd804f2854a36833eb106f57726384e16c5
SHA25604ad9c9fc7042366d60ac2d754894cb79f2a31d8cd5532b3fdf47823aae8ce94
SHA5122219467a3d74373776abd2ad01b90b0a5da9d423a4f6835c700f8efabc86f0633a23355812f90317f35f9d99fd74aa0a2010b564ec6cc082c326df4a9141cab6
-
Filesize
3B
MD538b3eff8baf56627478ec76a704e9b52
SHA1dbc0f004854457f59fb16ab863a3a1722cef553f
SHA25616dc368a89b428b2485484313ba67a3912ca03f2b2b42429174a4f8b3dc84e44
SHA512be37ccebe21815559666b60338ec1492670b8fd2bf6cc63c5c943639ddcc50981003846b75b9e97ad0c0c19484292f59b1d30b45c7b07d1f8973bae68a3b8431
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD58949e66768e4efd9170290d988147825
SHA178bdadada43bec56e0c3137751905649b2fc0767
SHA25694d1a0977bc74ac4b8742b3d6ca0c9af47409cde8c831c0ad1e65888c0594c1c
SHA512df21557536b2ef3bb7d401a1e2276f50dbff01f5e72214e7300e1972f59228e69dd08e902b2b13187ffe2f9ce1bc76678c11fe2cab00539925c09adaa976d35c
-
Filesize
280B
MD5fed4ab68611c6ce720965bcb5dfbf546
SHA1af33fc71721625645993be6fcba5c5852e210864
SHA256c41acdf5d0a01d5e9720ef9f6d503099950791b6f975ba698ccd013c4defa8c4
SHA512f9ab23b3b4052f7fda6c9a3e8cd68056f21da5d0fcf28061331900cac6f31ef081705804d9a9d4103ee7d9c9bdb6aa4237987b7e821d2d96cd52da24219e55ee
-
Filesize
280B
MD54013ebc7b496bf70ecf9f6824832d4ae
SHA1cfdcdac5d8c939976c11525cf5e79c6a491c272a
SHA256fb1a67bdc2761f1f9e72bbc41b6fc0bf89c068205ffd0689e4f7e2c34264b22a
SHA51296822252f121fb358aa43d490bb5f5ce3a81c65c8de773c170f1d0e91da1e6beb83cb1fb9d4d656230344cd31c3dca51a6c421fda8e55598c364092232e0ad22
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\bb9a4039-5fee-44f8-a618-d20a135c468d\index-dir\the-real-index
Filesize1KB
MD582be4919adb89e9a6623c30ff5afbfab
SHA13266be45c785e546cc46978a7ada5b74f479a1d3
SHA256a2618b41e1568c076e633bbb959592cc6a8096046785bca71e4fb870e87ddeef
SHA512925ab1776a4c0984d3ac9c6270cc78c1dcc4ea3ed28ccaddc55642e6b41c517dd9628886924b1c68c9add8974f6d4b28dc2d14c03c25a88e99ef6db195992e97
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\bb9a4039-5fee-44f8-a618-d20a135c468d\index-dir\the-real-index~RFe5890a2.TMP
Filesize1KB
MD5eb674603d78363e949ec8207148654b6
SHA107b1c97acb8e0e2a517345bc452f26880c0db3b0
SHA2560db8b6f7264d2d36aae860b69f67280f54bd6e545f64fdcb1ec99f1162fd1d77
SHA5121d13ea4c16572215a78e01d2ee4a784a73aa44b0b1afef488043b2354b3888bd5a80d4be619745a1ea8e3efaf4736961f566297cc7e9b4ef0f1771bbd8c6ada2
-
Filesize
7KB
MD5f2c486947683e18007fbc22c766706f6
SHA17c435150c987534c834e5cb15303b9fa2c50cda1
SHA256a3711fcda03c8058b8e5eb1f2b554302c322ee36741c2c71ef80c2638864253d
SHA512e546807cea38716c3740f0a53bca189aa24081195dc000415f37dd849e98ef1aee7c7429a05dbfba1e2fdf9410435d6a6d11a2dd3d5ca9abe124358347d4e1d1
-
Filesize
6KB
MD5511273fce45fcc40714f24aff43d8b85
SHA1ee557780cb1ccdb238eff71828f0fe014fd8e6ae
SHA2568b5bc45fb33db33e34fe86556fbbbe67119660a7f751ba268cb282e321faaa97
SHA512ddd0d5a6831b42bdc6a71aea5e9d3ecf09721b50fa08d65791633de2bd6fff8bd2d016e0a86a3050207be723b6651bb644f34ea8d8c60c09259b521f46db348a
-
Filesize
151B
MD58fda70f5838a17130c1c8bb0401fe29f
SHA173d577720edb1a834a9e6309dcfd6923852bd909
SHA25692fa3b1b63f0dbcb9452350c29840e699315fcf2225698b11eeb4378179c3099
SHA5120d4778ad07b59163c7ec3f4465e825818844e8562ed3edaa13fc5b0e059624bf419cf69ec75944fa57bfb07938e2aa3ef256f2db8cc099b7e64f06fdae068523