Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2025, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
JUSTIFICANTE PAGO.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JUSTIFICANTE PAGO.exe
Resource
win10v2004-20250314-en
General
-
Target
JUSTIFICANTE PAGO.exe
-
Size
78KB
-
MD5
54ddfa5b86eb29bb7741f52c84572d0d
-
SHA1
e1ffbd76d7cea33c9b7a3356ce7e016e30cc197e
-
SHA256
edbf5b0f2d51a788719d2c38ea765fc9cd52c6d9887ff30d2e98898bda24d2f3
-
SHA512
7b6993a6c0d88d24fcba6fa44196c959dbbb7d3858a040b35570abb5f04b6bd59fe5371315482e3b004783e18c30396fce19ff00d14a566dde4f3a3336f61fb8
-
SSDEEP
1536:nV4paZS6dDU47eJa+M8xSXwSO/z4BWGpxNqN6Q2qg/:nV4AA6dDUxm8cer0WCrQlg/
Malware Config
Extracted
stealerium
https://api.telegram.org/bot7756107542:AAEhuCgRX-ckFVwps3xqgrtyb3JVRKo9Tog/sendMessage?chat_id=
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2560 created 3448 2560 JUSTIFICANTE PAGO.exe 54 -
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2860 chrome.exe 4452 msedge.exe 3996 msedge.exe 4584 msedge.exe 4664 msedge.exe 1460 chrome.exe 688 chrome.exe 3652 chrome.exe 2640 chrome.exe 4044 msedge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation JUSTIFICANTE PAGO.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 JUSTIFICANTE PAGO.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 JUSTIFICANTE PAGO.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 JUSTIFICANTE PAGO.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 60 icanhazip.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2560 set thread context of 4016 2560 JUSTIFICANTE PAGO.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 5088 netsh.exe 920 cmd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 JUSTIFICANTE PAGO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier JUSTIFICANTE PAGO.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2548 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 1056 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133869233401458906" chrome.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2560 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 2860 chrome.exe 2860 chrome.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe 4016 JUSTIFICANTE PAGO.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 2860 chrome.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2560 JUSTIFICANTE PAGO.exe Token: SeDebugPrivilege 2560 JUSTIFICANTE PAGO.exe Token: SeDebugPrivilege 4016 JUSTIFICANTE PAGO.exe Token: SeShutdownPrivilege 2860 chrome.exe Token: SeCreatePagefilePrivilege 2860 chrome.exe Token: SeSecurityPrivilege 5112 msiexec.exe Token: SeShutdownPrivilege 2860 chrome.exe Token: SeCreatePagefilePrivilege 2860 chrome.exe Token: SeShutdownPrivilege 2860 chrome.exe Token: SeCreatePagefilePrivilege 2860 chrome.exe Token: SeShutdownPrivilege 2860 chrome.exe Token: SeCreatePagefilePrivilege 2860 chrome.exe Token: SeDebugPrivilege 1056 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2860 chrome.exe 4452 msedge.exe 4452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2560 wrote to memory of 4016 2560 JUSTIFICANTE PAGO.exe 91 PID 2560 wrote to memory of 4016 2560 JUSTIFICANTE PAGO.exe 91 PID 2560 wrote to memory of 4016 2560 JUSTIFICANTE PAGO.exe 91 PID 2560 wrote to memory of 4016 2560 JUSTIFICANTE PAGO.exe 91 PID 2560 wrote to memory of 4016 2560 JUSTIFICANTE PAGO.exe 91 PID 2560 wrote to memory of 4016 2560 JUSTIFICANTE PAGO.exe 91 PID 4016 wrote to memory of 2860 4016 JUSTIFICANTE PAGO.exe 92 PID 4016 wrote to memory of 2860 4016 JUSTIFICANTE PAGO.exe 92 PID 2860 wrote to memory of 316 2860 chrome.exe 93 PID 2860 wrote to memory of 316 2860 chrome.exe 93 PID 4016 wrote to memory of 920 4016 JUSTIFICANTE PAGO.exe 94 PID 4016 wrote to memory of 920 4016 JUSTIFICANTE PAGO.exe 94 PID 920 wrote to memory of 3168 920 cmd.exe 96 PID 920 wrote to memory of 3168 920 cmd.exe 96 PID 920 wrote to memory of 5088 920 cmd.exe 97 PID 920 wrote to memory of 5088 920 cmd.exe 97 PID 920 wrote to memory of 2248 920 cmd.exe 98 PID 920 wrote to memory of 2248 920 cmd.exe 98 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 996 2860 chrome.exe 99 PID 2860 wrote to memory of 1788 2860 chrome.exe 100 PID 2860 wrote to memory of 1788 2860 chrome.exe 100 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 PID 2860 wrote to memory of 3172 2860 chrome.exe 101 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 JUSTIFICANTE PAGO.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 JUSTIFICANTE PAGO.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTE PAGO.exe"C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTE PAGO.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTE PAGO.exe"C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTE PAGO.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --disable-gpu --disable-logging3⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff81a63dcf8,0x7ff81a63dd04,0x7ff81a63dd104⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2012,i,4924111739376812218,2118158862916562540,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2004 /prefetch:24⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2172,i,4924111739376812218,2118158862916562540,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2168 /prefetch:34⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2308,i,4924111739376812218,2118158862916562540,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=2304 /prefetch:84⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3068,i,4924111739376812218,2118158862916562540,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3016 /prefetch:14⤵
- Uses browser remote debugging
PID:688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,4924111739376812218,2118158862916562540,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=3096 /prefetch:14⤵
- Uses browser remote debugging
PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4084,i,4924111739376812218,2118158862916562540,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4080 /prefetch:24⤵
- Uses browser remote debugging
PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4584,i,4924111739376812218,2118158862916562540,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=4580 /prefetch:14⤵
- Uses browser remote debugging
PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5184,i,4924111739376812218,2118158862916562540,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5180 /prefetch:84⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5364,i,4924111739376812218,2118158862916562540,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --disable-logging --mojo-platform-channel-handle=5176 /prefetch:84⤵PID:4384
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:3168
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5088
-
-
C:\Windows\system32\findstr.exefindstr All4⤵PID:2248
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵PID:4680
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:4484
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1620
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x20c,0x7ff818e2f208,0x7ff818e2f214,0x7ff818e2f2204⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2176,i,5458620933130530748,3579210931969230281,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2168 /prefetch:24⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2224,i,5458620933130530748,3579210931969230281,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2220 /prefetch:34⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2580,i,5458620933130530748,3579210931969230281,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2576 /prefetch:84⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3516,i,5458620933130530748,3579210931969230281,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3512 /prefetch:14⤵
- Uses browser remote debugging
PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3552,i,5458620933130530748,3579210931969230281,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3524 /prefetch:14⤵
- Uses browser remote debugging
PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=3460,i,5458620933130530748,3579210931969230281,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4172 /prefetch:14⤵
- Uses browser remote debugging
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4324,i,5458620933130530748,3579210931969230281,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=4332 /prefetch:24⤵
- Uses browser remote debugging
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5032,i,5458620933130530748,3579210931969230281,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3576 /prefetch:84⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5168,i,5458620933130530748,3579210931969230281,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5160 /prefetch:84⤵PID:2072
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5c956969-f631-4266-8f89-966e97baf325.bat"3⤵PID:1092
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:2956
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 40164⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:2548
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4700
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4408
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5068
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\4472ec2ccfd20e94d840f14f4cd97f57\Admin@QJHNVQMW_en-US\Browsers\Firefox\Bookmarks.txt
Filesize173B
MD570e1643c50773124c0e1dbf69c8be193
SHA10e2e6fd8d0b49dddf9ea59013a425d586cb4730c
SHA2564fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a
SHA512664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679
-
C:\Users\Admin\AppData\Local\4472ec2ccfd20e94d840f14f4cd97f57\Admin@QJHNVQMW_en-US\Browsers\Microsoft Edge\Cookies.txt
Filesize1KB
MD5a717eebd1578da17778e1c333eae0f7d
SHA15463464d8efc6a7e7dd29689124ada07bc6f75c1
SHA2566e50252b520cd029e23c11fc227434f67e2f608bd19a41e3b590761ee35524c9
SHA5122c78f5eeec5d81fa634f24ddc6102f565a649f60ee0eb7a23ccee9484a61c3f2c388b81ebbf79671f036aee2b56d0781a19fee0bd14aa0643ad770d1e5706029
-
Filesize
846B
MD52d8a541571dcb2f16fc07676bff7aea7
SHA1c9a233068b97845dc4a52612a4cd6d284745f1ba
SHA256683a1cac2cdca1bed6d448d8681ff75c1ffd86290627313424530208a5835b11
SHA5123e91e2d7510e55b1013459993633489991d8ab90e0ec60da0e36aa1514980e6ffe1fba7465f28949ea0d77ddf843383b6853a28d4b581a3368eaa82862d7b548
-
Filesize
6KB
MD5e4ded193433bfaed46da466eefcc2c35
SHA156151b0cb50efcac84e88cb623af4fc10f82087d
SHA256b5190a32744b506ceec36dcdade88886a20d999ff72c93f960665cb90defe05c
SHA5122948192405d25b8b18258d8f30183d082ae5bd53cc2c17743b6cd48b499f98e0820df59ac99c03dfe719202f95d39e761b3881e79dcb1b07504971e0c6a9bcfb
-
C:\Users\Admin\AppData\Local\4472ec2ccfd20e94d840f14f4cd97f57\Admin@QJHNVQMW_en-US\System\Process.txt
Filesize391B
MD56095de51e6134e7f03bdcbe62b5e47ef
SHA16e0d468ec76d229e0e40d79f2500be4ebe9607dc
SHA256b2edc406d2db971861588c6921a2b7d4e06ea9dc358eb75aba718aecf421fdd8
SHA512f04af0d0af22e5b6bcd16c4d8c5f8fcef05ed185ef64cd66fdd5c0c8a95d5a150cc6db72e44ea72e0a61eeaee0167d2e375fb61f84c710d1d59a30c9319de35c
-
C:\Users\Admin\AppData\Local\4472ec2ccfd20e94d840f14f4cd97f57\Admin@QJHNVQMW_en-US\System\Process.txt
Filesize1KB
MD51b27989b642d3f2efeb050f66e4ad0f4
SHA10dda973dc35108c13b2f1212860b9fb692b47f78
SHA256630e76488b435ada5e76f223858d89dee769bad7f3d578f5f051b5c66bc2ef58
SHA5123594c374be27ebcba244cb35bfaf22bbcde658e57f6fce7b0090e548b031bae059309228508ecf75b46d4021bfeabfcae4bc0a35b6da474bb8cd2daa8bd06148
-
C:\Users\Admin\AppData\Local\4472ec2ccfd20e94d840f14f4cd97f57\Admin@QJHNVQMW_en-US\System\Process.txt
Filesize2KB
MD5b850528c4717cd48fd2bde353a6b8ff7
SHA13aa4a99829f42e4b1f2d6e533a33d8e9148c85df
SHA25650396360be8a0b85ca4f08bb3e5f593cc156b61e06c17141060e7262af289587
SHA512228bfea1fc7835dd1c975686baaea98d5d52444b08eb380756d2129e82d5855e8fa217b68142fccb2a75b258a6a456bf4459792a9cb5e909069aef3ac7777d48
-
C:\Users\Admin\AppData\Local\4472ec2ccfd20e94d840f14f4cd97f57\Admin@QJHNVQMW_en-US\System\Process.txt
Filesize3KB
MD5dcdef3fd067a4dd0d4133443a66e3c24
SHA160d4c2830574498d9e7b883f9372e24b8a920815
SHA25668c3c7ebcd21d4dbce36079d7dd3f7452e59bde72fdfa5f59e7776f533417ff0
SHA5128d187ad7d2e536f622792fad6672943f5da8aa4199dd2df862e3e4bb08a9fe64a6777cb5153bf1912b0bb2266281855fe0782d8df61329883fdfc46cfcbab971
-
C:\Users\Admin\AppData\Local\4472ec2ccfd20e94d840f14f4cd97f57\Admin@QJHNVQMW_en-US\System\Process.txt
Filesize4KB
MD5342dd3b73dab10c9676b39f8dec7eb99
SHA1f5a1307e6e491858f36d83d01e627727606c4123
SHA256ea6fce659b8243f6cbeb5a0376774ae8bd86f72f4bc7f2c8a5019f6fb822f912
SHA512a6d3ff20f5c3c7cb25888355a5736639be6370282ce0569894066da6059aecfd4997e998f7c9a6bd8af57244a48fc281fdb3682a274f9c0b1824eaea0378a55c
-
Filesize
3B
MD56974ce5ac660610b44d9b9fed0ff9548
SHA1934385f53d1bd0c1b8493e44d0dfd4c8e88a04bb
SHA256454f63ac30c8322997ef025edff6abd23e0dbe7b8a3d5126a894e4a168c1b59b
SHA512947de04bfae0bf062a66fc055d4c284c9779793d9bd58833ee7549fde1ff1effaf7aefdbc6c90ed0ac86c0acc82329e7c057d900c28ea7ed4724486f717ee38d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5fc9c85d3b927696aed15cd8283dbd1c9
SHA1ca368f0ac7a0311e31e9a718a47b829ab9ea5beb
SHA256e83eb3565015f26dd35455d0d919eb22260a96e78dadfb3090ce3b385a9b2321
SHA512f5c614f331f6c90eb283512e893c9f7d657d0a90f9733a095a98d8e35a5b224fa03b0b98e29203835392b30f7f892af6b7458dd96cbd5279c08a6af3ffa4f6bc
-
Filesize
280B
MD58734b4a181214bb62f91cfa36c7e2c98
SHA19cff323f10778a23d73ac3dcffc038d3bf661b78
SHA256e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5
SHA512e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36
-
Filesize
280B
MD50db1d88802048ff847bfcf47035335bd
SHA1bb54059e5b145da464f6521ae67353889ce00771
SHA256416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a
SHA51232c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\a28510ad-0cb5-46a6-9c6f-aa4da4147d82\index-dir\the-real-index
Filesize648B
MD57a808276670d2ba1ada12efce2da7ba9
SHA16ea9bb107dbec89ef377afccf615123d77bf8108
SHA2565a0a30e28464c058c81f3cc4cb4cc27bb9ad28ca05be985f097c0715f3d8a89b
SHA51283777adf7860c9a97ba57ec55d270f7f197d8850cafdefc214ec33cee7a770a3f1f7877146a098387d5519ea4b184296ed7d52f3a7b9842eedb33e97c1fb0f59
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\a28510ad-0cb5-46a6-9c6f-aa4da4147d82\index-dir\the-real-index~RFe5dd0d0.TMP
Filesize648B
MD5089f85054cdc601a0b20ef4d2723c910
SHA16530f3bb90877d3e66dc1c50650b15cff41c8ca1
SHA2563ada3aa7ea95ae46e6c9961c42dfcfea248d8bc3f5e1e4359d505398d494e8fa
SHA512f6881a10930bd912d24275beb3d5b60471a8fe20928b6fed46679d2db463e74e1e207574f8307dd8eb94dd30b4734f1ef07ef06d45dad42b15428df1f80a93f6
-
Filesize
6KB
MD5b3144c3e3ee88721e30c9937117ef831
SHA1b2967762191961931f4c217e621b7d44444351d3
SHA2568e97378b8c1f666607819fde8e6bffe5f1063e42603933183dac51af7270ec73
SHA5129777fd7a34ab836b670616e64d4ddf4ce905c82a8aee7b5c87452df7899c3d7942fc17f8bcc3c3187adc5ed7dd65c474c14df40227226241e8fee7c7caf1ca17
-
Filesize
7KB
MD5f34505cfbbf30cbc3705ca23d22e0df0
SHA12427e25c81c69a6ef7270932610c1546999be559
SHA256f6051d57f8f7c513cd9f4afc6ae01b65983181af2f9f03d8cac60661ac8c5d54
SHA512211e21f7faacc8a974120f28932416aaa2f19c793af2cd1f1626f7c67c8936e39608f5adc7e62f05087e78376b8812f33d6a845d163d8e91a7ae8573d1da9d56
-
Filesize
152B
MD56be7699a73dd3054d652de90ce1f6c00
SHA1a872a50aa9116e06f467b3fc1faad8f231b6dff5
SHA25669e2425d5a652bd4a0f531f413bdde370b1be9259215099d5027973b0d728eec
SHA5124f5faa1ceedd796e0df7bf9379dcefb3b6e4dcd14d9fa57c58840bbd59a90e9dc6a04d67ebc7db95fa2f39a909468890e8228c91a2569455ad2ef7ec5a3ccd27