Analysis
-
max time kernel
75s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
Nw-Inst64.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
Nw-Inst64.exe
Resource
win10v2004-20250314-en
General
-
Target
Nw-Inst64.exe
-
Size
1.8MB
-
MD5
3386e2abdfb0d9549bfba2cce6ca7689
-
SHA1
ed6cb1b6d742f644ea2d1450c84a715d0b342d5c
-
SHA256
6a4c87064969595078355dae42918fc19c3b71f422d6b5af9cee50a2af2d7b88
-
SHA512
8f5af4ba0f985ef0b2ebb0a1518f07ad39feac4c355587fa4b1db093d8f763bff4484488a7692550fa458499af696dc2d09c54266a7a2ecfe1340de97eacf8de
-
SSDEEP
49152:TRWp/PzUuHrGdkuxEiRMmWqf2/wzfUMrf5yfdoP+krDDjJOeZs:TEJPzXHrGdkuWJmWZ4CfdoPhXJOk
Malware Config
Extracted
xworm
89.39.121.169:9000
-
Install_directory
%AppData%
-
install_file
RunShell.exe
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000a00000001da61-7.dat family_xworm behavioral2/memory/456-22-0x00000000004A0000-0x00000000004B6000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral2/files/0x000500000001dadb-18.dat family_stormkitty behavioral2/memory/208-35-0x0000000000510000-0x0000000000554000-memory.dmp family_stormkitty -
Stormkitty family
-
Xworm family
-
Uses browser remote debugging 2 TTPs 5 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2820 chrome.exe 2196 chrome.exe 4248 chrome.exe 2784 chrome.exe 2772 chrome.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation Nw-Inst64.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation DCRatBuild.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation fontWinnet.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation OfficeClickToRun.exe -
Executes dropped EXE 5 IoCs
pid Process 456 XClient.exe 208 Build.exe 64 DCRatBuild.exe 4484 fontWinnet.exe 512 OfficeClickToRun.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 ipinfo.io 27 ipinfo.io 29 ip-api.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Microsoft Office 15\ClientX64\9e8d7a4ca61bd9 fontWinnet.exe File created C:\Program Files\Microsoft Office 15\ClientX64\RuntimeBroker.exe fontWinnet.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\RuntimeBroker.exe fontWinnet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DCRatBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1376 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 3964 cmd.exe 1964 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Build.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings fontWinnet.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings DCRatBuild.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1376 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 208 Build.exe 208 Build.exe 208 Build.exe 208 Build.exe 208 Build.exe 208 Build.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe 4484 fontWinnet.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2820 chrome.exe 2820 chrome.exe 2820 chrome.exe 2820 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 456 XClient.exe Token: SeDebugPrivilege 208 Build.exe Token: SeDebugPrivilege 4484 fontWinnet.exe Token: SeDebugPrivilege 512 OfficeClickToRun.exe Token: SeShutdownPrivilege 2820 chrome.exe Token: SeCreatePagefilePrivilege 2820 chrome.exe Token: SeShutdownPrivilege 2820 chrome.exe Token: SeCreatePagefilePrivilege 2820 chrome.exe Token: SeShutdownPrivilege 2820 chrome.exe Token: SeCreatePagefilePrivilege 2820 chrome.exe Token: SeShutdownPrivilege 2820 chrome.exe Token: SeCreatePagefilePrivilege 2820 chrome.exe Token: SeShutdownPrivilege 2820 chrome.exe Token: SeCreatePagefilePrivilege 2820 chrome.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2820 chrome.exe 2820 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4044 wrote to memory of 456 4044 Nw-Inst64.exe 89 PID 4044 wrote to memory of 456 4044 Nw-Inst64.exe 89 PID 4044 wrote to memory of 208 4044 Nw-Inst64.exe 90 PID 4044 wrote to memory of 208 4044 Nw-Inst64.exe 90 PID 4044 wrote to memory of 208 4044 Nw-Inst64.exe 90 PID 4044 wrote to memory of 64 4044 Nw-Inst64.exe 91 PID 4044 wrote to memory of 64 4044 Nw-Inst64.exe 91 PID 4044 wrote to memory of 64 4044 Nw-Inst64.exe 91 PID 64 wrote to memory of 2088 64 DCRatBuild.exe 92 PID 64 wrote to memory of 2088 64 DCRatBuild.exe 92 PID 64 wrote to memory of 2088 64 DCRatBuild.exe 92 PID 208 wrote to memory of 3964 208 Build.exe 95 PID 208 wrote to memory of 3964 208 Build.exe 95 PID 208 wrote to memory of 3964 208 Build.exe 95 PID 3964 wrote to memory of 4988 3964 cmd.exe 97 PID 3964 wrote to memory of 4988 3964 cmd.exe 97 PID 3964 wrote to memory of 4988 3964 cmd.exe 97 PID 3964 wrote to memory of 1964 3964 cmd.exe 99 PID 3964 wrote to memory of 1964 3964 cmd.exe 99 PID 3964 wrote to memory of 1964 3964 cmd.exe 99 PID 3964 wrote to memory of 3516 3964 cmd.exe 100 PID 3964 wrote to memory of 3516 3964 cmd.exe 100 PID 3964 wrote to memory of 3516 3964 cmd.exe 100 PID 2088 wrote to memory of 1396 2088 WScript.exe 101 PID 2088 wrote to memory of 1396 2088 WScript.exe 101 PID 2088 wrote to memory of 1396 2088 WScript.exe 101 PID 208 wrote to memory of 2184 208 Build.exe 103 PID 208 wrote to memory of 2184 208 Build.exe 103 PID 208 wrote to memory of 2184 208 Build.exe 103 PID 2184 wrote to memory of 4516 2184 cmd.exe 105 PID 2184 wrote to memory of 4516 2184 cmd.exe 105 PID 2184 wrote to memory of 4516 2184 cmd.exe 105 PID 1396 wrote to memory of 4484 1396 cmd.exe 106 PID 1396 wrote to memory of 4484 1396 cmd.exe 106 PID 2184 wrote to memory of 5024 2184 cmd.exe 107 PID 2184 wrote to memory of 5024 2184 cmd.exe 107 PID 2184 wrote to memory of 5024 2184 cmd.exe 107 PID 4484 wrote to memory of 4552 4484 fontWinnet.exe 112 PID 4484 wrote to memory of 4552 4484 fontWinnet.exe 112 PID 4552 wrote to memory of 1588 4552 cmd.exe 114 PID 4552 wrote to memory of 1588 4552 cmd.exe 114 PID 4552 wrote to memory of 1376 4552 cmd.exe 115 PID 4552 wrote to memory of 1376 4552 cmd.exe 115 PID 4552 wrote to memory of 512 4552 cmd.exe 119 PID 4552 wrote to memory of 512 4552 cmd.exe 119 PID 208 wrote to memory of 2820 208 Build.exe 120 PID 208 wrote to memory of 2820 208 Build.exe 120 PID 2820 wrote to memory of 4004 2820 chrome.exe 121 PID 2820 wrote to memory of 4004 2820 chrome.exe 121 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 PID 2820 wrote to memory of 1300 2820 chrome.exe 122 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nw-Inst64.exe"C:\Users\Admin\AppData\Local\Temp\Nw-Inst64.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\XClient.exe"C:\Users\Admin\AppData\Local\Temp\XClient.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Users\Admin\AppData\Local\Temp\Build.exe"C:\Users\Admin\AppData\Local\Temp\Build.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:208 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:4988
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1964
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:3516
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:4516
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5024
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd71fadcf8,0x7ffd71fadd04,0x7ffd71fadd104⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2004,i,10057287151395637735,1319793230092026566,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2000 /prefetch:24⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2252,i,10057287151395637735,1319793230092026566,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2256 /prefetch:34⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2388,i,10057287151395637735,1319793230092026566,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2876 /prefetch:84⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3220,i,10057287151395637735,1319793230092026566,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3300 /prefetch:14⤵
- Uses browser remote debugging
PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,10057287151395637735,1319793230092026566,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3320 /prefetch:14⤵
- Uses browser remote debugging
PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4328,i,10057287151395637735,1319793230092026566,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4348 /prefetch:24⤵
- Uses browser remote debugging
PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4792,i,10057287151395637735,1319793230092026566,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4684 /prefetch:14⤵
- Uses browser remote debugging
PID:2772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\WinnetCommonSvc\EF1rb20B7Zp52f5Q8odTU.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\WinnetCommonSvc\ckg6ORaGrHhdrhoaDEIfOHU33jMcFfgqQelkNCXcy5pLINkbo7vRcc.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\WinnetCommonSvc\fontWinnet.exe"C:\WinnetCommonSvc/fontWinnet.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2UEwmyrb8v.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:1588
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1376
-
-
C:\3ac54ddf2ad44faa6035cf\OfficeClickToRun.exe"C:\3ac54ddf2ad44faa6035cf\OfficeClickToRun.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:512 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\R5wNYqVH5b.bat"8⤵PID:376
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:4384
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:4744
-
-
-
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4200
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225B
MD5b63445aeb1aaf513fa4111eca08d70d1
SHA1eea44a7ea975d1d9941593db23224ff9397ac8de
SHA25643fd8db334f4dd05310c82d9f10210fe59aa7f10913dbf3f2c84eccdf63b0de4
SHA51204d0f906f93ab5d9beaacd91b67d409e8ea258753a0bf3e271e66ba680f20d56f36967ac781454df34a675a59c2c47862f97b891e8b881d352b7eacb6e39b5a4
-
Filesize
250B
MD553e75e39f30a633db9d6dbd26ab95b8c
SHA1d5a399e4146a8be0d9f1648f7ea93d745ca42876
SHA256ce9344613117a4eceeccb8aa65299dbe7231cd15587340421e99f8c8d6bd259d
SHA512662795d38d8fa8f5bfe6350b93068054c6d3bc07eab75fbd09bb732ea90c0acbe3f561229c96f7f4bbcc4f6a27b9a53822917dae5d49861964623aa36930d769
-
Filesize
433B
MD55a100b11aee504208daad5d406556f50
SHA1119c93411cbd134b99a15b3f9e237af3ddaf9b46
SHA256697eaef0c30253d3fb804857aaeca2be25000de4112127ffa67e6fceceabd309
SHA5127cf04fa7630d4c2692946505e1c3e7bf0af11865e79ae2390e1aba403d881ba69d05af6ae978bad7792242d79ba1fd1ce8a5926b944cea0b69354d686e1bdb6c
-
Filesize
865B
MD55ff6ea17f5eec29c0eb37d589400809a
SHA183c1de406fbcc807ac4fed6e5692415617fa6f2c
SHA2566d821dff72ea5f6cf67ef238a8ef20c0561b6161cc28f682190d316e8dcb72b7
SHA512e836ba90bff29adc079a9b3442126bf2eac16b555739289b4f9d8f3ba8f9c26c49243a3c8cc782f44da45bbcee8f18f6c6394972084a82fed34582472a115857
-
Filesize
4KB
MD5976c6637ffbef23c14a442c0935206ac
SHA16e844ba1f7c6bbc8392b4f73d751177b79ac2ee0
SHA25641098e18142d49f8241637ed2a051d5f3cc416fcd4c8d47c895d2e164f18fa52
SHA512d2783b6fb7856c380371d38dd336ba473abb7045ff11e97a8722a0aea60c53cfffec314b3320fd739884ef5539e1b0aecadf8b90b8aa43d26f3fb4e494a623fd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5378b96eb71241683bf54694a8ef7366c
SHA177f5875f419c8378257fac56e0c620d06817cf8e
SHA25690af0f58290cc424db00e6104a1564652e5c94149eb87305d6374228166e3d55
SHA5120de82d94b56033573b05ad8286592d91684490f890ebc21666e7ee67d31ac94b0143c41c4de6049b496362dd4c27edbff2465cc71ffa0440cee1fc5a1c771b42
-
Filesize
81B
MD5ea511fc534efd031f852fcf490b76104
SHA1573e5fa397bc953df5422abbeb1a52bf94f7cf00
SHA256e5fe7f327ae62df007bd1117aa7f522dbbcd371ec67953f66d786424cb1d7995
SHA512f7d8e575a2332b0fbd491b5e092b7ed6b0942a5165557fcc5d215d873b05103aa6ba01843133871c1c7ac81b10182a15895be49885c98d1a379dd55f88004fae
-
Filesize
4KB
MD50e0258c718e5782c9f6d6dd4bb466f72
SHA180b3178f42da82ef8529bc41d628f61f41426fa6
SHA256ae8042dc898e915740316d9f89badad0d2dc9127c1eb3c8cc1b9d5dce96fb12b
SHA5122fed5f04de9aab45478c88d78731027028a11fd3eb4b20d9a5029c2280c7551c0dc87dd515f06693bb3f4868c6875674943328512c5b3b117734e7b6c9d3767f
-
Filesize
174B
MD578d3c10cf700c786789ef2f9ebcfbbe8
SHA13d887242f0cc94b5d8b8e07c8a3708e5807e685b
SHA256d9a081fe824a43dae2c120cc3eca9c1eb5bab569e9fc8b2ce49f4268922e817a
SHA51242da29387b3b4499747ac471aab3e8cb8536a774e313282c0fd92fc35623b34913afde48fe07b6b650c9188b55224e042abdc114d4b1060d3e2062fb0ceb668a
-
Filesize
228KB
MD5ee463e048e56b687d02521cd12788e2c
SHA1ee26598f8e8643df84711960e66a20ecbc6321b8
SHA2563a07b3003758a79a574aa73032076567870389751f2a959537257070da3a10d8
SHA51242b395bf6bd97da800385b9296b63a4b0edd7b3b50dc92f19e61a89235a42d37d204359b57d506e6b25ab95f16625cce035ed3b55ef2d54951c82332498dab0f
-
Filesize
250KB
MD5b8f3934b55afbaa069717cd2e2eda6dd
SHA1b33071c576f2637bd679002f01ca68e4df5112ec
SHA2567cd58601d62de54c16bf279d2eb477a0e5b85f62cbe387268c1bec578db2a1e3
SHA5122bab25ed6f190e56a96986400e5004956d44e3c9fe6e95e0b6540e503ad232ed3c08c85aaf3926a7bab3041fdbe64e363785c07fce9c011fc09abf2c39fde0c1
-
Filesize
2.2MB
MD5730239632db99d16b9f2656950408bcc
SHA1ae877e836becf0b7727cf61c0277446c1c5ed381
SHA2566dbcdb70833bb9ac5656887e6eae082ade4d197bcf6516c70e10ab196a23d292
SHA512bd3b2973c54ee9754f19ef5eba73d9252de285c5d574611b01db0ea3f0c3c145686e319dc2a9f6b8aff94728eb1bfb8485a98152175cca5deed52b6318c16da5
-
Filesize
56KB
MD51c832d859b03f2e59817374006fe1189
SHA1a4994a54e9f46a6c86ff92280c6dabe2bcd4cc42
SHA256bb923abf471bb79086ff9ace293602e1ad882d9af7946dda17ff1c3a7e19f45b
SHA512c4d3be414fa5dd30151cde9f6d808d56c26b031ff3f6446d21a15d071053787b6ba337b12909a56af7bb420f858dba5213f08e64ca9f836f52c98a18762b4bef
-
Filesize
283B
MD5ae44ba91490388c66deb10583be24748
SHA16d1972777b56cbc419afb882799f94a17985532e
SHA256b9440abb7b7becb486923d207d0883790322bc92659e78edee9569401c84771e
SHA512cec4991353645f59c3feede5dddcb034ccd1612c76e900387a92f04ee370ff3c981310a89d05fcc81d02a1a3af778f2aee0f6d74cf2d40c60786fb0a93265b11
-
Filesize
64KB
MD531d745f5009eeda2da51b2d05d9711c5
SHA126c27b236bed8cb2046acddcc1c7d7b642b7c610
SHA25637330d19e9479d225bf3934cf1b7bb233adc6bf0c8c876f181b814759d7c0b0f
SHA5128319478d1ef266243e26592edbef9acbb07eb6de059043981e7f824424501691d41eef4736f6fe05e7ffc718ed0133489d22bd850c7a6773f7f50bf34207da4b
-
Filesize
40KB
MD5dfd4f60adc85fc874327517efed62ff7
SHA1f97489afb75bfd5ee52892f37383fbc85aa14a69
SHA256c007da2e5fd780008f28336940b427c3bfd509c72a40bfb7759592149ff3606e
SHA512d76f75b1b5b23aa4f87c53ce44c3d3b7e41a44401e53d89f05a114600ea3dcd8beda9ca1977b489ac6ea5586cf26e47396e92d4796c370e89fab0aa76f38f3c4
-
Filesize
130KB
MD59da2e511ff2c73321ed9a64fe261fe03
SHA1914d09be56ce4f2e03ac7a1bd7384f1a8b7c48e9
SHA256bc952c40d4485915549ef3ca5e9c61210ba7a50e41ef08a5670285bd554e72c4
SHA512f25ae01463ecbdb1d169cc7a07ce3569685ce7bcce81edbe7631ed7fb09b7861f8a01806989d5cc4edc1625a317a5f5d0ea86b2d9d9c6a9f7c2dd35bed637b8f
-
Filesize
20KB
MD5a156bfab7f06800d5287d4616d6f8733
SHA18f365ec4db582dc519774dcbbfcc8001dd37b512
SHA256e87b3d155c7582d4c1d889308b58f84e8fe90a1581014b21b785d6694bd156cc
SHA5126c8eeab3ae6fb0d5be7758cca521665b216f31aed1aeeeaf121c99dc9f0192b385de0da36e94f90dd4a9bbbac6be2c5a55d2f284a24ccb7dec2c5302fb9b027c
-
Filesize
588B
MD5cf68526af5db3fdf70aeacf3e0afb1be
SHA1e11bac841432122a07f5e3980e7d1bfc730db5ab
SHA256c57c7ef7da9d5344f19a96e60f70bbf1c54c52555667f85eb892f36110ceaa25
SHA512776d3fe4b63ff36b4f616c4c3981c364784e3081736e12f96d682e990167bd2f7235ff73d73bfc5063b0d58aec2333881ca7f7f8fbd6b896861c153d174c2786
-
Filesize
860B
MD5eab1d5de771fc347535d487b19a7fda1
SHA10e0388d801e2dc90be69c3ca4d602f673e1744c1
SHA256b5138b53f9d7f412bb2f816510e6ef21a1cee53f327c8163e796c42114b0676e
SHA512f7ad782f1f577490757227efdd000a76b7396e2e98189c83420dc92c71b4ea23dda347f67be3ecc166ad190054b2459ef365e8224b8a8bd95bbcf80078ac8ba7
-
Filesize
247B
MD58fbc46f9794e1b89929cd710e53f0459
SHA115453a386f1c94b5ea4cd0ec41aa3c79c5dd2f54
SHA256aaa6ca00879bea0f370824f57a72071aea49ae438ad2abb3eb4c9faddbab3d86
SHA512b9fe28c4b771eae1f2261e4e17ec9e6d6055e17a5a2a5a32f8ecc7aaba9cf73f14e89ffafcc3455ed57cfa48fdde6d393630f585349f8ce4d2302543f323dc9b
-
Filesize
89B
MD5f2c017fa853e79d1fc9f0ef254fbd9b7
SHA1911039790cbad8fd3d7ff7d5dd3ed0099adc4ed9
SHA2568848856354f6c99d5821c08136a03c75597f43dbfe1f8475998db4b19e833b13
SHA512ec1af3b307d7c7d30011ef7a9d0d1b7c53f15cdc7f028163fa40db3711e9d83271dc4a089160d9c9a6b4687ddd87b0cd6fd5bda2e375a080c8d0a6badc4885ca
-
Filesize
1.9MB
MD5a5696185d5f9c88887e304e46944a366
SHA1dd3daef6d70edcfbff6e58a123a25e212534941f
SHA2563672ce6a54d5f04368c85ca8d46b2f0d67b548d05703bb14cf3492dc21fff8da
SHA5129dadc5dfec936039b09aeed6c49a58cbe1162a9939283efa27d8660ea8aeeafc28d246ddf4270df93d89af15822d1f8b4aebc8d74ba040969753975013b3d579