Analysis
-
max time kernel
142s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 11:26
Static task
static1
Behavioral task
behavioral1
Sample
xtsle.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
xtsle.exe
Resource
win10v2004-20250314-en
General
-
Target
xtsle.exe
-
Size
903KB
-
MD5
8555e55165d3cda3bb72d6f7a0693a69
-
SHA1
300eaed89a5d8edea974a7118655fe919ba5abff
-
SHA256
88bd9484b884ae95a3df7310d69e76872f3de844c1c6e45639e464b38a8a805b
-
SHA512
db212f7ffe972b1cb2069e57dece38bc72410c2dc196ee659b60454ea1c00dc3900d6a31d2f4b7ab79f1f1d82c147c957e4b38873960ac353a1bbe8fc36e9320
-
SSDEEP
12288:1tCXUjIKWxqiJJd0RA89Em2AYpBs+AsSiFd+BtdCxCQjlMs/xv78pEOBl:1tCXUjIJJJdr8RY+cj6tdeMs/R8yOj
Malware Config
Extracted
vidar
https://t.me/g_etcontent
https://steamcommunity.com/profiles/76561199832267488
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:135.0) Firefox/135.0
Extracted
vidar
13.2
2b5f49da02542664c0ff260da932bacc
https://t.me/g_etcontent
https://steamcommunity.com/profiles/76561199832267488
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:135.0) Firefox/135.0
Signatures
-
Detect Vidar Stealer 34 IoCs
resource yara_rule behavioral2/memory/6052-376-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-377-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-378-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-379-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-386-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-387-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-392-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-393-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-396-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-400-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-401-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-405-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-406-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-407-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-458-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-459-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-460-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-461-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-464-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-468-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-469-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-470-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-474-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-476-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-827-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-896-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-899-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-902-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-903-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-904-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-905-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-906-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-907-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 behavioral2/memory/6052-908-0x0000000004B10000-0x0000000004B39000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4572 chrome.exe 4596 chrome.exe 3652 chrome.exe 864 chrome.exe 3200 chrome.exe 4316 msedge.exe 3360 msedge.exe 3204 msedge.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation xtsle.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation Beings.com -
Executes dropped EXE 1 IoCs
pid Process 6052 Beings.com -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2400 tasklist.exe 908 tasklist.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\MuchInterventions xtsle.exe File opened for modification C:\Windows\InclusionSculpture xtsle.exe File opened for modification C:\Windows\LawsuitGuy xtsle.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beings.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtsle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2508 cmd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Beings.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Beings.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 116 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133873756282202722" chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 6052 Beings.com 6052 Beings.com 6052 Beings.com 6052 Beings.com 6052 Beings.com 6052 Beings.com 6052 Beings.com 6052 Beings.com 6052 Beings.com 6052 Beings.com 4572 chrome.exe 4572 chrome.exe 6052 Beings.com 6052 Beings.com 6052 Beings.com 6052 Beings.com 6052 Beings.com 6052 Beings.com 6052 Beings.com 6052 Beings.com -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 908 tasklist.exe Token: SeDebugPrivilege 2400 tasklist.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 6052 Beings.com 6052 Beings.com 6052 Beings.com 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4316 msedge.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 6052 Beings.com 6052 Beings.com 6052 Beings.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3336 wrote to memory of 4736 3336 xtsle.exe 89 PID 3336 wrote to memory of 4736 3336 xtsle.exe 89 PID 3336 wrote to memory of 4736 3336 xtsle.exe 89 PID 4736 wrote to memory of 908 4736 CMD.exe 91 PID 4736 wrote to memory of 908 4736 CMD.exe 91 PID 4736 wrote to memory of 908 4736 CMD.exe 91 PID 4736 wrote to memory of 2280 4736 CMD.exe 92 PID 4736 wrote to memory of 2280 4736 CMD.exe 92 PID 4736 wrote to memory of 2280 4736 CMD.exe 92 PID 4736 wrote to memory of 2400 4736 CMD.exe 96 PID 4736 wrote to memory of 2400 4736 CMD.exe 96 PID 4736 wrote to memory of 2400 4736 CMD.exe 96 PID 4736 wrote to memory of 5224 4736 CMD.exe 97 PID 4736 wrote to memory of 5224 4736 CMD.exe 97 PID 4736 wrote to memory of 5224 4736 CMD.exe 97 PID 4736 wrote to memory of 3380 4736 CMD.exe 98 PID 4736 wrote to memory of 3380 4736 CMD.exe 98 PID 4736 wrote to memory of 3380 4736 CMD.exe 98 PID 4736 wrote to memory of 2532 4736 CMD.exe 99 PID 4736 wrote to memory of 2532 4736 CMD.exe 99 PID 4736 wrote to memory of 2532 4736 CMD.exe 99 PID 4736 wrote to memory of 3908 4736 CMD.exe 100 PID 4736 wrote to memory of 3908 4736 CMD.exe 100 PID 4736 wrote to memory of 3908 4736 CMD.exe 100 PID 4736 wrote to memory of 2508 4736 CMD.exe 101 PID 4736 wrote to memory of 2508 4736 CMD.exe 101 PID 4736 wrote to memory of 2508 4736 CMD.exe 101 PID 4736 wrote to memory of 2868 4736 CMD.exe 102 PID 4736 wrote to memory of 2868 4736 CMD.exe 102 PID 4736 wrote to memory of 2868 4736 CMD.exe 102 PID 4736 wrote to memory of 6052 4736 CMD.exe 104 PID 4736 wrote to memory of 6052 4736 CMD.exe 104 PID 4736 wrote to memory of 6052 4736 CMD.exe 104 PID 4736 wrote to memory of 5988 4736 CMD.exe 105 PID 4736 wrote to memory of 5988 4736 CMD.exe 105 PID 4736 wrote to memory of 5988 4736 CMD.exe 105 PID 6052 wrote to memory of 4572 6052 Beings.com 109 PID 6052 wrote to memory of 4572 6052 Beings.com 109 PID 4572 wrote to memory of 4724 4572 chrome.exe 110 PID 4572 wrote to memory of 4724 4572 chrome.exe 110 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111 PID 4572 wrote to memory of 1780 4572 chrome.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\xtsle.exe"C:\Users\Admin\AppData\Local\Temp\xtsle.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Proc.midi Proc.midi.bat & Proc.midi.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"3⤵
- System Location Discovery: System Language Discovery
PID:5224
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1476553⤵
- System Location Discovery: System Language Discovery
PID:3380
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Walnut.midi3⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Davis" Jade3⤵
- System Location Discovery: System Language Discovery
PID:3908
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 147655\Beings.com + Impression + Teaching + Mapping + Distributions + Ruled + Amanda + Approximately + Sustainability + Inspector + Teddy + Tm 147655\Beings.com3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2508
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pubmed.midi + ..\Vocal.midi + ..\Griffin.midi + ..\Pre.midi E3⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\147655\Beings.comBeings.com E3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb7cd3dcf8,0x7ffb7cd3dd04,0x7ffb7cd3dd105⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2028,i,10458734127826375516,15953415497532067280,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2024 /prefetch:25⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1600,i,10458734127826375516,15953415497532067280,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2256 /prefetch:35⤵PID:5316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2412,i,10458734127826375516,15953415497532067280,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2564 /prefetch:85⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3212,i,10458734127826375516,15953415497532067280,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3084 /prefetch:15⤵
- Uses browser remote debugging
PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,10458734127826375516,15953415497532067280,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2864 /prefetch:15⤵
- Uses browser remote debugging
PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4292,i,10458734127826375516,15953415497532067280,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4308 /prefetch:25⤵
- Uses browser remote debugging
PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4628,i,10458734127826375516,15953415497532067280,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4692 /prefetch:15⤵
- Uses browser remote debugging
PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5272,i,10458734127826375516,15953415497532067280,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5284 /prefetch:85⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5472,i,10458734127826375516,15953415497532067280,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5308 /prefetch:85⤵PID:1608
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x260,0x7ffb7cd1f208,0x7ffb7cd1f214,0x7ffb7cd1f2205⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2220,i,667083003783380445,1231464413460660877,262144 --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:25⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1916,i,667083003783380445,1231464413460660877,262144 --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:35⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2544,i,667083003783380445,1231464413460660877,262144 --variations-seed-version --mojo-platform-channel-handle=2704 /prefetch:85⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3576,i,667083003783380445,1231464413460660877,262144 --variations-seed-version --mojo-platform-channel-handle=3616 /prefetch:15⤵
- Uses browser remote debugging
PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3580,i,667083003783380445,1231464413460660877,262144 --variations-seed-version --mojo-platform-channel-handle=3620 /prefetch:15⤵
- Uses browser remote debugging
PID:3360
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\m7g4e" & exit4⤵
- System Location Discovery: System Language Discovery
PID:4544 -
C:\Windows\SysWOW64\timeout.exetimeout /t 115⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:116
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:5988
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5588
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5804
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD53855cbad50dccc73cf05cf93c28e2293
SHA10fdfa59647cac1d0e8f1341e4567330fd5174def
SHA2565d67891b695033a8afabddde63dc12fd948a47eb584e3a69255bbcc38d8ded02
SHA51276fa222272de0a368ae9dde153a78afb08449e172a13746bd334a9172e913de191d9c42fe88131b1d2a7f1400b9f9420679dc7bd32e522cad9fc9b9adcfce97c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5b876f89b18cc76281ea9fe1aa15f9aca
SHA15692f8f5e7c1d95fa3ae0d5be3fa545b73dcae4e
SHA2564f0efd3041cadae4926ba291c68e555f265489d552e14a5a31244852ba53cf75
SHA5122bc9b67ab0b605e6b792f186aed85b39c00eccefebed9f7c37894d1cf72995b876e602b393b3653ca08b7d245bcf2544257da5355e458c4fb7244dbffb1eff7f
-
Filesize
280B
MD501cc3a42395638ce669dd0d7aba1f929
SHA189aa0871fa8e25b55823dd0db9a028ef46dfbdd8
SHA256d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee
SHA512d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\6be0ea5b-0c11-4491-8571-7ff62c7ad5ee\index-dir\the-real-index
Filesize2KB
MD51c0b85ac1763ba8658446049ef4a4c06
SHA15e32da7eba07ea8f79fc3ec2bf4d59be94295b99
SHA2560f42426f14fcd9f33eabfb6b171aacfad5a342d9c3286f49b66fdc29b0bb6bdb
SHA512cca32f69620228b64b7b6e49338db0c67ec81bdeb4be10e546cf086a87388a16533fba8ca6f772c2babd586528a94d3ad37ce3294ebf2bec75a519b94d59b6e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\6be0ea5b-0c11-4491-8571-7ff62c7ad5ee\index-dir\the-real-index~RFe57ef32.TMP
Filesize2KB
MD55edbd2b285c5613621410e349ff8ea9f
SHA1532ba049cfeda8f937e894df3fe453f0300e3d44
SHA25697332fe5321cf3dd95c09509bbd80ff09dd59c0beffd016309a40d4a2ab522bc
SHA5121149ce82f78ac3b7c1ecfc79bdd0468e76cb96a706d690202e4586f775d44cef980f6e6f0126d1338b12f08ce801e83172fe26cddabd1067ad677a642a61bfe9
-
Filesize
40KB
MD5b8d677a3dda9a276e8153fc13c5355ea
SHA1ace0f62e497b1d28a4e97928cb204ac61c083f4b
SHA25607a614b16b1316f54f2c60b1c38fcd752f52869d5b0cb6768b13970a3069bc5f
SHA512bac7e96e3fe5741e7cac21a2c8de8e06443f899158c657af2c62c2ad0cc034f3431b90574b796bb223e02e7998240bcfcd7cf33bec1bd1296115da0277a3da0b
-
Filesize
62KB
MD54c9f95e17667ee6571c1e955cc58352d
SHA1d7d0ba1f54d9c18a325ae7aa6e875b63a4eb230b
SHA256c9309e74c9db045b518020cd7de45b9d489eb6e7a811a0e3646bceb471167820
SHA51237457f689b3fb035e2c36a1f89e1758856ee6c2d4eb4af83e851166f3f111d77309db977aaebac4bab83ed9f0a71e121c14fb1975c3e676cf8ae2e8326b29e21
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
280KB
MD56c238bd3176c3a08e0faea75d0f94ab5
SHA1d0ef37edebb79d678192955f38f928584d86dc31
SHA2561a1a1ae6629e23532f67cc01444f983971fbf050302e0a6fcf50b12570c90d89
SHA51240381ec59f46e340f40869a69dcdd235137080b1ce84be4a00ae8897ce6fdc7a334dca8fa4c2d136697650693e43b553e53a7d6ffbd45cf61df946cfa5a3a8e2
-
Filesize
61KB
MD59037762495ae581d827403dc640287d3
SHA1a467d0f1d1f3da913ab71c99823fe52e78f728f7
SHA256ecaf8f7b38fd43f4f42839194e3a305b7f57514503fe84052011c49e5dfd5c51
SHA5127d471ce7c2ed6f7a8818416bd3ce62b43056fdd68416f4192b65db4c5c666d6af63b4eee19645f12e5790dd1cd8427d66093a5e507801749ee09eafebd31eb2f
-
Filesize
99KB
MD52c5b82547a1ab667eef9b5cec43041de
SHA13c7a43242145bec204a2e7d831661029c589ee23
SHA2562f2cf32cb08bd97f87a4ac57d7a1516980da16eedbbc3458c8d91a237d022ef4
SHA51236014fabd18f3581324c9c565e452a3f46a7510270b2985831a6a4da2853a148c034e2491eab1d75d7a26c821eef37c87ca87697d5718eb025af0f6e2d06d0c9
-
Filesize
119KB
MD51e5217963534318739028ead0d007d23
SHA187542058c488cfc4b72de4d1f37a5368a429c77d
SHA256658259006fcfec417e6b464de8fb5ed275646405cdad3a2bae8a5b6a08841631
SHA512cda1ff394a5fd9e055168d38ce6f6761189c4db2037f8711ae0ba550bbc2ebee90e5be71aabd35d63c719fd644709b099386cd7de1e02cf9bd1d9a4382918d27
-
Filesize
58KB
MD5216e51f4926d2d948bdb519c3f396e10
SHA1f57672967feea8533b07c4077ef6cfd96671d5b2
SHA2562c35964b5a2f3f3c109481d8338daddd92fbe2fd1bcaf331b440898c8c28efea
SHA51293a8e992db5f2c787ed65e3fdba879fbcf552cc90f52c0fee19bee065cf235b5f1e3282b549251bbb281e054ad6ae06d4c475ed7252462bfcf2551a29f4aee3b
-
Filesize
61KB
MD5f47a82e9b9c7ed76648c38887c2eb0e8
SHA1fa6b31a84e3e5ec2e6869d5fcc222831ea1dc330
SHA2566399993126acdf239833c5e5f8ba549aa5dda9201a3f10a5de57199f4363c21d
SHA5121656eb8cbbaeb8558448fe93763f8ddeab9f51225ff47a7dfd49864c783e9bb153e6467f2f7e4d4566a6a8dab5ae28119e3bc8a082fd4907107bbe3d4e3fd080
-
Filesize
112KB
MD5be71b3eb9230955bd352cc92e5d276c1
SHA1f8bdb1f9abc1376fcd494c1c16cdc7197e2a9ec0
SHA256f56637d5a317720e9225cfa67de6f9cea9f53ba9e0b5e0bba8b0c9fe51cec455
SHA512c63f91afd83e1521e432ea8d33fd92cff1f3cec134dc0814eb1152c74d0c1339bc425c4d097c4c9671ebfdc96136a6ad0f51e95fad914afe3f1f96263146f8e5
-
Filesize
1KB
MD569f403d0eff18354415a970ac44d3cd9
SHA12a79d3b77df9f420673d2c779068461c6cef139c
SHA256b5def29d95f2f37ca33f57c0613faafdfdcab3c9f1f6ac09759911867cbc06f5
SHA51292f7b9dc2f2de83391a7afc0bd0f92d7e0d3a0ec5a679b7e49f1aa150d6db635818ee0f068a33d364d6e80df3c05cbf8ce1abcd991227a1ef695ad158fa6bebf
-
Filesize
93KB
MD534337428bdfeef8717c5340f1acffdab
SHA14c3ef2859a65309bb4e4b3aaa7502656c362b165
SHA256f30bed810527a82f2566b04d1b6bcb7c62c04af662149ee8b63d7c5ede3716d0
SHA512235980fe6369a1af4c63bc87d5de8ee16837cd15e6db273b1e3a483ab1f9900f1386dc2bc283725f3297a3aed635d492ad0fb6c1ef73eb532cb9e121a42245f4
-
Filesize
82KB
MD5a959dd26fb0b148c6d118a92429ea87c
SHA1124cb6c9cf860dd391cd66d053b977d4e4b73819
SHA25693b6c66744658b09bb58ff1d8a37a4fb393c2b29e4eac1c0ab16b017a5062961
SHA5125a993a48cc9ceb24dbc68435d682546793006aa7aa06027a0915149e958fa10a317df504f66a423b0906f961f6d51dddc2b94697669a5177f8b90553f6047584
-
Filesize
14KB
MD5a2beee25a217d1825e523a3072414152
SHA196fd3d8234d47ff0b3942fbdb752715045be68d9
SHA2560df3c06b19f06e242fd4f98e91c6bf6f035e3200a9db03f4975100e482aeb01a
SHA512d5f154bedf6f3face0d5cc88ee397057c860285e47a9e7d0a284a72db4668b7aef3c98ab4a33932ec1b953bf959f82ab843add8ce2bf4eaef29f00b210fb6989
-
Filesize
78KB
MD522e7d61a19bffde28238eb0426ed252c
SHA12f84a1ffeb6052cfeba1608beb70621267bb32a6
SHA2565117e3cb15cc8381f9185a86eaa38487e4a36007079e1bbaa87fea6bfaac44b7
SHA51259c7bfd1d78fe1a75eca6099929dafafb763867d03ce4f6c94a4305219b7a758b70058841e97d7dbdbbe522b471df15efeae5e2f168915c361c2b59da0a0f841
-
Filesize
89KB
MD522406d2f4a9a6addb5cf916eda59fc1e
SHA19253db29f04d25ca675e3b886755d2a2ec2405c9
SHA256d51c8f3837b731af5e7d69eee93e9de71a839adbfdd582fde804732209ddb051
SHA512f15e3b9ebfab9375cbac4be0519e0644c5882523380b44e20f7e2bf21104bdcbe0ecb5a1d59ee85e4b8899490e53c571b68df2ebe7d6bf8e93fcb31982017035
-
Filesize
121KB
MD55ef05b82f84e68a3f85b1bda6e9128c1
SHA16d81073b15752e67daeb7b6efe73dc8067f5c250
SHA2561c7f571ea3f2665940b209cd6f13c7e0054a334dfc7a5a328d31b1b93ec00665
SHA512300960bacae9bc2c8fe589166dad7bee02c57db4661eae3d72d303f488f286f3e06cef6a1ecb3328d3ca570d2466097b408da5b672679f08f5bc620b3af2a299
-
Filesize
72KB
MD5977869d4d15b8fca4917059d9c7b02ce
SHA14879e990add8303549e79479e39e41e1a9de36cf
SHA256e1e208351cef88030ffefa96877b005a3d72b8bea475da65c22dd11ab8bd38ba
SHA512a597cfeac51799c706228624790f15430335227211f2e74d564788e728be46e1a9d96f1df1f2585973155156bbd3ae6b5d5256cfc6563eedcb1e74f9453be263
-
Filesize
54KB
MD577c02ece79ae548cd628b1736f332521
SHA16a18c88c735e6b37a1241aa1ed55b9b159545cf8
SHA256f411cf6678cb722690c1a7477b1a204e7826953d2c7058d9aa8f8f2b0ec4e62a
SHA512927d3bcfc40c2e0aca0354dcde6f4075c1fb33321948c1862fc9cb558c9a90dfab4260af71340954700f3196f7ff8223d7b8150bd2af26174c0c3636840c648c
-
Filesize
42KB
MD5e7eb568dc0beed154f2733b165fd6f83
SHA178e32254b2fe3ebd01ed75a922da241f680c3419
SHA256a497a8270093ed44f18e81e68eed22b5a626e7abbb0093fde63034ef0382fbe9
SHA5122f8b78f15ac83ccf66b950d3c5a752023b5f9fc22fbc8e84d7dadd07c0ee42c2482d82de59a41f0eac732f33b5d75c559d50f029014f7ac955b9d99d8efccc5a
-
Filesize
62KB
MD5ff526ff553503d407138373a04f18123
SHA160ec43141ae4fb55e60baa80e466e2bdb3287189
SHA256def1687f5f21a9239a2175363a74e2b729e247468aa72ac4a8b80c8f77d309bc
SHA512448a769fa14fca646e93a7b8c78da791bfe650c1c47de9f323185ae3bfdb65b7a5e82ba879c737df4a50f7805ed0b04a067ad59d13ba96b863a0bf0f222f3080
-
Filesize
478KB
MD56194690737f0b608d390bfff4c915c69
SHA1db2f1f90f974e3b2cfe4baf6b8e1bd3ae3baf2a1
SHA256406439e9dbd75d454921f3d6e3206864bb8e961a94d55db3c425597314d8daa7
SHA5129cdfc0aa8cdbbd12aa35cdd5e0648e4d9029568599ee2bcd944488c7a173855962288890f4de4ff832babfde05fc1f01daaf94d2d306c9388b72baa676e99874