Analysis

  • max time kernel
    86s
  • max time network
    90s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29/03/2025, 23:34

General

  • Target

    https://github.com/xsplitst/RGF

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/975244014364270683/FZnH_sfT1E7Axl_7pfCffp86xK6BWVM_UXXb74CN2p4kpHxH_6kuQsuzlglxNPVfnIm6

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Mercurialgrabber family
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 3 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 15 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/xsplitst/RGF
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x25c,0x7ffce3cff208,0x7ffce3cff214,0x7ffce3cff220
      2⤵
        PID:3320
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1892,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=2652 /prefetch:11
        2⤵
          PID:3140
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2616,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=2612 /prefetch:2
          2⤵
            PID:1028
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2184,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=2660 /prefetch:13
            2⤵
              PID:788
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3484,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=3700 /prefetch:1
              2⤵
                PID:5116
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3496,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=3736 /prefetch:1
                2⤵
                  PID:1904
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4032,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=4036 /prefetch:1
                  2⤵
                    PID:2300
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4092,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=4056 /prefetch:9
                    2⤵
                      PID:2356
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=4164,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=4276 /prefetch:1
                      2⤵
                        PID:1756
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=4180,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=4588 /prefetch:9
                        2⤵
                          PID:1232
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3808,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=3888 /prefetch:14
                          2⤵
                            PID:624
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3840,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=4072 /prefetch:14
                            2⤵
                              PID:3528
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5424,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=3804 /prefetch:14
                              2⤵
                                PID:4744
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5168,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=5236 /prefetch:14
                                2⤵
                                  PID:4904
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6036,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=6064 /prefetch:14
                                  2⤵
                                    PID:2352
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.exe
                                      cookie_exporter.exe --cookie-json=1144
                                      3⤵
                                        PID:8
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6080,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=6136 /prefetch:14
                                      2⤵
                                        PID:2292
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6080,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=6136 /prefetch:14
                                        2⤵
                                          PID:4184
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6016,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=6276 /prefetch:14
                                          2⤵
                                            PID:1796
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6256,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=6440 /prefetch:14
                                            2⤵
                                              PID:3280
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6568,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=6428 /prefetch:14
                                              2⤵
                                                PID:2292
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6480,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=6440 /prefetch:14
                                                2⤵
                                                  PID:3768
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6772,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=6764 /prefetch:14
                                                  2⤵
                                                    PID:4892
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6920,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=6940 /prefetch:14
                                                    2⤵
                                                      PID:3548
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6928,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=7100 /prefetch:14
                                                      2⤵
                                                        PID:440
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7120,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=7256 /prefetch:14
                                                        2⤵
                                                          PID:3564
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7284,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=7296 /prefetch:14
                                                          2⤵
                                                            PID:2392
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=6820,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=7256 /prefetch:1
                                                            2⤵
                                                              PID:3740
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6884,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=7604 /prefetch:14
                                                              2⤵
                                                              • NTFS ADS
                                                              PID:4024
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7768,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:14
                                                              2⤵
                                                                PID:4444
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7248,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=4148 /prefetch:14
                                                                2⤵
                                                                  PID:624
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6768,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=4140 /prefetch:14
                                                                  2⤵
                                                                    PID:1296
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6496,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=7452 /prefetch:14
                                                                    2⤵
                                                                      PID:3564
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5908,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=4204 /prefetch:14
                                                                      2⤵
                                                                        PID:2544
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7588,i,13533396628618499181,2383818084534377569,262144 --variations-seed-version --mojo-platform-channel-handle=4620 /prefetch:14
                                                                        2⤵
                                                                          PID:4560
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                        1⤵
                                                                          PID:2964
                                                                        • C:\Windows\System32\rundll32.exe
                                                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                          1⤵
                                                                            PID:3248
                                                                          • C:\Users\Admin\Downloads\RGF-main\RGF-main\RBF.exe
                                                                            "C:\Users\Admin\Downloads\RGF-main\RGF-main\RBF.exe"
                                                                            1⤵
                                                                            • Looks for VirtualBox Guest Additions in registry
                                                                            • Looks for VMWare Tools registry key
                                                                            • Checks BIOS information in registry
                                                                            • Maps connected drives based on registry
                                                                            • Checks SCSI registry key(s)
                                                                            • Checks processor information in registry
                                                                            • Enumerates system info in registry
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2940
                                                                          • C:\Users\Admin\Downloads\RGF-main\RGF-main\RBF.exe
                                                                            "C:\Users\Admin\Downloads\RGF-main\RGF-main\RBF.exe"
                                                                            1⤵
                                                                            • Looks for VirtualBox Guest Additions in registry
                                                                            • Looks for VMWare Tools registry key
                                                                            • Checks BIOS information in registry
                                                                            • Maps connected drives based on registry
                                                                            • Checks SCSI registry key(s)
                                                                            • Enumerates system info in registry
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:4100
                                                                          • C:\Users\Admin\Downloads\RGF-main\RGF-main\RBF.exe
                                                                            "C:\Users\Admin\Downloads\RGF-main\RGF-main\RBF.exe"
                                                                            1⤵
                                                                            • Looks for VirtualBox Guest Additions in registry
                                                                            • Looks for VMWare Tools registry key
                                                                            • Checks BIOS information in registry
                                                                            • Maps connected drives based on registry
                                                                            • Checks SCSI registry key(s)
                                                                            • Enumerates system info in registry
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2796

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            f9fd82b572ef4ce41a3d1075acc52d22

                                                                            SHA1

                                                                            fdded5eef95391be440cc15f84ded0480c0141e3

                                                                            SHA256

                                                                            5f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6

                                                                            SHA512

                                                                            17084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                            Filesize

                                                                            280B

                                                                            MD5

                                                                            02cf1313b32a8ab2f031cee39bee8fc3

                                                                            SHA1

                                                                            861cc0ab9ff881460dd6433e37075b822aac9355

                                                                            SHA256

                                                                            7e7fd13903a8d57f314d9e7dab6fa28975050b63f045eb315e96cccaa17d1e61

                                                                            SHA512

                                                                            f5464c94391bfb590f6755c2ae6896dd459a2a93d778601caebf272438c2ff127ec5de81dcf8efeec65a56609558477afc7be1c4993977a18fde7b915f7a8700

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                            Filesize

                                                                            280B

                                                                            MD5

                                                                            8165d331a65e980c7f75dba657342854

                                                                            SHA1

                                                                            44967c0388744de38b07e07e3a9cb174854eb7bf

                                                                            SHA256

                                                                            08d7b1fa1c3cdacb73cb9b34bb51a0516bfeac2f10ec54f2f27469d1c97820a9

                                                                            SHA512

                                                                            ee23180ed03c5042d6e6343ac2181a6d9ffbbb775e1031222e46b4a61eca4f1caf2dab50269271a07b284e270195595c91ce8c43d4cef77c8873845216546e54

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            069455bc4d13ece6f7f88e8e7e42c1c7

                                                                            SHA1

                                                                            ffe3201d7e208ebac8956ae3f5ae23dccdbd65ba

                                                                            SHA256

                                                                            95aa1558956acf796418ed79b88c923760ad51cc1426d87f9f7050313c7d65a7

                                                                            SHA512

                                                                            e3e6577a35ae7312e8dd221d1fb1f9a1b22b93341181ad115525399495a797382ef1d0b8cae3cebf83e9d3e7084626043f7f50ae6f2da7b912527ab9038a1b26

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                            Filesize

                                                                            69KB

                                                                            MD5

                                                                            164a788f50529fc93a6077e50675c617

                                                                            SHA1

                                                                            c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                                                            SHA256

                                                                            b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                                                            SHA512

                                                                            ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons\coupons_data.db\CURRENT

                                                                            Filesize

                                                                            16B

                                                                            MD5

                                                                            46295cac801e5d4857d09837238a6394

                                                                            SHA1

                                                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                            SHA256

                                                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                            SHA512

                                                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\EntityExtraction\EntityExtractionAssetStore.db\MANIFEST-000001

                                                                            Filesize

                                                                            41B

                                                                            MD5

                                                                            5af87dfd673ba2115e2fcf5cfdb727ab

                                                                            SHA1

                                                                            d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                            SHA256

                                                                            f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                            SHA512

                                                                            de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js

                                                                            Filesize

                                                                            9KB

                                                                            MD5

                                                                            3d20584f7f6c8eac79e17cca4207fb79

                                                                            SHA1

                                                                            3c16dcc27ae52431c8cdd92fbaab0341524d3092

                                                                            SHA256

                                                                            0d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643

                                                                            SHA512

                                                                            315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            470b93d838ded6e951bd2794461eec0a

                                                                            SHA1

                                                                            9f25b95bfb195ad778f4e64bab423d009a0c34d5

                                                                            SHA256

                                                                            417e859a56607a6f1ed8408faaec4da06935926ab8a959d885c28bffb2a8fdcf

                                                                            SHA512

                                                                            81456f157b1adf5fc587844a36a581def4549e0ee32420db19331dd55de591936139cb41569dedabaf48c97b6f062d44ed28b9165c9f2a04647fa72721bc6bc7

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                            Filesize

                                                                            111B

                                                                            MD5

                                                                            285252a2f6327d41eab203dc2f402c67

                                                                            SHA1

                                                                            acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                            SHA256

                                                                            5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                            SHA512

                                                                            11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                            Filesize

                                                                            2B

                                                                            MD5

                                                                            d751713988987e9331980363e24189ce

                                                                            SHA1

                                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                                            SHA256

                                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                            SHA512

                                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                            Filesize

                                                                            14KB

                                                                            MD5

                                                                            e8ab86982f12e3bb56358b19a0c67042

                                                                            SHA1

                                                                            da4679449e545ff82a1901257f979e80d7787151

                                                                            SHA256

                                                                            726ed7c1ffe387a8ebd32edc0761cd7dfe51521a06de5e77ad5288eee41530f8

                                                                            SHA512

                                                                            32e29b49e2f7cf752010cc595d42159db57cf6c16e780019ef5e9019a74034e420b26f0d91a041828d296db68c4df8573d7c307caa4be13dbbacc4d2dc9adffe

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                            Filesize

                                                                            37KB

                                                                            MD5

                                                                            ae6f2594e0b90f3a05614a2062b7c8a2

                                                                            SHA1

                                                                            0380b8ea70c2bbdd59d62ebbae82277ce7af9aa4

                                                                            SHA256

                                                                            55b176336ec38aa6190ca80708f7410f3531a07772c4f1e9e736115b4cc51dec

                                                                            SHA512

                                                                            86d7a75e240a98c37fae448832b27e9cad86de57bd4c2ff6378a69c48aaff34897720e036cc9bc8ee42a2930db36868b7d2b08fdf2659a34ee33a7697791642a

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                            Filesize

                                                                            23KB

                                                                            MD5

                                                                            49c8179692c640611c3948fdf131f03f

                                                                            SHA1

                                                                            4da6dd60398c9845a10b18dc88c1f75cce19b4d1

                                                                            SHA256

                                                                            e055f131afcd7abd4003eb417203d8481e6c5e6430874a8cdcbf8ca33e79d88d

                                                                            SHA512

                                                                            69fe887d11983475d3a63ee6506cedca08418e32ba907dc6beb6847d6c1494b26ac9041e008fcdff35f3171c923d73d281e60eb5e1c6fda58afc806c64b035e6

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                            Filesize

                                                                            880B

                                                                            MD5

                                                                            f6ae3743b04dee9fe27c24b978d82d21

                                                                            SHA1

                                                                            23ba6ec39c705680c2b6735adb6e4cdf908b67ba

                                                                            SHA256

                                                                            2594b85442d2cebf45b42718d41e1ce6f55d47ab00befbf375ec551c172db6fb

                                                                            SHA512

                                                                            e13cccba6d157f92c3ee37a7b10df125d2e2ee4deb7507b2da49e02dfa0a9f396ad8eabff674f23feb234a0d57d974d255e211d693276c6e8f34bac98cd8babf

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe58966f.TMP

                                                                            Filesize

                                                                            469B

                                                                            MD5

                                                                            bc6dc5f9335fb6d56480e62ce0ee3672

                                                                            SHA1

                                                                            c25c4a68eaf5eb035d8a17220190656987643ca6

                                                                            SHA256

                                                                            b3c62753451cf9f29d8e92092411d81e0f84ba5832a04f257df521b4f75681f0

                                                                            SHA512

                                                                            1914cb192cbf73a847af782fc2fdfc0a7f07d55de5f1c5990db603bc0c3144c0cc449e32e7a27f0beefa91da437fa5c3fc11672535ff6e64c0f71a316991c8c3

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig

                                                                            Filesize

                                                                            22KB

                                                                            MD5

                                                                            56a63f182b2938fbe3e59fbf9681dc08

                                                                            SHA1

                                                                            b76578ca24fb20b8bd5dafad4296e5a46735a5e1

                                                                            SHA256

                                                                            36edc2510fb072092e4c6b95efe4521857d9dcb7f0b45afdf5e8ef02e5d19593

                                                                            SHA512

                                                                            b17246b7c61e26fce1f211311b578d6b3d22c03a042137bb2bb5b23018ce5290a8fbf7a34b2f66fa30b2027296b8a570478f66a144385c320d63c1cef64434f8

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe589759.TMP

                                                                            Filesize

                                                                            3KB

                                                                            MD5

                                                                            c7569efb2fa9fe93c0ea2f0896f54036

                                                                            SHA1

                                                                            e231c700b778b624f6065b035e5803fdd8b4db4b

                                                                            SHA256

                                                                            2422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f

                                                                            SHA512

                                                                            c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                            Filesize

                                                                            30KB

                                                                            MD5

                                                                            78c26d761ceed96a824b4c9903ca3658

                                                                            SHA1

                                                                            3b79b81c1b7cc1bdce6b80365335420bf198b353

                                                                            SHA256

                                                                            caa3359b079f7bae0044dce5d53b348eca956e46263010ac089f9eb7485605ca

                                                                            SHA512

                                                                            535d9f97aa6c96031f5a9a43c301f1bd10579ba663752b66d2e249de0550483cc46af81bec32166e1a7bf404a795a308aa51985448d3aaab23d949149f6f455e

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                            Filesize

                                                                            30KB

                                                                            MD5

                                                                            def29103b0595de3d06e407a187f50d5

                                                                            SHA1

                                                                            29cd96e369b55076d46a93b9da23fdf5d79a38e2

                                                                            SHA256

                                                                            8353bc55c6ddf490f8513a6127e60a00a2dc85e80a4f5e6ac9d7c38c8be72245

                                                                            SHA512

                                                                            e2c7bd09b7873a2e6fe2f0f638d589b9df8f8a6777ba91d72a21db273ea6cd4317b8442ef5c6f166bf6a003b5f36b94e9e86b1d7ff37309c6365aee7dd0a2389

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                            Filesize

                                                                            6KB

                                                                            MD5

                                                                            f829dfce17f111341e21910bce3ea7e8

                                                                            SHA1

                                                                            57f4a5c57b5aea351ab083d6fbbaf19cd8178365

                                                                            SHA256

                                                                            1b3e7f4f44a8db5c125f46b5011e4435d91dcfe82346ad8a897cfc0af9958e04

                                                                            SHA512

                                                                            43382e54a414a45ca73937869a7379384954251ecb69b5e8a141a7445fbffe84a55f10b5fc95da85309616e128faa460f0ef275f6744cf9197f529d31bd8c0cb

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                            Filesize

                                                                            7KB

                                                                            MD5

                                                                            5c4c0c68c0384a1a7d4f84193a79f2fc

                                                                            SHA1

                                                                            aa8965080ac3b8147c8f5cd3e4be8fc7e1c887af

                                                                            SHA256

                                                                            1b0f3366b6ceb6a898daf62ea727fa6e324b617c2935736aab73c39e60f62538

                                                                            SHA512

                                                                            9ed54129c77d748308662c7f1ad7bd100214bdf82b75bbe4774d434920835e903a4d7636072500b31b4bec784dbc5db56fcb9f09899e0040e1b2feb578abed8a

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                            Filesize

                                                                            39KB

                                                                            MD5

                                                                            5e5c3044751839e45bc03cdc8712834d

                                                                            SHA1

                                                                            6023eca7c3fa75f7cb7c4771ee69f2188f986229

                                                                            SHA256

                                                                            6801993e0f7ad8f9032b92873c15df7b692ec83e00577338b89a8ffaeeae2dca

                                                                            SHA512

                                                                            0a0dcc6af0cc71a777db23ed6fe4bcac19740d7fc8992ab85535b6fe28bed00d4355d24fc6ba04d91e760731d9619cad5bd5a97bad947ecc66449f2b8df28d7f

                                                                          • C:\Users\Admin\AppData\Local\Temp\7eca9218-1dbd-4853-abfe-b9f8aecfbf14.tmp

                                                                            Filesize

                                                                            10KB

                                                                            MD5

                                                                            78e47dda17341bed7be45dccfd89ac87

                                                                            SHA1

                                                                            1afde30e46997452d11e4a2adbbf35cce7a1404f

                                                                            SHA256

                                                                            67d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550

                                                                            SHA512

                                                                            9574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5

                                                                          • C:\Users\Admin\AppData\Local\Temp\a857af7f-9ca3-4f09-b437-c86837c4eddb.tmp

                                                                            Filesize

                                                                            152KB

                                                                            MD5

                                                                            dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                            SHA1

                                                                            d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                            SHA256

                                                                            fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                            SHA512

                                                                            65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                          • C:\Users\Admin\AppData\Local\Temp\b8d7d5e3-2fde-4f42-838c-e6adfeab0f60.tmp

                                                                            Filesize

                                                                            1B

                                                                            MD5

                                                                            5058f1af8388633f609cadb75a75dc9d

                                                                            SHA1

                                                                            3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                            SHA256

                                                                            cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                            SHA512

                                                                            0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                          • C:\Users\Admin\Downloads\RGF-main.zip.crdownload

                                                                            Filesize

                                                                            54KB

                                                                            MD5

                                                                            7bcc565dfb0ce789f9a984870a64414c

                                                                            SHA1

                                                                            7918e05800b7d02be5aa3670259709fde7f5c268

                                                                            SHA256

                                                                            33461d788a33b88bed3d489826f9fb766cae421f322b81c5eb861718a1dea7bb

                                                                            SHA512

                                                                            0490c139cd781e827fa35e55d21d887990febb2ab158baac005755ae1825904cf8f2971a10e75e135fa350c40ac841815ddeb2fd5c9da2d7b350e9c509f027b0

                                                                          • C:\Users\Admin\Downloads\RGF-main.zip:Zone.Identifier

                                                                            Filesize

                                                                            141B

                                                                            MD5

                                                                            41d49b09e778e0d06acdd589802e24f9

                                                                            SHA1

                                                                            c607649d4694697fe3c00189c49cb5b65a332ad1

                                                                            SHA256

                                                                            2ce855dfca046a8c190960a568ddd65cec9b1d86b9a375fc9b25e6968377b796

                                                                            SHA512

                                                                            782b1aade1fbe8811652441f8f7ed22f44e1b21002ffcaa2e288e35a69d046fd8c460bd4200b31785c2a76fdac271f629e1e2217818af49d1e238cf61dcb7588

                                                                          • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2428_2081520201\manifest.json

                                                                            Filesize

                                                                            134B

                                                                            MD5

                                                                            049c307f30407da557545d34db8ced16

                                                                            SHA1

                                                                            f10b86ebfe8d30d0dc36210939ca7fa7a819d494

                                                                            SHA256

                                                                            c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54

                                                                            SHA512

                                                                            14f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780

                                                                          • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2428_677942856\manifest.json

                                                                            Filesize

                                                                            43B

                                                                            MD5

                                                                            af3a9104ca46f35bb5f6123d89c25966

                                                                            SHA1

                                                                            1ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8

                                                                            SHA256

                                                                            81bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea

                                                                            SHA512

                                                                            6a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1

                                                                          • memory/2940-803-0x0000000000E40000-0x0000000000E50000-memory.dmp

                                                                            Filesize

                                                                            64KB