Analysis
-
max time kernel
131s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
crypted.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
crypted.exe
Resource
win10v2004-20250314-en
General
-
Target
crypted.exe
-
Size
1.2MB
-
MD5
b12e6c33aaa13c1e79772ef9817c69f7
-
SHA1
e8d7ad2964419f9324e37016e5d6e2763184ad62
-
SHA256
37fe77ebb9e0a268328482308d6779b0f5f08e4553833c9ac2da10492a55e8b3
-
SHA512
c24f6a289c36d57396b3287a9db981280eadf84be583359d0d01ab4ee4553b80365134dca62c89ad7575e07e3c039aa10f4a2d37d230e81660f46a287b8a95eb
-
SSDEEP
12288:VGQn7ZDgpAW8VTOzIUfVX5CF/ED2Na1n+gaG7rOqKa5OxaOlt1HZEzoYBcOxzKO5:Z23rzD2NaVDgdfE8Ac7BFUNppZwrlUR
Malware Config
Extracted
vidar
13.3
00cb84c6bd4caac4bdfc1131beae4df7
https://t.me/lw25chm
https://steamcommunity.com/profiles/76561199839170361
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Signatures
-
Detect Vidar Stealer 44 IoCs
resource yara_rule behavioral2/memory/4364-0-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-1-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-2-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-9-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-10-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-15-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-16-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-19-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-23-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-24-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-25-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-29-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-30-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-79-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-377-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-378-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-379-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-380-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-383-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-387-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-388-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-389-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-393-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-402-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-610-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-655-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-658-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-661-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-664-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-663-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-662-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-671-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-672-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-676-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-677-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-684-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-685-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-689-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-690-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-694-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-696-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-697-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-698-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/4364-706-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5816 msedge.exe 4536 chrome.exe 1408 chrome.exe 5508 msedge.exe 5044 msedge.exe 2592 chrome.exe 4552 chrome.exe 1704 chrome.exe 5980 msedge.exe 6120 msedge.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5488 set thread context of 4364 5488 crypted.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2152 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133878396896758425" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4364 MSBuild.exe 4364 MSBuild.exe 4364 MSBuild.exe 4364 MSBuild.exe 4536 chrome.exe 4536 chrome.exe 4364 MSBuild.exe 4364 MSBuild.exe 4364 MSBuild.exe 4364 MSBuild.exe 4364 MSBuild.exe 4364 MSBuild.exe 4364 MSBuild.exe 4364 MSBuild.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 5508 msedge.exe 5508 msedge.exe 5508 msedge.exe 5508 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 5508 msedge.exe 5508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5488 wrote to memory of 4364 5488 crypted.exe 87 PID 5488 wrote to memory of 4364 5488 crypted.exe 87 PID 5488 wrote to memory of 4364 5488 crypted.exe 87 PID 5488 wrote to memory of 4364 5488 crypted.exe 87 PID 5488 wrote to memory of 4364 5488 crypted.exe 87 PID 5488 wrote to memory of 4364 5488 crypted.exe 87 PID 5488 wrote to memory of 4364 5488 crypted.exe 87 PID 5488 wrote to memory of 4364 5488 crypted.exe 87 PID 5488 wrote to memory of 4364 5488 crypted.exe 87 PID 5488 wrote to memory of 4364 5488 crypted.exe 87 PID 5488 wrote to memory of 4364 5488 crypted.exe 87 PID 5488 wrote to memory of 4364 5488 crypted.exe 87 PID 4364 wrote to memory of 4536 4364 MSBuild.exe 96 PID 4364 wrote to memory of 4536 4364 MSBuild.exe 96 PID 4536 wrote to memory of 4404 4536 chrome.exe 97 PID 4536 wrote to memory of 4404 4536 chrome.exe 97 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 2120 4536 chrome.exe 98 PID 4536 wrote to memory of 3408 4536 chrome.exe 99 PID 4536 wrote to memory of 3408 4536 chrome.exe 99 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100 PID 4536 wrote to memory of 1992 4536 chrome.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\crypted.exe"C:\Users\Admin\AppData\Local\Temp\crypted.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb9a24dcf8,0x7ffb9a24dd04,0x7ffb9a24dd104⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2004,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1996 /prefetch:24⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2244,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1616 /prefetch:34⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=1960,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2524 /prefetch:84⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3268,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3280 /prefetch:14⤵
- Uses browser remote debugging
PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3320,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3616 /prefetch:14⤵
- Uses browser remote debugging
PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4296,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4288 /prefetch:24⤵
- Uses browser remote debugging
PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4672,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4692 /prefetch:14⤵
- Uses browser remote debugging
PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4712,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4668 /prefetch:84⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4984,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4996 /prefetch:84⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5276,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5284 /prefetch:84⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5452,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5500 /prefetch:84⤵PID:5472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5696,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5688 /prefetch:84⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5500,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5512 /prefetch:84⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5392,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5780 /prefetch:84⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5368,i,2507080807817202055,7518337304575189649,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5764 /prefetch:84⤵PID:1968
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ffb98e8f208,0x7ffb98e8f214,0x7ffb98e8f2204⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1944,i,320491873833492414,9796271447162144623,262144 --variations-seed-version --mojo-platform-channel-handle=2256 /prefetch:34⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2228,i,320491873833492414,9796271447162144623,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:24⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2536,i,320491873833492414,9796271447162144623,262144 --variations-seed-version --mojo-platform-channel-handle=2704 /prefetch:84⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3600,i,320491873833492414,9796271447162144623,262144 --variations-seed-version --mojo-platform-channel-handle=3640 /prefetch:14⤵
- Uses browser remote debugging
PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3612,i,320491873833492414,9796271447162144623,262144 --variations-seed-version --mojo-platform-channel-handle=3660 /prefetch:14⤵
- Uses browser remote debugging
PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4184,i,320491873833492414,9796271447162144623,262144 --variations-seed-version --mojo-platform-channel-handle=4280 /prefetch:14⤵
- Uses browser remote debugging
PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4252,i,320491873833492414,9796271447162144623,262144 --variations-seed-version --mojo-platform-channel-handle=4284 /prefetch:24⤵
- Uses browser remote debugging
PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3800,i,320491873833492414,9796271447162144623,262144 --variations-seed-version --mojo-platform-channel-handle=3820 /prefetch:84⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5328,i,320491873833492414,9796271447162144623,262144 --variations-seed-version --mojo-platform-channel-handle=5344 /prefetch:84⤵PID:5452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5036,i,320491873833492414,9796271447162144623,262144 --variations-seed-version --mojo-platform-channel-handle=5608 /prefetch:84⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5544,i,320491873833492414,9796271447162144623,262144 --variations-seed-version --mojo-platform-channel-handle=5632 /prefetch:84⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6232,i,320491873833492414,9796271447162144623,262144 --variations-seed-version --mojo-platform-channel-handle=6256 /prefetch:84⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6232,i,320491873833492414,9796271447162144623,262144 --variations-seed-version --mojo-platform-channel-handle=6256 /prefetch:84⤵PID:5828
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\lx4oz" & exit3⤵
- System Location Discovery: System Language Discovery
PID:3408 -
C:\Windows\SysWOW64\timeout.exetimeout /t 114⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2152
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2548
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3520
Network
MITRE ATT&CK Enterprise v15
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD579f731db98ac3d4b4298232586c40be4
SHA1e34e78eeb5059c07047bc96727e8af0fc22bf5b8
SHA256ad28fbab96745c41a6d650a35b300bac54f36216ff0dab86438312a0f24f2710
SHA512961f09928fa0650f795fd16620e6843de05bff8121c140aa4e1681a85a1bba427a7e0f9eee837597fb8e7f0ca4cd91e55f2866b6c881ab507b0049229dd8ad5b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5a4dc58cb82230a90d7e3d0779fc33382
SHA1b99cfe0a9384f5df1436abc24724b33241c735f3
SHA256000be5685e98c106316514bcb9f6d1d91ef015cc1e0c4799c7402ab736990c52
SHA5121bee23d551e426759803b0d33d7adc566e00e3b521867a4c208ce3a36e1a21b3b7a7315ff98032bf3d59ec14181a5fb238e0d3202d648be5a3b263ad5bd98822
-
Filesize
280B
MD5eec55fe349980566b1dbf1d409d28c3e
SHA1654ce4b550defea0851f12e8ff81ae9298bb3f60
SHA2562e81ea3d7ddfc0274f3955d5131143c481e63f2529514c5295873b393d508efe
SHA51258e02658d08732b5f36e868331a483b5fde15475a6c5f704a19c97d920399c3f7d41a8fa163c66683bf403598f8f48f0cf9fa468f9783fcabd9136a55cec0059
-
Filesize
280B
MD55a7e1750438748bd333b79a94ca69b2a
SHA194fd1be56969e269ce195ba29c3d464d356d6556
SHA2566d7a64a318c25c643323d5cf1c0c80ccf2f2433e7d74b722fca90468f8f9b914
SHA512842509c0f495ee24d152ab3f7867183d7cd64b01b5a9305405682abbbff3aa18a8ad7d97ee039393fdd1766fc17ad2df1caf711dc4db8dc7b9df608ffc0fdc7e
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b6a380d4-5862-40a9-a645-ceea7f421bc5\index-dir\the-real-index
Filesize1KB
MD592844bee65899f98903feaaf0880894b
SHA110d15ace9e74c013706d8db6226ab6c45a801d78
SHA256cf1c86c1cb855fd023cbf585acaa16d39c379e28f46d0efb4b1d6a1fc8205e5a
SHA5128677adbede8ea1e4583edbcea55983c28875e557fd714db1ba6d93dd30618f8a1663e31a00f385ba17508238422c3d5148c0219ae40487d44463edc0b940f473
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b6a380d4-5862-40a9-a645-ceea7f421bc5\index-dir\the-real-index~RFe57d9f5.TMP
Filesize1KB
MD545073460f2fe54df91d8b0eb2307c34b
SHA17190a0078d3e9c3f0c2c35b303d602ee2f2698cb
SHA2564aac9073e66d19eb88b75d495a2fd572112494445e4a62423da907aaac36a77d
SHA512437e8abeef21cb058e99d5fc394b233ebb484d4c2ce50d0adbbfdcd41dd2f6ad93b1ec816bd27562ff046cac3aa200629175816f48d9722b8257b92274d14e3a
-
Filesize
4KB
MD5ce96d54042b58e999efe5a09e53dd2c6
SHA14a29c7a5498cfe68c219f0776d081c7a82445d85
SHA256c546aac5f42e25fc5e5a366319b79530b955712169cc2ee9cc01329f209b4ae6
SHA512e86213c148d2e212c6427aa4aad8b2f4897c4f1e579808e2063494ab6f289945c0a42ad615e69c21cda4f40dfcd5716aaac78d719cb92adaadb798eac17c44e7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a11c0ec5-13c0-4a19-ac94-fb473cdb40eb.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
6KB
MD57c2fef4b74e8edcadfdb7a74467fc9c4
SHA1d2ebd6dd600257f1a49952e28b05164ae5314207
SHA2564b02bb093eb0fac1d44ce8f5f3611a5205ccddc97ea3e7476d1f266e2e4bf30a
SHA512f312d9f512fb252b64eee4268e21587828fd58a1961fe8ccd4650774df954ae6723fb9809915ef63ec5fddc90a66e0cbf0eb99d9313a0369c482bc6d87cde51a
-
Filesize
7KB
MD5f56db3435090f4db29fb6bc508f1c567
SHA1441c92cecc342e217c1b5a3f408cf63fd4278790
SHA25679cd031e8a4f01bf8bb5c3fe1bda0b08cb464737f82bc4682a96be6924343ea9
SHA512651f0d76f5d6cc05ba9dcda773a16de441eb561b38403c2b5aa514443e6338c84c6ca96c9ef6ae34db5351bdf305175097b9d975bd11ff0c7b83c1f995476cf7
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD529084d06670ba64a93ab1ebe1d126eac
SHA1eff4248747041d365212e59762d4bd948cbcca12
SHA25684e84e485985dcc67ea35af201fd3d04cf3e09eaefd11f112969cd5b819d9622
SHA512adfd6ebd14cf17c68ef0df09d0250907d6df194e0e0ca60fd599b9a203801fde405b1f2e57c9cb57a2261a111ec9878e95500552d42800b2587ac11abe35d88b
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de