Analysis
-
max time kernel
134s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe
-
Size
1.9MB
-
MD5
ba7cfbfe4ee11ed0bb81a7b71de91922
-
SHA1
08f3a7cd51e1ea055ff7fbdcbd93c08b689773bc
-
SHA256
49c8db48c43861be5087f96e5f934f8f6e3a3931e75613fd87127fa29edd62f1
-
SHA512
3121d0f1e389d9f9b5faeebfa35e1a218f1a5c594beac41106c5cb85c5f6f7a6ffbab58035517833c36d6a42550156e19d0d832c80742264b4cdfb68d61175b6
-
SSDEEP
24576:NNI2LXlFLf2uee/0kd+mELBX11GyDXcOSbNpZw1lUR:LnFFytug1lUR
Malware Config
Extracted
vidar
13.3
23b8a0e48f77dc82cb41b2936121fd07
https://t.me/lw25chm
https://steamcommunity.com/profiles/76561199839170361
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Signatures
-
Detect Vidar Stealer 36 IoCs
resource yara_rule behavioral2/memory/552-0-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-1-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-2-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-3-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-10-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-11-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-16-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-17-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-20-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-24-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-25-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-26-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-30-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-31-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-73-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-370-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-371-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-372-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-373-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-376-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-380-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-381-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-382-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-386-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-389-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-729-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-760-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-765-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-767-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-768-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-772-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-773-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-777-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-778-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-779-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/552-781-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4592 chrome.exe 4000 chrome.exe 5840 msedge.exe 5156 msedge.exe 4744 msedge.exe 5964 chrome.exe 960 chrome.exe 4104 chrome.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5936 set thread context of 552 5936 2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 364 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133878608563509536" chrome.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 552 MSBuild.exe 552 MSBuild.exe 552 MSBuild.exe 552 MSBuild.exe 5964 chrome.exe 5964 chrome.exe 552 MSBuild.exe 552 MSBuild.exe 552 MSBuild.exe 552 MSBuild.exe 552 MSBuild.exe 552 MSBuild.exe 552 MSBuild.exe 552 MSBuild.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5840 msedge.exe 5840 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 5964 chrome.exe Token: SeCreatePagefilePrivilege 5964 chrome.exe Token: SeShutdownPrivilege 5964 chrome.exe Token: SeCreatePagefilePrivilege 5964 chrome.exe Token: SeShutdownPrivilege 5964 chrome.exe Token: SeCreatePagefilePrivilege 5964 chrome.exe Token: SeShutdownPrivilege 5964 chrome.exe Token: SeCreatePagefilePrivilege 5964 chrome.exe Token: SeShutdownPrivilege 5964 chrome.exe Token: SeCreatePagefilePrivilege 5964 chrome.exe Token: SeShutdownPrivilege 5964 chrome.exe Token: SeCreatePagefilePrivilege 5964 chrome.exe Token: SeShutdownPrivilege 5964 chrome.exe Token: SeCreatePagefilePrivilege 5964 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5964 chrome.exe 5840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5936 wrote to memory of 552 5936 2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe 85 PID 5936 wrote to memory of 552 5936 2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe 85 PID 5936 wrote to memory of 552 5936 2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe 85 PID 5936 wrote to memory of 552 5936 2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe 85 PID 5936 wrote to memory of 552 5936 2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe 85 PID 5936 wrote to memory of 552 5936 2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe 85 PID 5936 wrote to memory of 552 5936 2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe 85 PID 5936 wrote to memory of 552 5936 2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe 85 PID 5936 wrote to memory of 552 5936 2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe 85 PID 5936 wrote to memory of 552 5936 2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe 85 PID 5936 wrote to memory of 552 5936 2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe 85 PID 5936 wrote to memory of 552 5936 2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe 85 PID 552 wrote to memory of 5964 552 MSBuild.exe 96 PID 552 wrote to memory of 5964 552 MSBuild.exe 96 PID 5964 wrote to memory of 3504 5964 chrome.exe 97 PID 5964 wrote to memory of 3504 5964 chrome.exe 97 PID 5964 wrote to memory of 2312 5964 chrome.exe 98 PID 5964 wrote to memory of 2312 5964 chrome.exe 98 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3188 5964 chrome.exe 99 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100 PID 5964 wrote to memory of 3852 5964 chrome.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-31_ba7cfbfe4ee11ed0bb81a7b71de91922_black-basta_cobalt-strike_ryuk_satacom.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff81e2edcf8,0x7ff81e2edd04,0x7ff81e2edd104⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1992,i,985569186409680110,6887971411379443956,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2056 /prefetch:34⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1996,i,985569186409680110,6887971411379443956,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2008 /prefetch:24⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2396,i,985569186409680110,6887971411379443956,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2080 /prefetch:84⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3252,i,985569186409680110,6887971411379443956,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3276 /prefetch:14⤵
- Uses browser remote debugging
PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3224,i,985569186409680110,6887971411379443956,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3260 /prefetch:14⤵
- Uses browser remote debugging
PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4272,i,985569186409680110,6887971411379443956,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4296 /prefetch:24⤵
- Uses browser remote debugging
PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4524,i,985569186409680110,6887971411379443956,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4664 /prefetch:14⤵
- Uses browser remote debugging
PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5256,i,985569186409680110,6887971411379443956,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5276 /prefetch:84⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5468,i,985569186409680110,6887971411379443956,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5480 /prefetch:84⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5636,i,985569186409680110,6887971411379443956,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5576 /prefetch:84⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5760,i,985569186409680110,6887971411379443956,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5772 /prefetch:84⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5352,i,985569186409680110,6887971411379443956,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5576 /prefetch:84⤵PID:5844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5464,i,985569186409680110,6887971411379443956,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5340 /prefetch:84⤵PID:1308
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x260,0x7ff80f21f208,0x7ff80f21f214,0x7ff80f21f2204⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1404,i,11049788183648184819,15494591080573500710,262144 --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:34⤵PID:5896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1828,i,11049788183648184819,15494591080573500710,262144 --variations-seed-version --mojo-platform-channel-handle=2100 /prefetch:24⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2528,i,11049788183648184819,15494591080573500710,262144 --variations-seed-version --mojo-platform-channel-handle=2684 /prefetch:84⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3552,i,11049788183648184819,15494591080573500710,262144 --variations-seed-version --mojo-platform-channel-handle=3612 /prefetch:14⤵
- Uses browser remote debugging
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3560,i,11049788183648184819,15494591080573500710,262144 --variations-seed-version --mojo-platform-channel-handle=3644 /prefetch:14⤵
- Uses browser remote debugging
PID:5156
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\2v3w4" & exit3⤵
- System Location Discovery: System Language Discovery
PID:696 -
C:\Windows\SysWOW64\timeout.exetimeout /t 114⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:364
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2380
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3620
Network
MITRE ATT&CK Enterprise v15
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5e051fce095755e21865454427419ae2e
SHA1a88434e3f9fd536abdfd9b14956667839e8c4f71
SHA256ebb8ed1c4223edcd6014ae0dd4529896fb5fc3a64cbff693aab0e1e0d3198492
SHA512af321e6d8fa2be5ae4ec857dcf455d42b828950d8491f308427cf2b6a1bdd76c27d4eabf248f3b373f933611d88ee1a826d791507f25a39997cf54fdf9bd859b
-
Filesize
649B
MD502f03df4e8aaab72f3deee0e8eaf3097
SHA1c3b2545128e27cdfa31ccddb49da8881dcc1f8c1
SHA25685d3a3b5fb7324a98a0db6973d260fc4d43e38695dc927112f5b20e2acb33b43
SHA512e233d8e805ce43b56959c58e6497b6cc39edeef5cb26b44fcda94b1f4be2b91c5fba0c5a7add79332cf0c865b623521debcf64facbfbf88d6b9ecc8de305b6ac
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5eb5ffe1d1fc378ba18b2f6356ca80fae
SHA12bb2bc56b2ca1666e7f8cf50a5db809cdd032773
SHA256cb308dd096b9723b73372dcfc98043daf6210ce95fc87a67018fdf77dd41d197
SHA5122f0242a8bbc1c6518316372eb587f42f37371922de1606ca3b85c0b178004bb60bb9e4e1a485caa8bb4d72aa775eaf7c52ac096277c1e08adb8d12cfd1be7450
-
Filesize
280B
MD501cc3a42395638ce669dd0d7aba1f929
SHA189aa0871fa8e25b55823dd0db9a028ef46dfbdd8
SHA256d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee
SHA512d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD5e831c3d98d722e306a897251228457b7
SHA13c2ca0aebdb084f98f367d08f6281a4f5dd1df62
SHA25654172289dc640274bef8217bece1c96da37f32391f250bb81f317f45d36e24bf
SHA512749bf8c79bd669301d05bdfe35cff611cc876af9e8630160bcd213450079f2db07a752e0a909e308adfdade96592a044d84e3f5ecbc164b55226305e3ec191a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e8aa2f2d-f928-4425-b6a7-f48c4ff940d0.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
40KB
MD5f7bf5eae3e29f69a4b71040e592d9f76
SHA1f228cc8fb0d36c39ff3b0e9c764cb96c2cbbbed7
SHA2560de872afea5183585593f5607957dce5a6452b5881a8eb0599f6cb18abbbd1ee
SHA512c7c7732e68a8885616ce197e5ce48a71e2c7128df6daf3f26eeb687a03b7f05319661cab6f421e9f17686b8a1b01c363e074196805f08f19832510968bf94d21
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de