Analysis
-
max time kernel
131s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe
-
Size
1.9MB
-
MD5
93079de0bd272e60957277651faba8e6
-
SHA1
6881ba19895707f88b3a25dace643ee450d5e978
-
SHA256
87456e358fac3b5c8c3c1997cc4b5a4c692073972a08033837f15d022086668c
-
SHA512
127a1db9614d1a0f9da080a83ee260e47eb604baf7f412c690e0f908f27db32620d2bd28a6c4487c99db944a10816db0d035891ca69dc2b3a26001059e1f70f3
-
SSDEEP
24576:NNI2LXlFLf2uee/0kd+mELBX11GyDXcOSbNpZwGlUR:LnFFytugGlUR
Malware Config
Extracted
vidar
13.3
861aaf32ff897d13c49344e110765213
https://t.me/lw25chm
https://steamcommunity.com/profiles/76561199839170361
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Signatures
-
Detect Vidar Stealer 37 IoCs
resource yara_rule behavioral2/memory/5700-0-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-1-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-2-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-9-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-10-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-15-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-16-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-19-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-23-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-24-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-25-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-29-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-30-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-72-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-369-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-370-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-371-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-372-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-375-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-379-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-380-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-381-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-385-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-387-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-721-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-768-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-771-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-773-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-774-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-777-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-778-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-779-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-780-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-781-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-782-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-783-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5700-786-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3300 chrome.exe 3608 chrome.exe 2916 chrome.exe 4996 chrome.exe 5456 msedge.exe 2520 msedge.exe 2944 msedge.exe 2040 chrome.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2612 set thread context of 5700 2612 2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4748 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133878684613461921" chrome.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 5700 MSBuild.exe 5700 MSBuild.exe 5700 MSBuild.exe 5700 MSBuild.exe 2040 chrome.exe 2040 chrome.exe 5700 MSBuild.exe 5700 MSBuild.exe 5700 MSBuild.exe 5700 MSBuild.exe 5700 MSBuild.exe 5700 MSBuild.exe 5700 MSBuild.exe 5700 MSBuild.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 5456 msedge.exe 5456 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe Token: SeShutdownPrivilege 2040 chrome.exe Token: SeCreatePagefilePrivilege 2040 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 5456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2612 wrote to memory of 5700 2612 2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe 88 PID 2612 wrote to memory of 5700 2612 2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe 88 PID 2612 wrote to memory of 5700 2612 2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe 88 PID 2612 wrote to memory of 5700 2612 2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe 88 PID 2612 wrote to memory of 5700 2612 2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe 88 PID 2612 wrote to memory of 5700 2612 2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe 88 PID 2612 wrote to memory of 5700 2612 2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe 88 PID 2612 wrote to memory of 5700 2612 2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe 88 PID 2612 wrote to memory of 5700 2612 2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe 88 PID 2612 wrote to memory of 5700 2612 2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe 88 PID 2612 wrote to memory of 5700 2612 2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe 88 PID 2612 wrote to memory of 5700 2612 2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe 88 PID 5700 wrote to memory of 2040 5700 MSBuild.exe 96 PID 5700 wrote to memory of 2040 5700 MSBuild.exe 96 PID 2040 wrote to memory of 5008 2040 chrome.exe 97 PID 2040 wrote to memory of 5008 2040 chrome.exe 97 PID 2040 wrote to memory of 3000 2040 chrome.exe 98 PID 2040 wrote to memory of 3000 2040 chrome.exe 98 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5220 2040 chrome.exe 99 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100 PID 2040 wrote to memory of 5572 2040 chrome.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-31_93079de0bd272e60957277651faba8e6_black-basta_cobalt-strike_ryuk_satacom.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5700 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd8,0x104,0x7ff910ccdcf8,0x7ff910ccdd04,0x7ff910ccdd104⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1572,i,4262311120611308696,13754768406148252669,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2148 /prefetch:34⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2120,i,4262311120611308696,13754768406148252669,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2116 /prefetch:24⤵PID:5220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2300,i,4262311120611308696,13754768406148252669,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2392 /prefetch:84⤵PID:5572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3036,i,4262311120611308696,13754768406148252669,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3080 /prefetch:14⤵
- Uses browser remote debugging
PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3028,i,4262311120611308696,13754768406148252669,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3056 /prefetch:14⤵
- Uses browser remote debugging
PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4108,i,4262311120611308696,13754768406148252669,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4124 /prefetch:24⤵
- Uses browser remote debugging
PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4640,i,4262311120611308696,13754768406148252669,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4668 /prefetch:14⤵
- Uses browser remote debugging
PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5280,i,4262311120611308696,13754768406148252669,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5300 /prefetch:84⤵PID:5924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5500,i,4262311120611308696,13754768406148252669,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5328 /prefetch:84⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5276,i,4262311120611308696,13754768406148252669,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5308 /prefetch:84⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5396,i,4262311120611308696,13754768406148252669,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5768 /prefetch:84⤵PID:5844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5716,i,4262311120611308696,13754768406148252669,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5536 /prefetch:84⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5412,i,4262311120611308696,13754768406148252669,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5540 /prefetch:84⤵PID:3208
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x260,0x7ff90109f208,0x7ff90109f214,0x7ff90109f2204⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2256,i,14191104660295533342,17604728371178153168,262144 --variations-seed-version --mojo-platform-channel-handle=2200 /prefetch:24⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1912,i,14191104660295533342,17604728371178153168,262144 --variations-seed-version --mojo-platform-channel-handle=2284 /prefetch:34⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2448,i,14191104660295533342,17604728371178153168,262144 --variations-seed-version --mojo-platform-channel-handle=3060 /prefetch:84⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3440,i,14191104660295533342,17604728371178153168,262144 --variations-seed-version --mojo-platform-channel-handle=3520 /prefetch:14⤵
- Uses browser remote debugging
PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3448,i,14191104660295533342,17604728371178153168,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:14⤵
- Uses browser remote debugging
PID:2520
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\x4euk" & exit3⤵
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Windows\SysWOW64\timeout.exetimeout /t 114⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4748
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3996
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1520
Network
MITRE ATT&CK Enterprise v15
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5cec0407c3e6af797758e7ccfb1960a1e
SHA1d96587fb826683f4082c74db461bdc54da30a6dc
SHA25676881af669f5925913ca751503d46b9d2e3127d0783410b6577c6db36cc68919
SHA512b3f5eb4f036d644f65d96239b011aef80652ad186c6fa1ce7ef352b3b1db6103ed5578857eb19163ba332dab5e37cb8fdeb3598f52319d85db6bd32b27eff3ae
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
79KB
MD5d60b29fbe1014429705de94f62912ccf
SHA14e06eef9e24269f8fbe5ba7a077f0aed64745343
SHA25690644cc14bfe73e1bc4115f90698683d831935746da1cc2f35a3febbe3ea8efe
SHA5126987bb191c5cd28c18149d6385adc7a30a24915c816b7890159e41957607dd190f110dc3546f30abb1b80351360c7a56207c57f09fcb7af7d7a44a183da9e320
-
Filesize
280B
MD58625e8ce164e1039c0d19156210674ce
SHA19eb5ae97638791b0310807d725ac8815202737d2
SHA2562f65f9c3c54fe018e0b1f46e3c593d100a87758346d3b00a72cb93042daf60a2
SHA5123c52b8876982fe41d816f9dfb05cd888c551cf7efd266a448050c87c3fc52cc2172f53c83869b87d7643ce0188004c978570f35b0fcc1cb50c9fffea3dec76a6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD51039865fc6ac992480de30c56aefb064
SHA119b213e5bc7b2aa84ab4c6f98f71db65a6b82bac
SHA25682b2f0ddeb52a95e2668d37573cca0332d72017882a864896c8ea25653b49f01
SHA512a360626799e8c61b4ba968125744e3f9bd712127050e7e7ae7e2900902d1bfad4d0d830774bf97ebe6301db2c9bfdced80e0744bf556e5c0044a1f943950ac3c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e1e4d985-9c6c-4c70-87e7-58cacc83062f.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
41KB
MD5c73bbb6a7682f1d06ec5a2b5f185a717
SHA1eb90a2775f7d515f054de9f148060d3c02a969c5
SHA256550ca27db134769d3a190eb9699f57f0a3d23ce2427d2aa3289bca8c7fcf0104
SHA512e7c190c7a06e050b47265bf1829c953d888c62180cbea8842f75f9ebc277db20dc8fe94ecae5024bea3b7529e3709c8ea90c1663737e1eddb3fd730ebc2585ad
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de