Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe
Resource
win10v2004-20250314-en
General
-
Target
SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe
-
Size
1.7MB
-
MD5
175c9b6b2db3b3624f7df4c54dff3262
-
SHA1
a96c038467d2d6ff0b95275a828948997b6987a3
-
SHA256
5ce7687d00cc5cdc0b7575bc68940f7a092a1f559f987f3b6a9b0c837eaa6496
-
SHA512
3d728ce053930f16c8debc087807b3eaadef3c9b21a452b49f13ce767b35b221e71b15db8c849fe71c7d0077d2c0ab31506762626622f87347c596260cddff34
-
SSDEEP
24576:2iB4QbCAnGZPk/jhW2DQQ3iF2K8+2ntZ8oWyOpZwrlUR:2iB490ykrlUR
Malware Config
Extracted
vidar
13.3
00cb84c6bd4caac4bdfc1131beae4df7
https://t.me/lw25chm
https://steamcommunity.com/profiles/76561199839170361
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Signatures
-
Detect Vidar Stealer 40 IoCs
resource yara_rule behavioral1/memory/3456-0-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-1-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-2-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-9-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-10-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-15-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-16-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-19-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-23-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-24-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-25-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-29-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-31-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-368-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-369-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-370-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-371-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-374-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-378-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-379-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-380-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-384-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-393-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-743-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-811-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-814-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-816-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-817-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-820-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-821-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-825-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-826-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-833-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-834-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-838-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-839-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-843-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-844-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-845-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3456-850-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5188 msedge.exe 1720 msedge.exe 2372 chrome.exe 2640 chrome.exe 4708 chrome.exe 5180 msedge.exe 828 msedge.exe 4420 chrome.exe 2644 chrome.exe 5696 msedge.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1032 set thread context of 3456 1032 SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2016 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133878883475151526" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3456 MSBuild.exe 3456 MSBuild.exe 3456 MSBuild.exe 3456 MSBuild.exe 2372 chrome.exe 2372 chrome.exe 3456 MSBuild.exe 3456 MSBuild.exe 3456 MSBuild.exe 3456 MSBuild.exe 3456 MSBuild.exe 3456 MSBuild.exe 3456 MSBuild.exe 3456 MSBuild.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 5696 msedge.exe 5696 msedge.exe 5696 msedge.exe 5696 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe Token: SeShutdownPrivilege 2372 chrome.exe Token: SeCreatePagefilePrivilege 2372 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 5696 msedge.exe 5696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 3456 1032 SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe 86 PID 1032 wrote to memory of 3456 1032 SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe 86 PID 1032 wrote to memory of 3456 1032 SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe 86 PID 1032 wrote to memory of 3456 1032 SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe 86 PID 1032 wrote to memory of 3456 1032 SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe 86 PID 1032 wrote to memory of 3456 1032 SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe 86 PID 1032 wrote to memory of 3456 1032 SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe 86 PID 1032 wrote to memory of 3456 1032 SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe 86 PID 1032 wrote to memory of 3456 1032 SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe 86 PID 1032 wrote to memory of 3456 1032 SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe 86 PID 1032 wrote to memory of 3456 1032 SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe 86 PID 1032 wrote to memory of 3456 1032 SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe 86 PID 3456 wrote to memory of 2372 3456 MSBuild.exe 96 PID 3456 wrote to memory of 2372 3456 MSBuild.exe 96 PID 2372 wrote to memory of 952 2372 chrome.exe 97 PID 2372 wrote to memory of 952 2372 chrome.exe 97 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 3300 2372 chrome.exe 98 PID 2372 wrote to memory of 4932 2372 chrome.exe 99 PID 2372 wrote to memory of 4932 2372 chrome.exe 99 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100 PID 2372 wrote to memory of 2768 2372 chrome.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.CrypterX-gen.470.14444.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff967dadcf8,0x7ff967dadd04,0x7ff967dadd104⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1912,i,5147685035260099643,80319314683446386,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1908 /prefetch:24⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2236,i,5147685035260099643,80319314683446386,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2240 /prefetch:34⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2344,i,5147685035260099643,80319314683446386,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2500 /prefetch:84⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,5147685035260099643,80319314683446386,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3244 /prefetch:14⤵
- Uses browser remote debugging
PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,5147685035260099643,80319314683446386,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3272 /prefetch:14⤵
- Uses browser remote debugging
PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4288,i,5147685035260099643,80319314683446386,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4316 /prefetch:24⤵
- Uses browser remote debugging
PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3212,i,5147685035260099643,80319314683446386,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4640 /prefetch:14⤵
- Uses browser remote debugging
PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5316,i,5147685035260099643,80319314683446386,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5340 /prefetch:84⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5456,i,5147685035260099643,80319314683446386,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5472 /prefetch:84⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5504,i,5147685035260099643,80319314683446386,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5568 /prefetch:84⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5760,i,5147685035260099643,80319314683446386,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5768 /prefetch:84⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5568,i,5147685035260099643,80319314683446386,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5752 /prefetch:84⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5832,i,5147685035260099643,80319314683446386,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5820 /prefetch:84⤵PID:3052
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ff967d8f208,0x7ff967d8f214,0x7ff967d8f2204⤵PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1984,i,10384103092712287621,7980314463029435961,262144 --variations-seed-version --mojo-platform-channel-handle=2208 /prefetch:34⤵PID:5968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2116,i,10384103092712287621,7980314463029435961,262144 --variations-seed-version --mojo-platform-channel-handle=2096 /prefetch:24⤵PID:5976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2564,i,10384103092712287621,7980314463029435961,262144 --variations-seed-version --mojo-platform-channel-handle=2476 /prefetch:84⤵PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3532,i,10384103092712287621,7980314463029435961,262144 --variations-seed-version --mojo-platform-channel-handle=3616 /prefetch:14⤵
- Uses browser remote debugging
PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3540,i,10384103092712287621,7980314463029435961,262144 --variations-seed-version --mojo-platform-channel-handle=3620 /prefetch:14⤵
- Uses browser remote debugging
PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4104,i,10384103092712287621,7980314463029435961,262144 --variations-seed-version --mojo-platform-channel-handle=4228 /prefetch:14⤵
- Uses browser remote debugging
PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4308,i,10384103092712287621,7980314463029435961,262144 --variations-seed-version --mojo-platform-channel-handle=4340 /prefetch:24⤵
- Uses browser remote debugging
PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4860,i,10384103092712287621,7980314463029435961,262144 --variations-seed-version --mojo-platform-channel-handle=3724 /prefetch:84⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3732,i,10384103092712287621,7980314463029435961,262144 --variations-seed-version --mojo-platform-channel-handle=1932 /prefetch:84⤵PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5332,i,10384103092712287621,7980314463029435961,262144 --variations-seed-version --mojo-platform-channel-handle=5284 /prefetch:84⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3708,i,10384103092712287621,7980314463029435961,262144 --variations-seed-version --mojo-platform-channel-handle=5216 /prefetch:84⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6456,i,10384103092712287621,7980314463029435961,262144 --variations-seed-version --mojo-platform-channel-handle=6484 /prefetch:84⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6456,i,10384103092712287621,7980314463029435961,262144 --variations-seed-version --mojo-platform-channel-handle=6484 /prefetch:84⤵PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\yukn7" & exit3⤵
- System Location Discovery: System Language Discovery
PID:992 -
C:\Windows\SysWOW64\timeout.exetimeout /t 114⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2016
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:3780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4884
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5152
Network
MITRE ATT&CK Enterprise v15
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD59b8a8aa71ea8aa0598c6f674eeac5817
SHA1d8f605594889950f835f6d20fd579c779a70391c
SHA25620c497eedde022a9fe9937552d773cf6d32a3386d91bf4c9c4f8b98c5d59ac11
SHA512f2003134bbc81262ce0ecb779c50b2b0c0dc0fe923d21af8532db92bdff44f8e82fb5ee22dd612c33a9a4090166afe39045d671cb48e1c5a45b177999faacd73
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD56c83d7499186230d88be9dad7ad6eb8e
SHA122da4d52905d28ed94732bd20959a285b4c39bd7
SHA2560734d009674d0eb22b612a6d7a338b71aeac57708ef9c5ede20808f3469055f3
SHA5129de67627fcdaec23fef8dbec14780a0282a4f53f64fd3cc00a3bed583b2b34e2d39788912398f886adda3ed23b633584789b366c8ad5fdd71313e342f8fb93fd
-
Filesize
280B
MD58734b4a181214bb62f91cfa36c7e2c98
SHA19cff323f10778a23d73ac3dcffc038d3bf661b78
SHA256e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5
SHA512e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36
-
Filesize
280B
MD50db1d88802048ff847bfcf47035335bd
SHA1bb54059e5b145da464f6521ae67353889ce00771
SHA256416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a
SHA51232c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\a28510ad-0cb5-46a6-9c6f-aa4da4147d82\index-dir\the-real-index
Filesize552B
MD5e7b33accf876add573036dbf1c268b3b
SHA1343e6d6f5a6e6024f27c591e71c0147a51637ba9
SHA256d1ccf0041137b4f052d3c3b20437a21273a006ca03c6c42083ec6d9dec2eb78c
SHA51250cd58a177c85c2c08de69843e00c2b720ebad531738e11261c218e3a5a9c803cff4cd46fb66f3a372f4659d81c36804783fa2473d3c4c752686e9e61e9b150e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\a28510ad-0cb5-46a6-9c6f-aa4da4147d82\index-dir\the-real-index~RFe57cad2.TMP
Filesize552B
MD5f117e51d7ba3dd1765998aee17b4ad76
SHA15d24259a59629dbd3df003fdf5674bfe0e10658b
SHA256b58ed46bd46c75d30c33396e10ff9ee2bf8fd9187fed53065a743ec573c90013
SHA5125f9cb0c09fe6ac68a96fdc4b14a857f0f5b2928fb3866f4e130b4d20eb7fe6683b5902ba729418491a11da5ab8793ba715e72f60309bf981672629aee065e56c
-
Filesize
3KB
MD5ab0486e03d8ba79604e7e8778eb4aad6
SHA19dca2abcbffc3cdeae0d7bb4c4168edb35085bc7
SHA256982684a9aeb27053f5f9ca060792e9547fc53137784b5a94f8c2eb7fc3b59af7
SHA512094156be21ad8508b6291eacbfe70189317ccb7c4c81ae859f69ac3d0f84d7472595dd07183ff83aa49d014525b370ca8a7d185c752c58d4b8ad11184999a25c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ff440267-3eeb-44b2-8fe8-b07ab1a28780.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
6KB
MD529ffdfa249d40e51b2070ccf68f164da
SHA148ac541ac7686a970cf91f63630a6249e36676b9
SHA256bcafc8e3e8391bcc049cc82f9bbcbac6798842834ebdf1dbae86a0fb1814d23c
SHA512e925dd8950eddbf20612d11267ee57a3e49d5a8a130f7f09a7fac969a87c80a7a25977394fb039e68aeea96aebde11a79872902d164d7ae96aab01726de80e34
-
Filesize
7KB
MD50c4ebc7fb5a62b05be60b7f87f309df3
SHA1179b27871bb424fac2423cb36ef60045a7c2006a
SHA2563f3d7999cb6711042b90fc0d4e26ca25429660f9468ef52fb83f22137256ec2d
SHA5125e523176b57ee0ec1014f776bb5f2bb5153a3dbcc83f89cecc389cf369856203a724be5eb9b9a11385fd314bb92b181319ffc799f1c0a3220a6b9f27caab2399
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5db7cf890bcd3bc8ae0daa87ea93ec179
SHA1877c4c5becbdeee7ffe01af7e28f2054bf3d4a6f
SHA256365af3d4a4873d182230319a43b603b04329898a6ba6cafb2f5c5a76a9268900
SHA51276296b77c2bcecd4a8f3f48a373116d9cf0d4e1a3297329fbaf57125e7db50ba732196328bc834971ada4f1494c38b5ed84051d4b9526154c858e9b3de395533
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2372_1546920829\90491468-3847-4eb5-8609-a5295ab0528c.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de