Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
49b35e.msi
Resource
win10v2004-20250314-en
General
-
Target
49b35e.msi
-
Size
4.7MB
-
MD5
ecdd7739e76adee32b9cd61f4a132963
-
SHA1
14e5ec6b9c6bdaab641009284e2f41067462bf21
-
SHA256
59baa105734ae018e88a3abeee22657b083d2aaddf1c73e5564bf21382e5fa16
-
SHA512
91526118167315f2258c1d4e7f2b1d68f8cd7865b8bedafdb1864a4d2084ba8312124aefacc9402a38dd47474e9aabe7ce988c18bfdef9ced275920bf376c229
-
SSDEEP
98304:5Yqd1ASubUZwPEDYPo6sAPGJ60TGEtof1SvfRL8YwlYfRa6:LHr0PdsAPGJVTGEOdSvfSUa
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/1292-1415-0x0000000000400000-0x00000000004D4000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5240 created 3428 5240 CasPol.exe 56 -
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5752 chrome.exe 4760 chrome.exe 4452 chrome.exe 4812 msedge.exe 4184 msedge.exe 3212 chrome.exe 5712 msedge.exe 2372 msedge.exe 976 chrome.exe 5104 chrome.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks for any installed AV software in registry 1 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security GmRemote.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Avira\Security\UserInterface GmRemote.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security\UserInterface GmRemote.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Security GmRemote.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Avira\Security GmRemote.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Avira GmRemote.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Avira GmRemote.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira GmRemote.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2984 set thread context of 5240 2984 GmRemote.exe 107 PID 2984 set thread context of 2708 2984 GmRemote.exe 108 PID 5240 set thread context of 1292 5240 CasPol.exe 117 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\Installer\e579952.msi msiexec.exe File opened for modification C:\Windows\Installer\e579952.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI9B29.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9B39.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{D7DF4AAC-D1B0-41F5-B96D-0DCF90182CC3} msiexec.exe File opened for modification C:\Windows\Installer\MSI9BC7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI99A0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9ACA.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\e579956.msi msiexec.exe -
Executes dropped EXE 2 IoCs
pid Process 2984 GmRemote.exe 1292 CasPol.exe -
Loads dropped DLL 5 IoCs
pid Process 3576 MsiExec.exe 3576 MsiExec.exe 3576 MsiExec.exe 3576 MsiExec.exe 5240 CasPol.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 5348 msiexec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GmRemote.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 5584 msiexec.exe 5584 msiexec.exe 2984 GmRemote.exe 2984 GmRemote.exe 2984 GmRemote.exe 2984 GmRemote.exe 2984 GmRemote.exe 2984 GmRemote.exe 5240 CasPol.exe 5240 CasPol.exe 5240 CasPol.exe 5240 CasPol.exe 5240 CasPol.exe 5240 CasPol.exe 2708 gpupdate.exe 2708 gpupdate.exe 2708 gpupdate.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 3212 chrome.exe 3212 chrome.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe 1292 CasPol.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2984 GmRemote.exe 2984 GmRemote.exe 2984 GmRemote.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5348 msiexec.exe Token: SeIncreaseQuotaPrivilege 5348 msiexec.exe Token: SeSecurityPrivilege 5584 msiexec.exe Token: SeCreateTokenPrivilege 5348 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 5348 msiexec.exe Token: SeLockMemoryPrivilege 5348 msiexec.exe Token: SeIncreaseQuotaPrivilege 5348 msiexec.exe Token: SeMachineAccountPrivilege 5348 msiexec.exe Token: SeTcbPrivilege 5348 msiexec.exe Token: SeSecurityPrivilege 5348 msiexec.exe Token: SeTakeOwnershipPrivilege 5348 msiexec.exe Token: SeLoadDriverPrivilege 5348 msiexec.exe Token: SeSystemProfilePrivilege 5348 msiexec.exe Token: SeSystemtimePrivilege 5348 msiexec.exe Token: SeProfSingleProcessPrivilege 5348 msiexec.exe Token: SeIncBasePriorityPrivilege 5348 msiexec.exe Token: SeCreatePagefilePrivilege 5348 msiexec.exe Token: SeCreatePermanentPrivilege 5348 msiexec.exe Token: SeBackupPrivilege 5348 msiexec.exe Token: SeRestorePrivilege 5348 msiexec.exe Token: SeShutdownPrivilege 5348 msiexec.exe Token: SeDebugPrivilege 5348 msiexec.exe Token: SeAuditPrivilege 5348 msiexec.exe Token: SeSystemEnvironmentPrivilege 5348 msiexec.exe Token: SeChangeNotifyPrivilege 5348 msiexec.exe Token: SeRemoteShutdownPrivilege 5348 msiexec.exe Token: SeUndockPrivilege 5348 msiexec.exe Token: SeSyncAgentPrivilege 5348 msiexec.exe Token: SeEnableDelegationPrivilege 5348 msiexec.exe Token: SeManageVolumePrivilege 5348 msiexec.exe Token: SeImpersonatePrivilege 5348 msiexec.exe Token: SeCreateGlobalPrivilege 5348 msiexec.exe Token: SeBackupPrivilege 3920 vssvc.exe Token: SeRestorePrivilege 3920 vssvc.exe Token: SeAuditPrivilege 3920 vssvc.exe Token: SeBackupPrivilege 5584 msiexec.exe Token: SeRestorePrivilege 5584 msiexec.exe Token: SeRestorePrivilege 5584 msiexec.exe Token: SeTakeOwnershipPrivilege 5584 msiexec.exe Token: SeRestorePrivilege 5584 msiexec.exe Token: SeTakeOwnershipPrivilege 5584 msiexec.exe Token: SeRestorePrivilege 5584 msiexec.exe Token: SeTakeOwnershipPrivilege 5584 msiexec.exe Token: SeRestorePrivilege 5584 msiexec.exe Token: SeTakeOwnershipPrivilege 5584 msiexec.exe Token: SeRestorePrivilege 5584 msiexec.exe Token: SeTakeOwnershipPrivilege 5584 msiexec.exe Token: SeBackupPrivilege 3620 srtasks.exe Token: SeRestorePrivilege 3620 srtasks.exe Token: SeSecurityPrivilege 3620 srtasks.exe Token: SeTakeOwnershipPrivilege 3620 srtasks.exe Token: SeRestorePrivilege 5584 msiexec.exe Token: SeTakeOwnershipPrivilege 5584 msiexec.exe Token: SeBackupPrivilege 3620 srtasks.exe Token: SeRestorePrivilege 3620 srtasks.exe Token: SeSecurityPrivilege 3620 srtasks.exe Token: SeTakeOwnershipPrivilege 3620 srtasks.exe Token: SeRestorePrivilege 5584 msiexec.exe Token: SeTakeOwnershipPrivilege 5584 msiexec.exe Token: SeRestorePrivilege 5584 msiexec.exe Token: SeTakeOwnershipPrivilege 5584 msiexec.exe Token: SeRestorePrivilege 5584 msiexec.exe Token: SeTakeOwnershipPrivilege 5584 msiexec.exe Token: SeRestorePrivilege 5584 msiexec.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 5348 msiexec.exe 5348 msiexec.exe 2984 GmRemote.exe 2984 GmRemote.exe 2984 GmRemote.exe 2984 GmRemote.exe 2984 GmRemote.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 3212 chrome.exe 4812 msedge.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2984 GmRemote.exe 2984 GmRemote.exe 2984 GmRemote.exe 2984 GmRemote.exe 2984 GmRemote.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1292 CasPol.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5584 wrote to memory of 3620 5584 msiexec.exe 103 PID 5584 wrote to memory of 3620 5584 msiexec.exe 103 PID 5584 wrote to memory of 3576 5584 msiexec.exe 105 PID 5584 wrote to memory of 3576 5584 msiexec.exe 105 PID 5584 wrote to memory of 3576 5584 msiexec.exe 105 PID 5584 wrote to memory of 2984 5584 msiexec.exe 106 PID 5584 wrote to memory of 2984 5584 msiexec.exe 106 PID 5584 wrote to memory of 2984 5584 msiexec.exe 106 PID 2984 wrote to memory of 5240 2984 GmRemote.exe 107 PID 2984 wrote to memory of 5240 2984 GmRemote.exe 107 PID 2984 wrote to memory of 5240 2984 GmRemote.exe 107 PID 2984 wrote to memory of 5240 2984 GmRemote.exe 107 PID 2984 wrote to memory of 5240 2984 GmRemote.exe 107 PID 2984 wrote to memory of 2708 2984 GmRemote.exe 108 PID 2984 wrote to memory of 2708 2984 GmRemote.exe 108 PID 2984 wrote to memory of 2708 2984 GmRemote.exe 108 PID 2984 wrote to memory of 2708 2984 GmRemote.exe 108 PID 5240 wrote to memory of 1292 5240 CasPol.exe 117 PID 5240 wrote to memory of 1292 5240 CasPol.exe 117 PID 5240 wrote to memory of 1292 5240 CasPol.exe 117 PID 5240 wrote to memory of 1292 5240 CasPol.exe 117 PID 5240 wrote to memory of 1292 5240 CasPol.exe 117 PID 5240 wrote to memory of 1292 5240 CasPol.exe 117 PID 5240 wrote to memory of 1292 5240 CasPol.exe 117 PID 5240 wrote to memory of 1292 5240 CasPol.exe 117 PID 1292 wrote to memory of 3212 1292 CasPol.exe 120 PID 1292 wrote to memory of 3212 1292 CasPol.exe 120 PID 3212 wrote to memory of 5092 3212 chrome.exe 121 PID 3212 wrote to memory of 5092 3212 chrome.exe 121 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4700 3212 chrome.exe 122 PID 3212 wrote to memory of 4824 3212 chrome.exe 123 PID 3212 wrote to memory of 4824 3212 chrome.exe 123 PID 3212 wrote to memory of 2876 3212 chrome.exe 124 PID 3212 wrote to memory of 2876 3212 chrome.exe 124 PID 3212 wrote to memory of 2876 3212 chrome.exe 124 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3428
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\49b35e.msi2⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5348
-
-
C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe"C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9236 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff7bacdcf8,0x7fff7bacdd04,0x7fff7bacdd104⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2024,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2020 /prefetch:24⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1612,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2268 /prefetch:34⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2424,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2588 /prefetch:84⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9236 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3272,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3328 /prefetch:14⤵
- Uses browser remote debugging
PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9236 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3280,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3348 /prefetch:14⤵
- Uses browser remote debugging
PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9236 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4560,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4456 /prefetch:24⤵
- Uses browser remote debugging
PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9236 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4596,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4548 /prefetch:24⤵
- Uses browser remote debugging
PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9236 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4436,i,807213416806605114,17287215404457141565,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4488 /prefetch:14⤵
- Uses browser remote debugging
PID:5752
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=7775 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x268,0x7fff7b7ff208,0x7fff7b7ff214,0x7fff7b7ff2204⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1960,i,12336983731521217254,2249283918772549074,262144 --variations-seed-version --mojo-platform-channel-handle=2316 /prefetch:34⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2160,i,12336983731521217254,2249283918772549074,262144 --variations-seed-version --mojo-platform-channel-handle=2152 /prefetch:24⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2556,i,12336983731521217254,2249283918772549074,262144 --variations-seed-version --mojo-platform-channel-handle=2576 /prefetch:84⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=7775 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3620,i,12336983731521217254,2249283918772549074,262144 --variations-seed-version --mojo-platform-channel-handle=3656 /prefetch:14⤵
- Uses browser remote debugging
PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=7775 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3632,i,12336983731521217254,2249283918772549074,262144 --variations-seed-version --mojo-platform-channel-handle=3712 /prefetch:14⤵
- Uses browser remote debugging
PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --pdf-upsell-enabled --remote-debugging-port=7775 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5012,i,12336983731521217254,2249283918772549074,262144 --variations-seed-version --mojo-platform-channel-handle=5004 /prefetch:24⤵
- Uses browser remote debugging
PID:2372
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5584 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 60D3D931AB1B973F5FF639F625DC72A82⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3576
-
-
C:\Users\Admin\AppData\Local\Kart\GmRemote.exe"C:\Users\Admin\AppData\Local\Kart\GmRemote.exe"2⤵
- Checks for any installed AV software in registry
- Suspicious use of SetThreadContext
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\31081\CasPol.exeC:\Users\Admin\AppData\Local\Temp\31081\CasPol.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5240
-
-
C:\Windows\SysWOW64\gpupdate.exeC:\Windows\SysWOW64\gpupdate.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5756
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:864
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Installer Packages
1Modify Authentication Process
1Defense Evasion
Modify Authentication Process
1System Binary Proxy Execution
1Msiexec
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD55582658a3aa6d895d7ff370de58bf512
SHA1d637703e9546b3886154f102f0d15e26fc55c2e1
SHA2562ec05ae40f4237e07f85cfe2ba976c3ce81dfd0f9a345aaff3f5efac1b57cc70
SHA512b4999c5bf9e732fc44ec695b7e51807914d697c7846fae38826c4a673e67754d19e3a06d04ae22fc7f8aa4942ec1e8b8bf85b9839aa2f7423171a32367230f35
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
17KB
MD5a32823b4c6b46986ac0d64dcf875dcac
SHA19ec461bf68555ab9b73ae4220f7f0cab88719888
SHA2563976b631cf0f03ebbb3ab450b22a74c724e16bdccfaaa7edcefa8f3bc096aaf0
SHA5120cdb1997011388684e49ba671546af2dc1bd6c891692f6932b102d8290df616494f8ea651d82fdbec5bb9733a2a09bb540cd27ee0283b0be1508b2985455cd01
-
Filesize
79KB
MD5a0b17e57f94db032b9be6da6aebac77b
SHA1203350c9863b8418755fc429fc3d3e565d78b0d3
SHA25697b115dfebc0fe78e7733a7cca6e8c87ca78354928d6c96771c35a8840b7aa41
SHA5128553ef88cbdccd2f3bc3de8dfa0a5f62e5f6424970d8c71b8f8e93b75d7fe387e2921f726599e25c1c799743955f75f2a54f38355709a1d381fe2b94f14dbdfe
-
Filesize
280B
MD58625e8ce164e1039c0d19156210674ce
SHA19eb5ae97638791b0310807d725ac8815202737d2
SHA2562f65f9c3c54fe018e0b1f46e3c593d100a87758346d3b00a72cb93042daf60a2
SHA5123c52b8876982fe41d816f9dfb05cd888c551cf7efd266a448050c87c3fc52cc2172f53c83869b87d7643ce0188004c978570f35b0fcc1cb50c9fffea3dec76a6
-
Filesize
33KB
MD512b773dd7c37f3b159347895633bcfb5
SHA1680b2fe3d002c272bf2a9409f36d90ac208072f3
SHA2560641379a87928bf6b12e762ffa42121eff88e2118b4c946595ac6f01d02452bd
SHA51209638e724d4ab907c0af6c2d35f09ef4fc9cce634271252d019e57226e06d9f02a0836135aa27d65dd14ce42d484ffff4ea63890d4eed268340440a9c9465156
-
Filesize
41KB
MD5e67b251d9a2637f761cb67e06c303c10
SHA12dcc41b9de6d654556a81a0e912842b62e5e9c77
SHA2561251b5d54f23e9be70851cd7f928041469fbaac5c4d28ffb36ccd360b5c06505
SHA5121b36b404ea0f13972d24f0fb2959948d32059c2a753e88e5fee3b5f6893d075f9654bdc462f75100d16551cfb838b2a02573e7e6c119a22d9de35b28a4579105
-
Filesize
99KB
MD5f61fa5ce25f885a9b1f549055c9911ed
SHA1aba1c035b06017b0b0bd1c712669646e4f3765ab
SHA25657e9675902b443085e37ead57dfed97de6bb61321682bc93aff30f16b5ca5aeb
SHA51202e3db343037294fd3b774f954c9a617a50715e6b89d7c409f3c7dc5a1cf5ed9418158c442e9e80111994da139a9a16db33ac68a833d6d115c4a41bdf75751ac
-
Filesize
2.8MB
MD59f2b0e4d218442927581577f52997f8d
SHA1ab74e08d3a230260a545036c4ab423db1e4746e8
SHA25647d20fa8d26cd6659bdcd45bce3a2666706d1e0b52b69ee023b58ac7e61bd936
SHA5124f7db2f85793056884876be3506710833c2bed20b0fb0d13db0e347f28b4935fa20b1d5968b63f9877ea473aed6c8bf28dc91af0cacaeee43d63f31a87e44e8b
-
Filesize
2.7MB
MD5f6f7652d68a5f19c66f9cd75fde73043
SHA1ac0345fda60fea0489bbc9d77a845cf4e0cb01da
SHA25670b8a08fc00601e31ace5703419fc65c17958310994306beda45946538f76919
SHA5127661e017cb73bbaf136a54bf3aa33543f53530677cc5c19456b2f29fc257958c03ef0ad75f91b6bffe1bdb76adedbd1e209729409c9d1c885624a2ec0d3b2463
-
Filesize
2.7MB
MD5b02d1c75995364aac0c304d72701ec87
SHA1b5f2e49d94c09819e759fa1d796f38179e765761
SHA256896d8d18bcde84a91a913cb327fc1729580c5d291b7d1d2f4792e5f439951453
SHA5124a2624df2b2dfd601f33bd03b621f972e205b9c9047fbea6ccc067e331f554c4ba56c52d8c4d13a9cbffab681914df0c877ee3501125bf169db06dfea9701e8a
-
Filesize
596B
MD5aa0e77ec6b92f58452bb5577b9980e6f
SHA1237872f2b0c90e8cbe61eaa0e2919d6578cacd3f
SHA256aad1c9be17f64d7700feb2d38df7dc7446a48bf001ae42095b59b11fd24dfcde
SHA51237366bd1e0a59036fe966f2e2fe3a0f7dce6f11f2ed5bf7724afb61ea5e8d3e01bdc514f0deb3beb6febfd8b4d08d45e4e729c23cc8f4cae4f6d11f18fc39fa6
-
Filesize
1KB
MD54b7f99a315e4bba73c4bd6bd945287b3
SHA144862b156b032278c9a1272783684ed0a9e0d2bd
SHA2564f64af6108a2de6cdab0e03dbb010095d1e450aebe03ec5edff342adf1ab40cd
SHA5121290a37d2342758a432964a5d8a188c2d2230c6383a82c0fd78cb1d4ddc1d86cbcf35394e00f3a5aac00bf19e9e4c181042fff42e6ec42096387193baacbb4ca
-
Filesize
5KB
MD52c905a6e4a21a3fa14adc1d99b7cbc03
SHA1bd8682b580d951e3df05dfd467abba6b87bb43d9
SHA256cc3631ced23f21ae095c1397770e685f12f6ad788c8fa2f15487835a77a380fb
SHA512753e28bab9d50b7882a1308f6072f80fda99edeaa476fafc7e647d29f5c9c15f5c404689c866f8f198b7f1ed41bae3cc55ae4d15528b0df966a47cbc4b31caf6
-
Filesize
93KB
MD53c9137d88a00b1ae0b41ff6a70571615
SHA11797d73e9da4287351f6fbec1b183c19be217c2a
SHA25624262baafef17092927c3dafe764aaa52a2a371b83ed2249cca7e414df99fac1
SHA51231730738e73937ee0086849cb3d6506ea383ca2eac312b8d08e25c60563df5702fc2b92b3778c4b2b66e7fddd6965d74b5a4df5132df3f02faed01dcf3c7bcae
-
Filesize
569B
MD52835dd0a0aef8405d47ab7f73d82eaa5
SHA1851ea2b4f89fc06f6a4cd458840dd5c660a3b76c
SHA2562aafd1356d876255a99905fbcafb516de31952e079923b9ddf33560bbe5ed2f3
SHA512490327e218b0c01239ac419e02a4dc2bd121a08cb7734f8e2ba22e869b60175d599104ba4b45ef580e84e312fe241b3d565fac958b874d6256473c2f987108cc
-
Filesize
386KB
MD572b1c6699ddc2baab105d32761285df2
SHA1fc85e9fb190f205e6752624a5231515c4ee4e155
SHA256bf7f6f7e527ab8617766bb7a21c21b2895b5275c0e808756c2aadcd66eff8a97
SHA512cde1e754d8dfb2fa55db243517b5dd3d75b209ea6387ef2e4be6157875e536db2373f23434a9e66c119150301c7b7cdf97de5a5544d94c03247b4ae716cbc170
-
Filesize
4.7MB
MD5ecdd7739e76adee32b9cd61f4a132963
SHA114e5ec6b9c6bdaab641009284e2f41067462bf21
SHA25659baa105734ae018e88a3abeee22657b083d2aaddf1c73e5564bf21382e5fa16
SHA51291526118167315f2258c1d4e7f2b1d68f8cd7865b8bedafdb1864a4d2084ba8312124aefacc9402a38dd47474e9aabe7ce988c18bfdef9ced275920bf376c229
-
Filesize
24.1MB
MD55db9d7847810d47d567ec42d362fa0ab
SHA12f3ac5b0836b2cfa9295b19342661788f6730d0f
SHA25620cae2c450fea384385cde2a26fccbc49ce9c6b4864319b6af9cd00cd6c4cf83
SHA512ecb4b8b786de408e88f8d9558b13bc689020a5b380aa93bae9f79c1e803b074d498e2e9c7ff71bdf23b261e2817f822c03fa943bd3e426f596774a1a92fc872b
-
\??\Volume{3fa30589-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{4237a319-b7df-447c-9bb9-ce1a8c8905db}_OnDiskSnapshotProp
Filesize6KB
MD522043b2c7065a53eb06c7b054833150c
SHA1b0f75567a460d93b43b3b3d0f0e4a46d2d292554
SHA2563d6ab08cbef56c2d7fcef52202288ffa6b621d920c0566d1217ac49bcddb2d76
SHA5120e55d46839fbc0d81a4a6b862859349db26722decf73e6729eec837a5b232cfda549963493022e8769353d432fd8782d740c2f61b1ed9ea0185e7d1bac827bc6