Overview
overview
10Static
static
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
10rihuata-ma...la.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.pdf
windows10-ltsc_2021-x64
3rihuata-ma...gh.exe
windows10-ltsc_2021-x64
10rihuata-ma...er.exe
windows10-ltsc_2021-x64
7rihuata-ma...er.exe
windows10-ltsc_2021-x64
8rihuata-ma...er.exe
windows10-ltsc_2021-x64
7rihuata-ma...ee.exe
windows10-ltsc_2021-x64
8rihuata-ma...pa.exe
windows10-ltsc_2021-x64
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
rihuata-ma...ii.exe
windows10-ltsc_2021-x64
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
7rihuata-ma...lu.exe
windows10-ltsc_2021-x64
10rihuata-ma...ad.exe
windows10-ltsc_2021-x64
10rihuata-ma...sa.exe
windows10-ltsc_2021-x64
10rihuata-ma...rs.exe
windows10-ltsc_2021-x64
8rihuata-ma...wa.exe
windows10-ltsc_2021-x64
10rihuata-ma...ad.exe
windows10-ltsc_2021-x64
10rihuata-ma...ad.exe
windows10-ltsc_2021-x64
10rihuata-ma...ix.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10rihuata-ma...wd.exe
windows10-ltsc_2021-x64
10rihuata-ma...ee.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10rihuata-ma...wa.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10rihuata-ma...ka.exe
windows10-ltsc_2021-x64
7rihuata-ma...da.exe
windows10-ltsc_2021-x64
10rihuata-ma...de.exe
windows10-ltsc_2021-x64
10rihuata-ma...aa.exe
windows10-ltsc_2021-x64
10Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
05/04/2025, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
rihuata-main/bomepratiaosa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
rihuata-main/bvrtiawdktgawdlla.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
rihuata-main/filesaa.pdf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
rihuata-main/gopawdkrjgh.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral5
Sample
rihuata-main/gramiltter.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
rihuata-main/huilter.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
rihuata-main/jaconfager.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral8
Sample
rihuata-main/kalrtotypadjeee.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
rihuata-main/kilapopa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
rihuata-main/klamingosa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral11
Sample
rihuata-main/kloalersaniii.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral12
Sample
rihuata-main/kukurumalasa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral13
Sample
rihuata-main/lotuserkasasa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral14
Sample
rihuata-main/lukarakalu.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
rihuata-main/mbnorad.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral16
Sample
rihuata-main/mimamopetuesa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral17
Sample
rihuata-main/mumirolepawers.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral18
Sample
rihuata-main/nbitoadkrtjkajdwa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral19
Sample
rihuata-main/nborepadiktad.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
rihuata-main/nenruioepad.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral21
Sample
rihuata-main/nixmixhix.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral22
Sample
rihuata-main/nopekapeaaa.exe
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral23
Sample
rihuata-main/nvpwadkkthaaaa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral24
Sample
rihuata-main/nvtipoawdkthawd.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral25
Sample
rihuata-main/oplaserkanureee.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral26
Sample
rihuata-main/oprlalalalklaaa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral27
Sample
rihuata-main/ripapakalswa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral28
Sample
rihuata-main/tiawdkthawdaaa.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral29
Sample
rihuata-main/vjtkadkrihgka.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral30
Sample
rihuata-main/wkerkadlrgiajda.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral31
Sample
rihuata-main/zuyokhrfhhfde.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
rihuata-main/huilter.exe
-
Size
137KB
-
MD5
dc823d0f1e80400cd6ac7d8e5f68819e
-
SHA1
5731d56f9bd7caf2a49ede09deab89dad9f6cf4d
-
SHA256
bb0e2fb8ac8b2a967cc699f5483d7b26714d23a0c4e45263afb8973c6d18bcf1
-
SHA512
632388cd83ad40ce342c726fece6c3c423532d837b5743d3452a62beaed1eade4994e809464a018e7303860c751b7a688caea12f7495d4092edf30af654dca8a
-
SSDEEP
3072:aVvH8RuVrLyEj/S2CUGACcceJd/klDHa/R8mxu3s8QsPu:KH8RuRLlzgUd6a/AslsPu
Malware Config
Signatures
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5332 msedge.exe 2532 msedge.exe 448 msedge.exe 1116 chrome.exe 1008 chrome.exe 4624 chrome.exe 5096 chrome.exe 2140 chrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-809364120-1453366396-340093129-1000\Control Panel\International\Geo\Nation huilter.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huilter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 huilter.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString huilter.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4932 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133883285079902411" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 5456 huilter.exe 5456 huilter.exe 5456 huilter.exe 5456 huilter.exe 1116 chrome.exe 1116 chrome.exe 5456 huilter.exe 5456 huilter.exe 5456 huilter.exe 5456 huilter.exe 5456 huilter.exe 5456 huilter.exe 5456 huilter.exe 5456 huilter.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 5332 msedge.exe 5332 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 1116 chrome.exe Token: SeCreatePagefilePrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeCreatePagefilePrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeCreatePagefilePrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeCreatePagefilePrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeCreatePagefilePrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeCreatePagefilePrivilege 1116 chrome.exe Token: SeShutdownPrivilege 1116 chrome.exe Token: SeCreatePagefilePrivilege 1116 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 1116 chrome.exe 5332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5456 wrote to memory of 1116 5456 huilter.exe 87 PID 5456 wrote to memory of 1116 5456 huilter.exe 87 PID 1116 wrote to memory of 1488 1116 chrome.exe 88 PID 1116 wrote to memory of 1488 1116 chrome.exe 88 PID 1116 wrote to memory of 4752 1116 chrome.exe 90 PID 1116 wrote to memory of 4752 1116 chrome.exe 90 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 4724 1116 chrome.exe 91 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92 PID 1116 wrote to memory of 3328 1116 chrome.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\rihuata-main\huilter.exe"C:\Users\Admin\AppData\Local\Temp\rihuata-main\huilter.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5456 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x224,0x228,0x22c,0x1f8,0x230,0x7ffd5fa4dcf8,0x7ffd5fa4dd04,0x7ffd5fa4dd103⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=504,i,11338258228441972621,16908823783254781872,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2060 /prefetch:33⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2028,i,11338258228441972621,16908823783254781872,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2024 /prefetch:23⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2412,i,11338258228441972621,16908823783254781872,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2552 /prefetch:83⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3212,i,11338258228441972621,16908823783254781872,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3284 /prefetch:13⤵
- Uses browser remote debugging
PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,11338258228441972621,16908823783254781872,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3304 /prefetch:13⤵
- Uses browser remote debugging
PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4208,i,11338258228441972621,16908823783254781872,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4244 /prefetch:23⤵
- Uses browser remote debugging
PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4576,i,11338258228441972621,16908823783254781872,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4668 /prefetch:13⤵
- Uses browser remote debugging
PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5360,i,11338258228441972621,16908823783254781872,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5372 /prefetch:83⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5368,i,11338258228441972621,16908823783254781872,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5568 /prefetch:83⤵PID:3920
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x278,0x7ffd5fecf208,0x7ffd5fecf214,0x7ffd5fecf2203⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1924,i,6611032545934625693,17824046994861444247,262144 --variations-seed-version --mojo-platform-channel-handle=2260 /prefetch:33⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2224,i,6611032545934625693,17824046994861444247,262144 --variations-seed-version --mojo-platform-channel-handle=2220 /prefetch:23⤵PID:5604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2560,i,6611032545934625693,17824046994861444247,262144 --variations-seed-version --mojo-platform-channel-handle=2732 /prefetch:83⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3472,i,6611032545934625693,17824046994861444247,262144 --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:13⤵
- Uses browser remote debugging
PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3480,i,6611032545934625693,17824046994861444247,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:13⤵
- Uses browser remote debugging
PID:2532
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\k6xl6" & exit2⤵
- System Location Discovery: System Language Discovery
PID:4824 -
C:\Windows\SysWOW64\timeout.exetimeout /t 113⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4932
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2964
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2244
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5c19c7e1f3cd18d5409f2f5fbc395c807
SHA165d3b2e48f2c7971bb849e07de89e939429c4ee4
SHA256bd6b22fafc5ffc1387d334bc9570b495993ecb92e6e07e3e4144722414f51399
SHA512a20efb7eaacc27be72b8573c387cc69808a1143faabfa13eda8f82b87b12259a8ee2345f4b1d6955c7497690e322e7f9a08b549495917544d62010e0e3153dc5
-
Filesize
649B
MD58b24b162f466c9b784f280e51a7a72c7
SHA17f044dd21dba66d2aa34b9f3a01dfad8bd4cf179
SHA256ac3d62995e5627ec7b73fa91ba47c30605ee8a7e8c1529fea23cf31c277ab014
SHA51248db098b08d19620b46e22e2dedea1fb1e3b6c288b3d11f2624210e27c5cba3aa20ec79979215ee2ca1975a0e400664285439b54c877721f432193897b3a2bcc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
280B
MD577532bfc14c90e92c2c117f6625e41d1
SHA17ba952d5e18485d66976547fb8f47b2aaffeab80
SHA256587fe94912145359072577e01c7fe95e0fd4e6972e35f0a6a4d464382d8237f7
SHA5121b1b9ed2c3012cb6371b05681acf995a15feab32f0bc860bd4c441c1a1dcd8bd1a9fc7985fd10c16674ee7423a86c479a241dd5d1c843fb70962504db0eb82a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\5bea1764-b070-4aad-8261-2a922c58cde7\index-dir\the-real-index
Filesize1KB
MD57395e5f546f599251381e3dfca773009
SHA1f2acedf3da7f4419f7403382fcda5148a5438e24
SHA25677dafaeb8ebe7165d56b7879f92ea42c970c42a41d9c57a2f9be79597d58eec9
SHA51295138cabeb9f6e95aa06b3877cdeb5a7d66d4ea6f62f672144d8d12eb690b1caafbc1618f479e89b4fd0a5946c06bc650fa0fdff1c1fee716c25fb4db4b70a5b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\5bea1764-b070-4aad-8261-2a922c58cde7\index-dir\the-real-index~RFe57dd40.TMP
Filesize1KB
MD5880941595a74cce48aacd31f10653935
SHA1292b67f5fd5401c9c72b8b052a9a6d523ce648fe
SHA2566f31afcd5085c6884169a5828ca7488dec0d89ce6fddd197b4c6565147ce3c15
SHA512dab9f73104214799f75ad436449a2067bf3c4e3ce8e0e25301ec844026e8d3fca5a9e144a6cf328a329a7dc095fe8e36c0bd0ae1e2701bbdd174e9b5f8ea80d5
-
Filesize
41KB
MD5a09d1a98fd8fa5f7201aa6c7c6304cdd
SHA1caa2849fde8771ac34a23c7d4ddf244a0bc178d0
SHA25622bd2da6dbd8a1dcbc1f786294d07fef655aa8d6b9a31689dc1f23bfbd789ef1
SHA512d31a0dfe4dfc79af088b8b217eb3d8e6db0c2a2cad3fe0f52d0e2b1ca97a9692f5c20bca983c310ed6d0850a32d2b30f562fee87642a9b33d06f3b15018e3e72