Analysis
-
max time kernel
105s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2025, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
Renovation budget 2025.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250410-en
General
-
Target
Renovation budget 2025.exe
-
Size
880KB
-
MD5
f7dcf7a8592da17d6286225bf1386c71
-
SHA1
080b11d185c977ac71efad60ff8f02276b0c38aa
-
SHA256
4351c0ecaa58ebfc05cd96168092558816fc29fc15630bfcf8f30e7f97537c1b
-
SHA512
c47140f138e8de0b247a5e9ee048133f4a9d118742adf8bcd1b27eec229338bf6d07bfe175ffb137a66c99c7f71e4192245483ee3d3e600bef6b4e969da7f689
-
SSDEEP
24576:ZNvHEF2EXr4/vdBTlJVuN7FCSbtedxFYAqRmb:Hy2OSvk7vteLFRb
Malware Config
Extracted
stealerium
https://api.telegram.org/bot1793602819:AAH8OgHZZu1s3rSbuE-TXgo0Nkv70Q5Eld4/sendMessage?chat_id=
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Uses browser remote debugging 2 TTPs 3 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5168 msedge.exe 3584 msedge.exe 4852 msedge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Control Panel\International\Geo\Nation Renovation budget 2025.exe -
Loads dropped DLL 1 IoCs
pid Process 220 Renovation budget 2025.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Renovation budget 2025.exe Key opened \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Renovation budget 2025.exe Key opened \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Renovation budget 2025.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 drive.google.com 2 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 109 icanhazip.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 5780 Renovation budget 2025.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 220 Renovation budget 2025.exe 5780 Renovation budget 2025.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Renovation budget 2025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Renovation budget 2025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2000 cmd.exe 3840 netsh.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Renovation budget 2025.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Renovation budget 2025.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2444 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 6048 taskkill.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3078542121-369484597-920690335-1000\{8F3D1925-737F-4A50-A4A5-CD3487D12052} msedge.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe 5780 Renovation budget 2025.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 220 Renovation budget 2025.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5168 msedge.exe 5168 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5780 Renovation budget 2025.exe Token: SeSecurityPrivilege 4732 msiexec.exe Token: SeDebugPrivilege 6048 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 5780 220 Renovation budget 2025.exe 82 PID 220 wrote to memory of 5780 220 Renovation budget 2025.exe 82 PID 220 wrote to memory of 5780 220 Renovation budget 2025.exe 82 PID 220 wrote to memory of 5780 220 Renovation budget 2025.exe 82 PID 5780 wrote to memory of 2000 5780 Renovation budget 2025.exe 84 PID 5780 wrote to memory of 2000 5780 Renovation budget 2025.exe 84 PID 5780 wrote to memory of 2000 5780 Renovation budget 2025.exe 84 PID 5780 wrote to memory of 5168 5780 Renovation budget 2025.exe 86 PID 5780 wrote to memory of 5168 5780 Renovation budget 2025.exe 86 PID 2000 wrote to memory of 3824 2000 cmd.exe 87 PID 2000 wrote to memory of 3824 2000 cmd.exe 87 PID 2000 wrote to memory of 3824 2000 cmd.exe 87 PID 2000 wrote to memory of 3840 2000 cmd.exe 88 PID 2000 wrote to memory of 3840 2000 cmd.exe 88 PID 2000 wrote to memory of 3840 2000 cmd.exe 88 PID 2000 wrote to memory of 376 2000 cmd.exe 90 PID 2000 wrote to memory of 376 2000 cmd.exe 90 PID 2000 wrote to memory of 376 2000 cmd.exe 90 PID 5168 wrote to memory of 1148 5168 msedge.exe 89 PID 5168 wrote to memory of 1148 5168 msedge.exe 89 PID 5168 wrote to memory of 4812 5168 msedge.exe 91 PID 5168 wrote to memory of 4812 5168 msedge.exe 91 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 528 5168 msedge.exe 92 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 PID 5168 wrote to memory of 5004 5168 msedge.exe 93 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Renovation budget 2025.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Renovation budget 2025.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Renovation budget 2025.exe"C:\Users\Admin\AppData\Local\Temp\Renovation budget 2025.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\Renovation budget 2025.exe"C:\Users\Admin\AppData\Local\Temp\Renovation budget 2025.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:5780 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:3824
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3840
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:376
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --headless=new --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --disable-gpu --disable-logging3⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x2f0,0x7ffaecdaf208,0x7ffaecdaf214,0x7ffaecdaf2204⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2244,i,10927179258644795959,4369516772744853815,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2236 /prefetch:34⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2208,i,10927179258644795959,4369516772744853815,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2200 /prefetch:24⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2828,i,10927179258644795959,4369516772744853815,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=2764 /prefetch:84⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3432,i,10927179258644795959,4369516772744853815,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3428 /prefetch:14⤵
- Uses browser remote debugging
PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3472,i,10927179258644795959,4369516772744853815,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=3456 /prefetch:14⤵
- Uses browser remote debugging
PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5124,i,10927179258644795959,4369516772744853815,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5004 /prefetch:84⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5152,i,10927179258644795959,4369516772744853815,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5148 /prefetch:84⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5640,i,10927179258644795959,4369516772744853815,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5636 /prefetch:84⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5916,i,10927179258644795959,4369516772744853815,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5932 /prefetch:84⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5916,i,10927179258644795959,4369516772744853815,262144 --disable-features=PaintHolding --variations-seed-version --disable-logging --mojo-platform-channel-handle=5932 /prefetch:84⤵PID:3640
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1640
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\37103db4-6e73-46d0-b829-6064734375d2.bat"3⤵
- System Location Discovery: System Language Discovery
PID:3776 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:5236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 57804⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6048
-
-
C:\Windows\SysWOW64\timeout.exetimeout /T 2 /NOBREAK4⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2444
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4932
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4732
Network
MITRE ATT&CK Enterprise v16
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\137fe9fd564af1767ab4d2f2544a561b\Admin@JZJZFYBX_en-US\Browsers\Firefox\Bookmarks.txt
Filesize173B
MD570e1643c50773124c0e1dbf69c8be193
SHA10e2e6fd8d0b49dddf9ea59013a425d586cb4730c
SHA2564fe3f09cb4d635df136ea45a11c05f74200fc6e855a75f9a27c0a0d32a2f632a
SHA512664e5d9263c0137f841daeb3dff00010ffeb7291ed08ccf6d0483200cd6d6bd3c9d31ea7e67a9de6aac591397060d8f01e8469bbad67d8e2f1c3900ef24c3679
-
C:\Users\Admin\AppData\Local\137fe9fd564af1767ab4d2f2544a561b\Admin@JZJZFYBX_en-US\Browsers\Microsoft Edge\Cookies.txt
Filesize3KB
MD583018d5290fa484a5ee5f1b1e899a5cc
SHA1f9682be6ad3600409104e6f4408ee1dacdfbbced
SHA256ba64cc95b4554bf6c2a67b5968127143978abcbaa5cf63b1192e750abd357192
SHA5123ee6400f182d0ecc64d4db463e9ecb6e652770351306bc1c0cd10e06571d5b767493a4ca4f26b04da1eb98ed5080b3c36a29cbfc526f7dee5eb49b7b9dfe42dc
-
Filesize
6KB
MD5dc0c679cea733e4a112cab72831fe8d6
SHA1581da81227182fceaa2d4ceb21d73e7cd5b7ca92
SHA256e1239ebfeaf7c1459285ed7dd50920a40ed2e6812198fb52029c6f5111084fd2
SHA51291542e5b4732d26dbd4a82afc79b9269ae666152af51e15545719894b51bbb6acaa58847c7a92b5f674d8c349379b4b7db917e261a3f4d6b963b75530780eb41
-
C:\Users\Admin\AppData\Local\137fe9fd564af1767ab4d2f2544a561b\Admin@JZJZFYBX_en-US\System\Process.txt
Filesize4KB
MD52cf41fd14b6644c15ca98ca066dcc9ed
SHA1525f019b598d2997e79f4deeca88e72bf166e0fe
SHA256d67af78d38441ccdede4bd94c2b8c44d388df7ed2c0f89a2bc4aeb77a3a9771f
SHA5124de94485b6a09f89d541a92111e696af6cf873ad474eb92d0666ab6a11bb88574fdd9bd7c98a203c7073cd500a8ea40b060f9cf2c5fe920bdfd904df49c8e736
-
Filesize
2B
MD5a3f390d88e4c41f2747bfa2f1b5f87db
SHA1b4c96d80854dd27e76d8cc9e21960eebda52e962
SHA256a21855da08cb102d1d217c53dc5824a3a795c1c1a44e971bf01ab9da3a2acbbf
SHA5127ec8040a523b302bd6a6ee818a79fc25208f99f937fb8364444813e09498b5d31c18f67ccb7dcc79f3c3ceec724c4c726f8559319b7f0d7c3f8de26965f73b94
-
Filesize
280B
MD5576f64b8f21f4203eed3f6c7b065f527
SHA1e0c4e8f914319e112a4b3562d2d6f4107750aba8
SHA256c39a636afaeae67ebd98682bf35ff7afafceac020ed21cb564ab954ab1ef6f87
SHA512af606a5d7d4d96afd80d8e0117f2d5f02cc82b810149f50e26d46a5b8fd7c6b2aa119aa1b7123c54d2ef19d05ca92ca738994e047e24e567e53765fc1c52f653
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\f4c676d2-896d-4e89-b4ea-3e01d7bd1ded\index-dir\the-real-index
Filesize1KB
MD55a3966ce22166d3723e965e2c518ca9d
SHA1d6e375d028a75d3eb38f788de01a42ada24fe8e5
SHA256beda410175f4ba5da45c7713aaeaaa50c9569d26e71d807bd4447b80e553daa1
SHA512765a66acb405d9d9b04f835fa08591e9b12f73a9c57009c91a4083cfed312547cfb3e5f60be8cf0c4e0a49837ab42d9fc088ba7e64ab0b6fd01755ae7a714b02
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\f4c676d2-896d-4e89-b4ea-3e01d7bd1ded\index-dir\the-real-index~RFe5806e1.TMP
Filesize1KB
MD566448d94c9f0aea678217905ed90bfa1
SHA19e85e7e87d68656f336b5b46b895689369730c01
SHA2569fdfc189ed3dc497bea00110680f78fd3738dd7ac7515121f2d9ace531325c9a
SHA512818e73a48ece6d9970418ada63f510f370b45c95544ccc4dc32948c84e9d5e1cc13a46dbd154d0a3e53000b0fda67896dc1b890697d03204c1e04f7c2d30e8df
-
Filesize
22KB
MD51b04df74f4662688c14ae95226d82706
SHA18d40adbd15ccbda075fa15e7069ccea26b722ff0
SHA256313cfceb52de3f9f62e971742338b84d6e07545f6af2f6387e0fa0ff98bc9a39
SHA5126c44d560be59f865e10c859fe894c1226b8fdab5d22d958fe3541c69d286d1cb51d3c3a7662c1093ea7c5a6692d2fc9c2b15f2991bf0a2684825a3fae6481235
-
Filesize
228KB
MD5bc1aeaddc63c053f15d765f33cc5aa3a
SHA11ee01daf9c16d2bd45cf7fd986d11782d1ebe513
SHA256e4ef713846cdf66547ed4274fb4e76314df75c0ce57df8db305c76ba220b1a94
SHA512a63e3c51bc912c56912c8a3bdcb74c4fa224bca1ab0c8a5a2aaa4c62ddf096427ac299b3845c5b26601a970d1cf7c6fb5e7dbb8f1a60d0e23f498a350eec2b58
-
Filesize
40KB
MD53f45c0b6a826f878c0b6ef9ace9e91a5
SHA1a5076c13d7ddb2b2c6f46e9500d2cacc1c0aa5f7
SHA2569d7367568ba61ed6d75b3caab7b3b7b69760ec4c9f111250cab4017b8465bd7a
SHA512f6307e52b428c99137530e2f9496f9314e7145052193f5c0cef714441cd875833472f761c3990eab50f819ae784f5a5422a2ebec5bba18377bf7fe95e4811e1a
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5b0af1e2a47270947f4ac9626a91a2367
SHA1011281d8e0a501c608f6251461198fb31fc8a578
SHA2566477b0cc4b88a9f62486ff2c8a31cdefaf202413f3e90b53226559b83e0a2c7c
SHA512d9de4e4fe89ed0d2da1d903ec8d897496e42e3a30b27f77da89c6d664af1b273b6bb1d009b5a10dbf44944542c66b96e7f2a63a35ed70cb58be5f31bbc238cca
-
Filesize
152B
MD58a610ef1500587a7788bb63033efc890
SHA13e74ae9e07045707db05c4267a1337c19c6b847b
SHA256318f64a177467b008cb507d913f00a1a1c29765da05adf04b3a098c24df6e1b1
SHA512dfd60919dd180b25f869890b7f34278e35a0fcecb302d7da94b80182e63f4ccad8138a830ca87e17f268bff81f6a6c0ec4fea48e9bc3966934ca8a6506c86612
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88