Overview
overview
10Static
static
10niha-main/OmNom.exe
windows10-ltsc_2021-x64
10niha-main/alfa.exe
windows10-ltsc_2021-x64
8niha-main/derq.exe
windows10-ltsc_2021-x64
10niha-main/...af.exe
windows10-ltsc_2021-x64
7niha-main/...dr.exe
windows10-ltsc_2021-x64
7niha-main/...ra.exe
windows10-ltsc_2021-x64
10niha-main/kiprea2.exe
windows10-ltsc_2021-x64
10niha-main/kkk.exe
windows10-ltsc_2021-x64
10niha-main/...as.exe
windows10-ltsc_2021-x64
10niha-main/...wr.exe
windows10-ltsc_2021-x64
10niha-main/...ij.exe
windows10-ltsc_2021-x64
10niha-main/...12.exe
windows10-ltsc_2021-x64
10niha-main/...sr.exe
windows10-ltsc_2021-x64
10niha-main/...as.exe
windows10-ltsc_2021-x64
10niha-main/opiww1.exe
windows10-ltsc_2021-x64
10niha-main/...na.exe
windows10-ltsc_2021-x64
10niha-main/...t1.exe
windows10-ltsc_2021-x64
10niha-main/...ad.exe
windows10-ltsc_2021-x64
niha-main/...ed.exe
windows10-ltsc_2021-x64
8niha-main/pypdwat.exe
windows10-ltsc_2021-x64
7niha-main/...12.exe
windows10-ltsc_2021-x64
10niha-main/robobob.exe
windows10-ltsc_2021-x64
10niha-main/swi.exe
windows10-ltsc_2021-x64
10niha-main/thiakdc.exe
windows10-ltsc_2021-x64
10niha-main/...ka.exe
windows10-ltsc_2021-x64
8niha-main/time.exe
windows10-ltsc_2021-x64
10niha-main/vosemOO.exe
windows10-ltsc_2021-x64
10niha-main/wint1.exe
windows10-ltsc_2021-x64
10niha-main/wint2.exe
windows10-ltsc_2021-x64
10Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250410-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250410-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
16/04/2025, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
niha-main/OmNom.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
niha-main/alfa.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral3
Sample
niha-main/derq.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral4
Sample
niha-main/inktkisaf.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral5
Sample
niha-main/iotjsjawdr.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
niha-main/iylksfkktra.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral7
Sample
niha-main/kiprea2.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral8
Sample
niha-main/kkk.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
niha-main/liladertoas.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
niha-main/lporjgjsawr.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral11
Sample
niha-main/mbyoitksfjkyij.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral12
Sample
niha-main/mixerat12.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral13
Sample
niha-main/nerialtersr.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral14
Sample
niha-main/ninahoooas.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral15
Sample
niha-main/opiww1.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral16
Sample
niha-main/plorestoana.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral17
Sample
niha-main/poratertosat1.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral18
Sample
niha-main/pothgkjad.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral19
Sample
niha-main/potphbksed.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
niha-main/pypdwat.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral21
Sample
niha-main/rigosae12.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral22
Sample
niha-main/robobob.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral23
Sample
niha-main/swi.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral24
Sample
niha-main/thiakdc.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral25
Sample
niha-main/tiadktka.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral26
Sample
niha-main/time.exe
Resource
win10ltsc2021-20250410-en
Behavioral task
behavioral27
Sample
niha-main/vosemOO.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral28
Sample
niha-main/wint1.exe
Resource
win10ltsc2021-20250410-en
General
-
Target
niha-main/tiadktka.exe
-
Size
137KB
-
MD5
dc823d0f1e80400cd6ac7d8e5f68819e
-
SHA1
5731d56f9bd7caf2a49ede09deab89dad9f6cf4d
-
SHA256
bb0e2fb8ac8b2a967cc699f5483d7b26714d23a0c4e45263afb8973c6d18bcf1
-
SHA512
632388cd83ad40ce342c726fece6c3c423532d837b5743d3452a62beaed1eade4994e809464a018e7303860c751b7a688caea12f7495d4092edf30af654dca8a
-
SSDEEP
3072:aVvH8RuVrLyEj/S2CUGACcceJd/klDHa/R8mxu3s8QsPu:KH8RuRLlzgUd6a/AslsPu
Malware Config
Signatures
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1504 chrome.exe 4756 chrome.exe 240 msedge.exe 3088 msedge.exe 1360 msedge.exe 3452 chrome.exe 2712 chrome.exe 5464 chrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation tiadktka.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tiadktka.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tiadktka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString tiadktka.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1380 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133893213566801524" chrome.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1840 tiadktka.exe 1840 tiadktka.exe 1840 tiadktka.exe 1840 tiadktka.exe 3452 chrome.exe 3452 chrome.exe 1840 tiadktka.exe 1840 tiadktka.exe 1840 tiadktka.exe 1840 tiadktka.exe 1840 tiadktka.exe 1840 tiadktka.exe 1840 tiadktka.exe 1840 tiadktka.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 240 msedge.exe 240 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe Token: SeShutdownPrivilege 3452 chrome.exe Token: SeCreatePagefilePrivilege 3452 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 3452 chrome.exe 240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 3452 1840 tiadktka.exe 80 PID 1840 wrote to memory of 3452 1840 tiadktka.exe 80 PID 3452 wrote to memory of 1992 3452 chrome.exe 81 PID 3452 wrote to memory of 1992 3452 chrome.exe 81 PID 3452 wrote to memory of 5968 3452 chrome.exe 82 PID 3452 wrote to memory of 5968 3452 chrome.exe 82 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5936 3452 chrome.exe 83 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84 PID 3452 wrote to memory of 5564 3452 chrome.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\niha-main\tiadktka.exe"C:\Users\Admin\AppData\Local\Temp\niha-main\tiadktka.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffb86f6dcf8,0x7ffb86f6dd04,0x7ffb86f6dd103⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1628,i,3335135608051650296,4394680307245354103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2236 /prefetch:33⤵PID:5968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2064,i,3335135608051650296,4394680307245354103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2060 /prefetch:23⤵PID:5936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2444,i,3335135608051650296,4394680307245354103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2640 /prefetch:83⤵PID:5564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3252,i,3335135608051650296,4394680307245354103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3272 /prefetch:13⤵
- Uses browser remote debugging
PID:5464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3232,i,3335135608051650296,4394680307245354103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3244 /prefetch:13⤵
- Uses browser remote debugging
PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4288,i,3335135608051650296,4394680307245354103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4300 /prefetch:23⤵
- Uses browser remote debugging
PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4688,i,3335135608051650296,4394680307245354103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4748 /prefetch:13⤵
- Uses browser remote debugging
PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5340,i,3335135608051650296,4394680307245354103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5272 /prefetch:83⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5432,i,3335135608051650296,4394680307245354103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5440 /prefetch:83⤵PID:4988
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x288,0x7ffb873ef208,0x7ffb873ef214,0x7ffb873ef2203⤵PID:6088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1956,i,8915412374341812647,631275534187543747,262144 --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:33⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2112,i,8915412374341812647,631275534187543747,262144 --variations-seed-version --mojo-platform-channel-handle=2108 /prefetch:23⤵PID:6080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1796,i,8915412374341812647,631275534187543747,262144 --variations-seed-version --mojo-platform-channel-handle=2528 /prefetch:83⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3532,i,8915412374341812647,631275534187543747,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:13⤵
- Uses browser remote debugging
PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3620,i,8915412374341812647,631275534187543747,262144 --variations-seed-version --mojo-platform-channel-handle=3632 /prefetch:13⤵
- Uses browser remote debugging
PID:3088
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\lxlxt" & exit2⤵
- System Location Discovery: System Language Discovery
PID:4380 -
C:\Windows\SysWOW64\timeout.exetimeout /t 113⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1380
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5396
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:888
Network
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414B
MD5a360ac62548e63bd286226efa9ddefa8
SHA12b8254d9ee490b3abd09e3700382c0cd9fb418da
SHA256be494c861d682da38cf73732c0be1d8484f5c221cad4bc7a6d0f534d33e5172b
SHA51258db7b7ebc4accf5557ed2d1a1be7c4316feebfb3984e12a6c60a329900c44170807888ed45a0b6cc24a06637a6177ab3930607c93b6677dc26c2455f9ebd9ba
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
78KB
MD5f5c415a6233e52a5afcd067e397d6bbf
SHA1b276378022d3e2c40f641b860513f5f589598fe7
SHA256c3d033c6794c2cd06eebc6cefd7fd5d0e6c989b3fcfbc11ba11740926436a46c
SHA512854138ce5e2336effd21c5be679b71fd5020ed1ae87545c80db56690556c7c199a68150a0ebcc041d936588381bf527cad42936c3cf4eb93c0626d6fcf492b1d
-
Filesize
280B
MD5845d842365a2b1d6fc543d5987a8444c
SHA1d9e74493c371fda8850da9a0daa8bc4f77ec0326
SHA2566f55c946ac04a6258c714365d9a2cd4ac841e695f3be9f04e84310e5d9ab6110
SHA5123fa48469bc4e7d480b7ad5c98a8a3e4e3f210ad986b6aa4e6d8b3a2a0061b2ad7423ac673fb45a435bbdd927f623e3032039b8fbf0aaf5a9ecd98831378562d1
-
Filesize
40KB
MD5a64e10a5ab01667fdc13117232704df5
SHA1ef6195914355710a0a97fb4a4b7e5df88587cd32
SHA2562ade2b5a2ee772ddbc2cfbd69bda3286574e08595474b826274c9b50da076c9c
SHA5128c4d098eac7db0f320add7d72054fa9ac4fd2b03e91e9a31a2daab275d8c8b59e6091cd27cc0a88009fcbf3833af23976cb2cfd4e826790d912f5427d48d28a4