Analysis
-
max time kernel
13s -
max time network
129s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/04/2025, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win11-20250410-en
General
-
Target
2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe
-
Size
799KB
-
MD5
9d8735f3616aa80144974a74ddeb99fa
-
SHA1
70414ba52fbfe2606e8fb08d43afbab4488628eb
-
SHA256
fd39a100de7ae6efc732edeab31a89313d0be7e0540acffc04f6ed707c48c48d
-
SHA512
231c202bfa703e3c0740b990344ee2903eceba15abb79add30a0690089eb12ec64a264301fd20c46f97eb6092e80b3dbc2227c1b447844a03a422689eb34c315
-
SSDEEP
12288:dbGU3fK+OmAeJWcl28vZ2CYizu+9LKLdEEo4Edka+9LKLdEEo4Edk:ZGU3bNkAuaKLdjRaaKLdjR
Malware Config
Extracted
vidar
13.5
c466785b3a34d7b3c4d6db04a068b664
https://t.me/v00rd
https://steamcommunity.com/profiles/76561199846773220
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Signatures
-
Detect Vidar Stealer 35 IoCs
resource yara_rule behavioral2/memory/5068-0-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-1-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-2-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-11-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-12-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-17-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-18-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-21-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-25-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-26-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-27-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-31-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-34-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-77-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-78-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-79-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-83-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-80-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-87-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-91-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-92-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-141-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-142-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-154-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-151-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-156-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-157-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-164-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-165-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-188-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-196-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-189-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-197-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-198-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5068-200-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4788 chrome.exe 488 chrome.exe 4440 msedge.exe 416 msedge.exe 572 msedge.exe 1940 chrome.exe 2256 chrome.exe 5052 chrome.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5280 set thread context of 5068 5280 2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe 78 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5832 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5068 MSBuild.exe 5068 MSBuild.exe 5068 MSBuild.exe 5068 MSBuild.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe 1940 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5280 wrote to memory of 5068 5280 2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 5280 wrote to memory of 5068 5280 2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 5280 wrote to memory of 5068 5280 2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 5280 wrote to memory of 5068 5280 2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 5280 wrote to memory of 5068 5280 2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 5280 wrote to memory of 5068 5280 2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 5280 wrote to memory of 5068 5280 2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 5280 wrote to memory of 5068 5280 2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 5280 wrote to memory of 5068 5280 2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 5280 wrote to memory of 5068 5280 2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 5280 wrote to memory of 5068 5280 2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 5280 wrote to memory of 5068 5280 2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 5068 wrote to memory of 1940 5068 MSBuild.exe 79 PID 5068 wrote to memory of 1940 5068 MSBuild.exe 79 PID 1940 wrote to memory of 1464 1940 chrome.exe 80 PID 1940 wrote to memory of 1464 1940 chrome.exe 80 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 2208 1940 chrome.exe 82 PID 1940 wrote to memory of 2208 1940 chrome.exe 82 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 4764 1940 chrome.exe 81 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83 PID 1940 wrote to memory of 2364 1940 chrome.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-20_9d8735f3616aa80144974a74ddeb99fa_black-basta_cobalt-strike_ryuk_satacom.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff821afdcf8,0x7ff821afdd04,0x7ff821afdd104⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1992,i,8900899911906739772,2897871585774355873,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=1984 /prefetch:24⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2024,i,8900899911906739772,2897871585774355873,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2156 /prefetch:114⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2372,i,8900899911906739772,2897871585774355873,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2552 /prefetch:134⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3284,i,8900899911906739772,2897871585774355873,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3324 /prefetch:14⤵
- Uses browser remote debugging
PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3292,i,8900899911906739772,2897871585774355873,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3304 /prefetch:14⤵
- Uses browser remote debugging
PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4356,i,8900899911906739772,2897871585774355873,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4284 /prefetch:94⤵
- Uses browser remote debugging
PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4704,i,8900899911906739772,2897871585774355873,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4808 /prefetch:14⤵
- Uses browser remote debugging
PID:488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5376,i,8900899911906739772,2897871585774355873,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5392 /prefetch:144⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5588,i,8900899911906739772,2897871585774355873,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5632 /prefetch:144⤵PID:1252
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
PID:4440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x250,0x7ff80e7bf208,0x7ff80e7bf214,0x7ff80e7bf2204⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1656,i,9376680640614881871,12944738573540236078,262144 --variations-seed-version --mojo-platform-channel-handle=2160 /prefetch:114⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2060,i,9376680640614881871,12944738573540236078,262144 --variations-seed-version --mojo-platform-channel-handle=2052 /prefetch:24⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2468,i,9376680640614881871,12944738573540236078,262144 --variations-seed-version --mojo-platform-channel-handle=2664 /prefetch:134⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3468,i,9376680640614881871,12944738573540236078,262144 --variations-seed-version --mojo-platform-channel-handle=3532 /prefetch:14⤵
- Uses browser remote debugging
PID:572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3476,i,9376680640614881871,12944738573540236078,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:14⤵
- Uses browser remote debugging
PID:416
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\790zm" & exit3⤵PID:5980
-
C:\Windows\SysWOW64\timeout.exetimeout /t 114⤵
- Delays execution with timeout.exe
PID:5832
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2320
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:6004
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD58bd503acef559b4fd4b26c78ad96cee8
SHA120d8f19f87ec9aefc9fd4316ba3918bac7f75ff2
SHA256cdd183e0f8e75d46816b1baaee905eb28b940298b0d474d070579d2415f6aae8
SHA51261b30c50ee50c51832e0aa65a64a1c14bede5e74f5a7305c2dd2d23df2e13ccfe3d815826377ab6a3d1610fd5ba22951b063f0e0be2f29daa0f853f1b5e0149b
-
Filesize
649B
MD5acae3d3f22e125530a4e8b3bc8895609
SHA14aa48175ff8c2caa452c2a0668981ab0f491fde0
SHA256f2afa0d29c4e9e3824713e373d53d6c61ca77e6f1091f345f3b61599e49f8455
SHA51293b4ef1530d941092f747d65911ae42d79df9888a572c8d9c4c90244f657af05372cdf220958f9a6d8298c92a1b68d2e74c830be23c36b346eab56c61f60730c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
78KB
MD5ae3dc6fa70d6fa90d00f84b600a972c5
SHA1fafa0ce23fae5d0ad8c45a50181551351a845466
SHA2563e3a3f261c3cb9c17e82a3c53b4bfa5ddf097a647685278c545ac8f609d007d3
SHA512850c1d5719b463f78b3c51961bcf72e0f0139040e72d32e2e8cdfe1b92e333fce5c85bd7a342eb8130abec88e64431c6559fae2b29db6ee9065bbb38baa18f4e
-
Filesize
280B
MD534d09b852bf4a5ef1d936591501926ca
SHA188ff0b1c2a5664765e11e47843a5ac8e1782ed0c
SHA25652bd897dfdfca849d627b36a49b976eef861b1a7af075527c8f247adb862dc20
SHA512dc63eebf94384dc9580f5e3c9291047e8d410f8fc1f746d180673f445a9bbe746608c01cbf10a38f2f935cfa5c8bb89864f87cabd8fece809dcaa1fa137f71d3
-
Filesize
40KB
MD5e63031589e009e17c70c746ae6399a0b
SHA1a93a8042c652b9a0cb0d342b1b79825cfba003e5
SHA2566dd4d247ca428fb86525460c404866ef96d4d1a82e8181c698c2bc3db959851a
SHA51202a7aa6a460d82feb560ff9740a2b4ef7e0efa0aa936d26c7d75ee794bd6bf54cbffcf469650ac3a695a0edeb96709e3b5ce43bf7f3dc6afa1ab22b55b9241eb