Analysis
-
max time kernel
138s -
max time network
131s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/04/2025, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe
Resource
win11-20250410-en
General
-
Target
2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe
-
Size
556KB
-
MD5
d510396277a666720627f5df62bd53eb
-
SHA1
7acf176af54493aac227097b01a38242c069c28b
-
SHA256
d28bc1b8975df8985c266826dc2111d6c50989fce391f72327171df965231166
-
SHA512
e459a1212969aecd935bcf1182ad887b7cc5319ebf1b489ae9bc3a18e2855994de46ab7ff8a7d6f968ff844b8beac243bd3b4b2fd6a572bfc1ad0a689c960154
-
SSDEEP
12288:sgSCNzaLuvMRXdxQBXZqEvRXJQNf+9LKLdEEo4Edka+9LKLdEEo4Edk:sgvFaKQdEOaKLdjRaaKLdjR
Malware Config
Extracted
vidar
13.5
c466785b3a34d7b3c4d6db04a068b664
https://t.me/v00rd
https://steamcommunity.com/profiles/76561199846773220
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Signatures
-
Detect Vidar Stealer 39 IoCs
resource yara_rule behavioral2/memory/5544-0-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-1-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-2-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-11-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-12-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-17-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-18-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-21-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-25-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-26-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-27-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-31-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-32-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-68-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-78-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-79-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-80-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-81-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-84-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-88-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-89-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-90-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-94-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-97-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-462-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-535-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-538-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-540-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-541-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-544-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-545-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-546-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-547-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-572-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-573-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-574-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-575-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-576-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5544-580-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4520 chrome.exe 5352 chrome.exe 1980 msedge.exe 2372 msedge.exe 5208 msedge.exe 1036 chrome.exe 476 chrome.exe 2316 chrome.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2264 set thread context of 5544 2264 2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe 78 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp msedge.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 652 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133896331342338285" chrome.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 5544 MSBuild.exe 5544 MSBuild.exe 5544 MSBuild.exe 5544 MSBuild.exe 1036 chrome.exe 1036 chrome.exe 5544 MSBuild.exe 5544 MSBuild.exe 5544 MSBuild.exe 5544 MSBuild.exe 5544 MSBuild.exe 5544 MSBuild.exe 5544 MSBuild.exe 5544 MSBuild.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 5544 2264 2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 2264 wrote to memory of 5544 2264 2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 2264 wrote to memory of 5544 2264 2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 2264 wrote to memory of 5544 2264 2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 2264 wrote to memory of 5544 2264 2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 2264 wrote to memory of 5544 2264 2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 2264 wrote to memory of 5544 2264 2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 2264 wrote to memory of 5544 2264 2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 2264 wrote to memory of 5544 2264 2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 2264 wrote to memory of 5544 2264 2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 2264 wrote to memory of 5544 2264 2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 2264 wrote to memory of 5544 2264 2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe 78 PID 5544 wrote to memory of 1036 5544 MSBuild.exe 79 PID 5544 wrote to memory of 1036 5544 MSBuild.exe 79 PID 1036 wrote to memory of 4628 1036 chrome.exe 80 PID 1036 wrote to memory of 4628 1036 chrome.exe 80 PID 1036 wrote to memory of 4892 1036 chrome.exe 81 PID 1036 wrote to memory of 4892 1036 chrome.exe 81 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 5040 1036 chrome.exe 82 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84 PID 1036 wrote to memory of 3784 1036 chrome.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-20_d510396277a666720627f5df62bd53eb_black-basta_cobalt-strike_ryuk_satacom.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5544 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9b10dcf8,0x7fff9b10dd04,0x7fff9b10dd104⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2012,i,6217901458438145360,13117206208720981211,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2120 /prefetch:114⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2092,i,6217901458438145360,13117206208720981211,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2088 /prefetch:24⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2408,i,6217901458438145360,13117206208720981211,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2056 /prefetch:134⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,6217901458438145360,13117206208720981211,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3160 /prefetch:14⤵
- Uses browser remote debugging
PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3168,i,6217901458438145360,13117206208720981211,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3216 /prefetch:14⤵
- Uses browser remote debugging
PID:476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4260,i,6217901458438145360,13117206208720981211,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4268 /prefetch:94⤵
- Uses browser remote debugging
PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4672,i,6217901458438145360,13117206208720981211,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4608 /prefetch:14⤵
- Uses browser remote debugging
PID:5352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5332,i,6217901458438145360,13117206208720981211,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5344 /prefetch:144⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5384,i,6217901458438145360,13117206208720981211,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5400 /prefetch:144⤵PID:3036
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x250,0x7fff96f3f208,0x7fff96f3f214,0x7fff96f3f2204⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2144,i,16586232713437872188,17977466652554044985,262144 --variations-seed-version --mojo-platform-channel-handle=2140 /prefetch:24⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1772,i,16586232713437872188,17977466652554044985,262144 --variations-seed-version --mojo-platform-channel-handle=3028 /prefetch:114⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2364,i,16586232713437872188,17977466652554044985,262144 --variations-seed-version --mojo-platform-channel-handle=2260 /prefetch:134⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3464,i,16586232713437872188,17977466652554044985,262144 --variations-seed-version --mojo-platform-channel-handle=3540 /prefetch:14⤵
- Uses browser remote debugging
PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3472,i,16586232713437872188,17977466652554044985,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:14⤵
- Uses browser remote debugging
PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\bas0z" & exit3⤵
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\SysWOW64\timeout.exetimeout /t 114⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:652
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6116
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1484
Network
MITRE ATT&CK Enterprise v16
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5fa2386306c141b9876c4b58f2712cab4
SHA1561b604e5900a5c95aecccfe976b83dc7bf4bd31
SHA25676ed09a8ca5dba0ed0c9a36ae11a0b172463a7b54b5ed0a46c1cdd3635ae2392
SHA512c4fd72d3889c0e5894b29cea4f1d40b944fcdbc78a7c48dfa975d2a794b2d035bb891e9d5b3c2a49f3fb5b02950f2d69c9ed9e3464325d5bc6fc11606f69f870
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
78KB
MD55d578ee00804ee2c5cb9ec96a5311997
SHA1d1ec995af02d46aad4d83cb1a7ca8cf59e4c7cbe
SHA25692553bebe986e44569ae7185fa4f91c0bae21736f1a29054ecfadd27e3f90588
SHA51258d408195a8a357a4fb2cad19aa29ec8010f78642a17644c01eabc4503c23ec51994e2b7168ebe907d3aaab79df4328779a264f6469e355e17f130823092e6db
-
Filesize
280B
MD5fa5bc1297e8d76bd37a0a63bbbd70ed2
SHA15a2fe5a9d826e1b3d308e82101ddfb5e5d719abf
SHA256fd6457360464b8c99b4cde26e09a25b1c27adc9b87063734da4206dad7007d22
SHA512847db0ccfee4266a84e9ea35294350465f04768a81bf2ca9fd641291440d2d7c6e5e0daba9a36988aee0d5b5c931f789899be52b8fb6aa85f07418797859d3f0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\a1055725-fae1-48c8-bdd9-38e1b5bb4dd9\index-dir\the-real-index
Filesize1KB
MD5b4a579c9132f5dbb85db800b90235f8c
SHA17df0bc146b6e7c0cb7004526c4f22fae07823125
SHA2569ab80d9405b859657682071b7b01d224c9a14a16e91040a4a9716869acd46d19
SHA512e4893abd38a006429719e99833b10576efb12a79a0ac101238264a52dfbe234ea8b9d8e7db91947638bcc0ac43c3d3696cf6297fb1e7eb55241e4b4af1542e2e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\a1055725-fae1-48c8-bdd9-38e1b5bb4dd9\index-dir\the-real-index~RFe580114.TMP
Filesize1KB
MD5b8a2e777bd6d14436882294a0f2285ea
SHA1da3bf19247f69657962a04df4da569fb12c43644
SHA256c89eeac448072121f74f1db5fc2cbbbaa40c935b706279f402d41e140947d04d
SHA5126257398ed6fc881c18f972991803f48456cb3d0d2e1ac0f671f8b3d9a36268a0895a73d532e2d43ae205d04aa59b781ad314882e473404deac48192eb693b4cd
-
Filesize
40KB
MD55e1dde5b8e9389d174e29b1c83b23c47
SHA1662a0eb60dd6511caf6623aca6eef33cc6227d92
SHA2567689b5f389aee629f1413f7f8d18c16d31dc73eed34c10c4ad0f586d435fed88
SHA512d43e89c8698f4dc1ff2b88a2f38cbb91a5c8a68d48a3473111e2b6146466a20b2c2c40dba8a7832520984acc130e3d7de6555ddac54f013693768489476651f4