Analysis
-
max time kernel
132s -
max time network
141s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/04/2025, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
libcares-2.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral2
Sample
libcares-2.dll
Resource
win11-20250410-en
General
-
Target
libcares-2.dll
-
Size
4.3MB
-
MD5
93fb1d866472e1280e4a93343db3ed13
-
SHA1
fcc4cbab5f13bfbcac6b7610309ca6c3bdbd58ac
-
SHA256
089da3c21bdd12618e7d5f757d1742a48dc961b367a8515703c94d9febc965c9
-
SHA512
79d49f319ab38945714b59c071ee61888135326718ffb91c333806c31f8b36b108ca121884366092aee4fbc2991af16fc4eb811c25a66590911d0493d028448e
-
SSDEEP
49152:TO4Yher6KfKDd0faVjaNpYzooELJJC4L0357+LnT3ODeJaYxdVIwG4HK0VglLa3N:TVrDQhzooyrnRvOqx9
Malware Config
Extracted
vidar
13.5
eb17a39311b2fbc653bb6a88c15634e4
https://t.me/v00rd
https://steamcommunity.com/profiles/76561199846773220
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Signatures
-
Detect Vidar Stealer 34 IoCs
resource yara_rule behavioral2/memory/5648-0-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-1-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-2-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-11-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-12-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-17-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-18-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-21-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-25-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-26-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-27-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-31-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-34-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-77-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-84-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-85-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-86-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-89-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-93-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-94-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-95-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-99-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-104-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-414-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-466-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-469-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-472-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-473-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-474-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-475-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-476-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-477-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-478-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/5648-481-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1092 msedge.exe 2260 chrome.exe 1624 chrome.exe 3724 chrome.exe 5096 chrome.exe 5460 chrome.exe 4736 msedge.exe 1440 msedge.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5212 set thread context of 5648 5212 rundll32.exe 78 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp msedge.exe File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ServiceModelReg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ServiceModelReg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ServiceModelReg.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1448 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133896467757737504" chrome.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-4239789418-2672923313-1754393631-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 5648 ServiceModelReg.exe 5648 ServiceModelReg.exe 5648 ServiceModelReg.exe 5648 ServiceModelReg.exe 2260 chrome.exe 2260 chrome.exe 5648 ServiceModelReg.exe 5648 ServiceModelReg.exe 5648 ServiceModelReg.exe 5648 ServiceModelReg.exe 5648 ServiceModelReg.exe 5648 ServiceModelReg.exe 5648 ServiceModelReg.exe 5648 ServiceModelReg.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2260 chrome.exe Token: SeCreatePagefilePrivilege 2260 chrome.exe Token: SeShutdownPrivilege 2260 chrome.exe Token: SeCreatePagefilePrivilege 2260 chrome.exe Token: SeShutdownPrivilege 2260 chrome.exe Token: SeCreatePagefilePrivilege 2260 chrome.exe Token: SeShutdownPrivilege 2260 chrome.exe Token: SeCreatePagefilePrivilege 2260 chrome.exe Token: SeShutdownPrivilege 2260 chrome.exe Token: SeCreatePagefilePrivilege 2260 chrome.exe Token: SeShutdownPrivilege 2260 chrome.exe Token: SeCreatePagefilePrivilege 2260 chrome.exe Token: SeShutdownPrivilege 2260 chrome.exe Token: SeCreatePagefilePrivilege 2260 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 2260 chrome.exe 4736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5212 wrote to memory of 5648 5212 rundll32.exe 78 PID 5212 wrote to memory of 5648 5212 rundll32.exe 78 PID 5212 wrote to memory of 5648 5212 rundll32.exe 78 PID 5212 wrote to memory of 5648 5212 rundll32.exe 78 PID 5212 wrote to memory of 5648 5212 rundll32.exe 78 PID 5212 wrote to memory of 5648 5212 rundll32.exe 78 PID 5212 wrote to memory of 5648 5212 rundll32.exe 78 PID 5212 wrote to memory of 5648 5212 rundll32.exe 78 PID 5212 wrote to memory of 5648 5212 rundll32.exe 78 PID 5212 wrote to memory of 5648 5212 rundll32.exe 78 PID 5212 wrote to memory of 5648 5212 rundll32.exe 78 PID 5212 wrote to memory of 5648 5212 rundll32.exe 78 PID 5648 wrote to memory of 2260 5648 ServiceModelReg.exe 80 PID 5648 wrote to memory of 2260 5648 ServiceModelReg.exe 80 PID 2260 wrote to memory of 5228 2260 chrome.exe 81 PID 2260 wrote to memory of 5228 2260 chrome.exe 81 PID 2260 wrote to memory of 2408 2260 chrome.exe 82 PID 2260 wrote to memory of 2408 2260 chrome.exe 82 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 2396 2260 chrome.exe 83 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85 PID 2260 wrote to memory of 4588 2260 chrome.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\libcares-2.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ServiceModelReg.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5648 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaca76dcf8,0x7ffaca76dd04,0x7ffaca76dd104⤵PID:5228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1872,i,8965970272391630923,2242649548525314103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2040 /prefetch:114⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2012,i,8965970272391630923,2242649548525314103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2008 /prefetch:24⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2344,i,8965970272391630923,2242649548525314103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2448 /prefetch:134⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,8965970272391630923,2242649548525314103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3248 /prefetch:14⤵
- Uses browser remote debugging
PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,8965970272391630923,2242649548525314103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3276 /prefetch:14⤵
- Uses browser remote debugging
PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4300,i,8965970272391630923,2242649548525314103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4372 /prefetch:94⤵
- Uses browser remote debugging
PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4104,i,8965970272391630923,2242649548525314103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4448 /prefetch:14⤵
- Uses browser remote debugging
PID:5460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5344,i,8965970272391630923,2242649548525314103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5360 /prefetch:144⤵PID:6020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5520,i,8965970272391630923,2242649548525314103,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5524 /prefetch:144⤵PID:384
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x250,0x7ffaca74f208,0x7ffaca74f214,0x7ffaca74f2204⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2164,i,14954970804627459199,2242797112595848973,262144 --variations-seed-version --mojo-platform-channel-handle=2160 /prefetch:24⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1852,i,14954970804627459199,2242797112595848973,262144 --variations-seed-version --mojo-platform-channel-handle=2192 /prefetch:114⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1952,i,14954970804627459199,2242797112595848973,262144 --variations-seed-version --mojo-platform-channel-handle=2636 /prefetch:134⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3424,i,14954970804627459199,2242797112595848973,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:14⤵
- Uses browser remote debugging
PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3432,i,14954970804627459199,2242797112595848973,262144 --variations-seed-version --mojo-platform-channel-handle=3512 /prefetch:14⤵
- Uses browser remote debugging
PID:1440
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\5xtr1" & exit3⤵
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\timeout.exetimeout /t 114⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1448
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:3356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:892
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:3224
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3144
Network
MITRE ATT&CK Enterprise v16
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD58077d97ec136352fd3eb465065a2363f
SHA148245cea3aa4fb09e32ce360f8d95d24465f7c63
SHA2567c1d262f14043a43554918d91d90139fa2b8e4f3727691dc7cfb2390ff92e523
SHA51299fa60ee8395bc53dd4c74806896369abe08c303274ee28754c318833c56524bd764f8bfc15636a4bcf7401f5418635e9ccee731983070e9c5432d0492370bed
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
78KB
MD543e0a78b512876382a35d99498501463
SHA1ca817d52218ae65de750c31d6490484e01d8e3fb
SHA2569dfd0c755a1745f39824855e48171b75698e57378ad47a32169610d990970f42
SHA512bf7098dae825c1021e4a05a24978d6e616fccf1f0190c524cc96191c5d660689c335f477195be2be2f3d3fb066453551d840c75ca2b8394c2f28694bd32a8247
-
Filesize
280B
MD5e93f7a7e895750f95a2b42200b2f4406
SHA1eb9edc7a2f5aff5ae1ef937ec351ae1adc59034f
SHA25616af01493a8deae2d5884e7a0b4e4cf7f9b67a1c762e6479679500cda4ac928d
SHA512de7167f6575862feec3e02150f1ac00ac9daed7528f3edb6dadb42266a27530ada41f7e2094ade3feb970ca8745e3c02a18e364c0e9ce04dee177472c1f5420a
-
Filesize
40KB
MD5e0aadb7f9975aade1b659f0f5b00df26
SHA12bfac6ea4b884fb71a312757089f135a4f22fc3e
SHA256703cf06cc3e9f988ae59005581d2d80bdb2ed5a5f9f22d0de99831b1f80cdc85
SHA5126f69d241ac2503af6912519d517931b809500cc30da2c1d44c227337ab0c8a19ef4d4509e5bed8a305d6978d47d9ebe11d098f1a03aa2a452d70131effdc2399
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\cdcbb79b-a527-4f4d-acc8-ad44e8b1fa21.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3