Analysis
-
max time kernel
132s -
max time network
124s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/04/2025, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
libcares-2.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
libcares-2.dll
Resource
win11-20250410-en
General
-
Target
libcares-2.dll
-
Size
4.3MB
-
MD5
93fb1d866472e1280e4a93343db3ed13
-
SHA1
fcc4cbab5f13bfbcac6b7610309ca6c3bdbd58ac
-
SHA256
089da3c21bdd12618e7d5f757d1742a48dc961b367a8515703c94d9febc965c9
-
SHA512
79d49f319ab38945714b59c071ee61888135326718ffb91c333806c31f8b36b108ca121884366092aee4fbc2991af16fc4eb811c25a66590911d0493d028448e
-
SSDEEP
49152:TO4Yher6KfKDd0faVjaNpYzooELJJC4L0357+LnT3ODeJaYxdVIwG4HK0VglLa3N:TVrDQhzooyrnRvOqx9
Malware Config
Extracted
vidar
13.5
eb17a39311b2fbc653bb6a88c15634e4
https://t.me/v00rd
https://steamcommunity.com/profiles/76561199846773220
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Signatures
-
Detect Vidar Stealer 36 IoCs
resource yara_rule behavioral2/memory/1676-0-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-1-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-2-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-11-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-12-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-17-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-18-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-21-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-25-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-26-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-27-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-31-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-35-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-77-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-78-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-79-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-80-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-83-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-87-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-88-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-89-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-93-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-103-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-467-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-526-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-529-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-531-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-532-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-535-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-536-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-537-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-538-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-539-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-540-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-541-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/1676-544-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4448 chrome.exe 3404 chrome.exe 1976 msedge.exe 1432 msedge.exe 4100 msedge.exe 3132 chrome.exe 4980 chrome.exe 680 chrome.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3832 set thread context of 1676 3832 rundll32.exe 78 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp msedge.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ServiceModelReg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ServiceModelReg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ServiceModelReg.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 6016 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133896469782941668" chrome.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1676 ServiceModelReg.exe 1676 ServiceModelReg.exe 1676 ServiceModelReg.exe 1676 ServiceModelReg.exe 3132 chrome.exe 3132 chrome.exe 1676 ServiceModelReg.exe 1676 ServiceModelReg.exe 1676 ServiceModelReg.exe 1676 ServiceModelReg.exe 1676 ServiceModelReg.exe 1676 ServiceModelReg.exe 1676 ServiceModelReg.exe 1676 ServiceModelReg.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe Token: SeShutdownPrivilege 3132 chrome.exe Token: SeCreatePagefilePrivilege 3132 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 3132 chrome.exe 1976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3832 wrote to memory of 1676 3832 rundll32.exe 78 PID 3832 wrote to memory of 1676 3832 rundll32.exe 78 PID 3832 wrote to memory of 1676 3832 rundll32.exe 78 PID 3832 wrote to memory of 1676 3832 rundll32.exe 78 PID 3832 wrote to memory of 1676 3832 rundll32.exe 78 PID 3832 wrote to memory of 1676 3832 rundll32.exe 78 PID 3832 wrote to memory of 1676 3832 rundll32.exe 78 PID 3832 wrote to memory of 1676 3832 rundll32.exe 78 PID 3832 wrote to memory of 1676 3832 rundll32.exe 78 PID 3832 wrote to memory of 1676 3832 rundll32.exe 78 PID 3832 wrote to memory of 1676 3832 rundll32.exe 78 PID 3832 wrote to memory of 1676 3832 rundll32.exe 78 PID 1676 wrote to memory of 3132 1676 ServiceModelReg.exe 79 PID 1676 wrote to memory of 3132 1676 ServiceModelReg.exe 79 PID 3132 wrote to memory of 3112 3132 chrome.exe 80 PID 3132 wrote to memory of 3112 3132 chrome.exe 80 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 5024 3132 chrome.exe 81 PID 3132 wrote to memory of 4456 3132 chrome.exe 82 PID 3132 wrote to memory of 4456 3132 chrome.exe 82 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83 PID 3132 wrote to memory of 2496 3132 chrome.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\libcares-2.dll,#11⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ServiceModelReg.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c5c5dcf8,0x7ff8c5c5dd04,0x7ff8c5c5dd104⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1936,i,7096283116486829395,17181737338258498207,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=1932 /prefetch:24⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2232,i,7096283116486829395,17181737338258498207,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2276 /prefetch:114⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2380,i,7096283116486829395,17181737338258498207,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2516 /prefetch:134⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,7096283116486829395,17181737338258498207,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3264 /prefetch:14⤵
- Uses browser remote debugging
PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,7096283116486829395,17181737338258498207,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3284 /prefetch:14⤵
- Uses browser remote debugging
PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4108,i,7096283116486829395,17181737338258498207,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4312 /prefetch:94⤵
- Uses browser remote debugging
PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3212,i,7096283116486829395,17181737338258498207,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4676 /prefetch:14⤵
- Uses browser remote debugging
PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5388,i,7096283116486829395,17181737338258498207,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5264 /prefetch:144⤵PID:5672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5588,i,7096283116486829395,17181737338258498207,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5392 /prefetch:144⤵PID:3680
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x264,0x7ff8c1a5f208,0x7ff8c1a5f214,0x7ff8c1a5f2204⤵PID:5992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1836,i,1523895879922038492,14833015523588355569,262144 --variations-seed-version --mojo-platform-channel-handle=2152 /prefetch:114⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2124,i,1523895879922038492,14833015523588355569,262144 --variations-seed-version --mojo-platform-channel-handle=2120 /prefetch:24⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2460,i,1523895879922038492,14833015523588355569,262144 --variations-seed-version --mojo-platform-channel-handle=2540 /prefetch:134⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3476,i,1523895879922038492,14833015523588355569,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:14⤵
- Uses browser remote debugging
PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3488,i,1523895879922038492,14833015523588355569,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:14⤵
- Uses browser remote debugging
PID:1432
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\kxb1d" & exit3⤵
- System Location Discovery: System Language Discovery
PID:4368 -
C:\Windows\SysWOW64\timeout.exetimeout /t 114⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:6016
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2480
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3932
Network
MITRE ATT&CK Enterprise v16
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5854ed4a75f9658be5a43a7f90b02738f
SHA14fd014bbd7afb8c939a7ec57c84145e7abd7b0bb
SHA256d53cdb0bd6e3396c5f3c679c1d5b943504690227e6430bb1ff811705f32a9b9c
SHA51254dab4fa683fb21e481cda3a84ca0ef26d7c8e92df0db3e78f286960f633fa191551da0ba5157510d6cc14dbd75d4d2a926e1b4a6973299d02f4171f65ee2d1f
-
Filesize
649B
MD59064b5af5d7dbc7c51958a3b32f7fb8f
SHA124bb470b53c8e799877c522e485653f3bee888e3
SHA256351897a555cc3aac2637986d0bcfc7defbcf1d46fe8065a05fa0d73cb12bf48f
SHA512895245923d42b0c99f72c6df76a139b19dae200c7d466b55b2503d49e0662b48b4e637531265418a9f71a149f4f0d425db8613568d62a9116ec27a9a1d2215bd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
280B
MD5cc75c748a8b9b79e398552f29c9570da
SHA1251f0064673a46e2f1233da3cb320c996d1d708f
SHA25618492d42cccaf3f568856e7077ff981ca1280e41cacde87c7868da17dd055099
SHA512d511687ae1ac3dd4144ed0e6c9a6d0182413bb33f37a1b921c0a087423de27f1c501ee78493683c3db1eab7bddcf5e0d0fed329156b116d386c95f9021b14b5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\f056efb4-df3e-46b0-bdc5-38d13a48e99e\index-dir\the-real-index
Filesize1KB
MD5aca937edd534c2cff7cc7be14c97d506
SHA19824ff5f4bac79ab5c66b4dff77d0b4d4eab9e9d
SHA256176fc3854abcf8c410c74b19bcb0c5e9b9de2835dd86f1a58903dafb9df9db79
SHA51291c5e49f9c3547c8368da3e0251edd522b176f9fc6bbb79ea3bca090c571dfb6ab4281a5424aca8da448d17b290a4ed6929f0845571a761aa24d17fa2542d7e9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\f056efb4-df3e-46b0-bdc5-38d13a48e99e\index-dir\the-real-index~RFe57b4e8.TMP
Filesize1KB
MD514ab5dd2cf27a55234002f6575ab3e8d
SHA10513ea7eb1c0c6bae8539948b90666ac1433c098
SHA256ca49186488eadf59c3ad082c4b0edb7172813e0cba353bb590d51b9348b67d51
SHA5120031d7c35e6128802899f79895e72949ce920ebf6a0a6c0ddf7c2b96f0529564e89ef2930823749ab676f6a9fd01c731feff6527ec61e6e5d1ba92ca73c17b5d
-
Filesize
40KB
MD5b04bafc907d4c4bbf9e4727b4f9fd83b
SHA16b1f51f1f2078c8a1fce05e9def9fd08c4e73419
SHA25664f98a710e8677df289e4c6cdd66539023de017d48d196d260dcf0e18a027231
SHA5128d486259f63a1f3ad0dcd9c0ea2cef20101e39f4a19079db2a15e5f2ccbed6d66c97fd5ff91be0b901a409407dfbe123b6d0d732b0e6be14bf1ecae0979abe57