Use a reputable EDR (Endpoint Detection and Response) tool to identify and quarantine the file and any associated stagers.

Harvest passwords and session tokens from web browsers.

Immediately sever the connection to prevent further data exfiltration.

It may use trusted Microsoft applications like msbuild.exe to compile and execute malicious code directly in memory, making it harder for antivirus software to detect.