Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7 -
submitted
13-07-2020 05:59
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents.exe
Resource
win7
Behavioral task
behavioral2
Sample
Shipping Documents.exe
Resource
win10v200430
General
-
Target
Shipping Documents.exe
-
Size
652KB
-
MD5
9ad127f4f4d28ea19395cb16c194f23d
-
SHA1
21ce15a2f1ee49d7420ea368e51cf92b61028a4c
-
SHA256
9c1f76b540f055b2b6131cde2f6896e73f3e0170070c0551d90d20364156d32c
-
SHA512
b3e6f896c4d0747e0d575b1abc63eb96eb0cd791bce21275c44b58731494fa143f1ba03ea6185ee1d3c25366c32e8b26bdefdd4624f0f9780e3e8fcc64665d13
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ikechukwu112
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/2300-281-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/2300-282-0x0000000000447A3E-mapping.dmp family_agenttesla behavioral1/memory/2300-283-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/2300-284-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Executes dropped EXE 4 IoCs
pid Process 2072 software_reporter_tool.exe 2112 software_reporter_tool.exe 2332 software_reporter_tool.exe 1408 software_reporter_tool.exe -
Patched UPX-packed file 7 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule behavioral1/files/0x00030000000133d9-304.dat patched_upx behavioral1/files/0x00030000000133d9-306.dat patched_upx behavioral1/files/0x00030000000133d9-308.dat patched_upx behavioral1/files/0x00030000000133d9-311.dat patched_upx behavioral1/files/0x00030000000133eb-317.dat patched_upx behavioral1/files/0x00030000000133eb-322.dat patched_upx behavioral1/files/0x00030000000133d9-327.dat patched_upx -
Loads dropped DLL 8 IoCs
pid Process 1420 chrome.exe 2332 software_reporter_tool.exe 2332 software_reporter_tool.exe 2332 software_reporter_tool.exe 2332 software_reporter_tool.exe 2332 software_reporter_tool.exe 2332 software_reporter_tool.exe 2332 software_reporter_tool.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 616 set thread context of 2300 616 Shipping Documents.exe 47 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1496 chrome.exe 1420 chrome.exe 1420 chrome.exe 3052 chrome.exe 2300 Shipping Documents.exe 2300 Shipping Documents.exe 2512 chrome.exe 2632 chrome.exe 2912 chrome.exe 1420 chrome.exe 1420 chrome.exe 2072 software_reporter_tool.exe 2072 software_reporter_tool.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2300 Shipping Documents.exe Token: 33 2112 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 2112 software_reporter_tool.exe Token: 33 2072 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 2072 software_reporter_tool.exe Token: 33 2332 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 2332 software_reporter_tool.exe Token: 33 1408 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 1408 software_reporter_tool.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe 1420 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2300 Shipping Documents.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1420 wrote to memory of 1460 1420 chrome.exe 25 PID 1420 wrote to memory of 1460 1420 chrome.exe 25 PID 1420 wrote to memory of 1460 1420 chrome.exe 25 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1528 1420 chrome.exe 26 PID 1420 wrote to memory of 1496 1420 chrome.exe 27 PID 1420 wrote to memory of 1496 1420 chrome.exe 27 PID 1420 wrote to memory of 1496 1420 chrome.exe 27 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28 PID 1420 wrote to memory of 1764 1420 chrome.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"1⤵
- Suspicious use of SetThreadContext
PID:616 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2300
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=83.0.4103.106 --initial-client-data=0xa4,0xa8,0xac,0x78,0xb0,0x7fefb3ebd28,0x7fefb3ebd38,0x7fefb3ebd482⤵PID:1460
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1080 /prefetch:22⤵PID:1528
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1696 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --instant-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1900 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1320 /prefetch:22⤵PID:2196
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:2300
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:2320
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:2360
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2440
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=3112 /prefetch:82⤵PID:2600
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=3240 /prefetch:82⤵PID:2644
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=3200 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=3268 /prefetch:82⤵PID:2732
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --disable-gpu-compositing --lang=en-US --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=none --enable-audio-service-sandbox --mojo-platform-channel-handle=2924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=3000 /prefetch:82⤵PID:528
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1560
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:828
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:2120
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --disable-gpu-compositing --lang=en-US --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2540 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=none --enable-audio-service-sandbox --mojo-platform-channel-handle=1464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=none --enable-audio-service-sandbox --mojo-platform-channel-handle=1684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=540 /prefetch:82⤵PID:2944
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=none --enable-audio-service-sandbox --mojo-platform-channel-handle=604 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=1492 /prefetch:82⤵PID:3000
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=3052 /prefetch:82⤵PID:472
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=1796 /prefetch:82⤵PID:528
-
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14059893151287167418,4447884844371826383,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=1784 /prefetch:82⤵PID:2020
-
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\83.238.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\83.238.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=U6TA3lEPuCM7m2R+nqS0fmBQ1DHjLSXIPrmTqA+e --registry-suffix=ESET --srt-field-trial-group-name=NewCleanerUIExperiment2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\83.238.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\83.238.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=83.238.200 --initial-client-data=0x160,0x164,0x168,0x134,0x16c,0x13f509928,0x13f509938,0x13f5099483⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\83.238.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\83.238.200\software_reporter_tool.exe" --use-crash-handler-with-id="\\.\pipe\crashpad_2072_KMLGOUGIADJNOVFC" --sandboxed-process-id=2 --init-done-notifier=484 --sandbox-mojo-pipe-token=2723197499843145390 --mojo-platform-channel-handle=456 --engine=23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\83.238.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\83.238.200\software_reporter_tool.exe" --use-crash-handler-with-id="\\.\pipe\crashpad_2072_KMLGOUGIADJNOVFC" --sandboxed-process-id=3 --init-done-notifier=644 --sandbox-mojo-pipe-token=1792513728913948937 --mojo-platform-channel-handle=6403⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-