Analysis
-
max time kernel
190s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
21-03-2022 02:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://wwe2k22rewards.com
Resource
win7-20220311-en
Malware Config
Signatures
-
PlugX Rat Payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe PlugX C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe PlugX C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe PlugX C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\em004_64.dll PlugX \??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\em004_64.dll PlugX C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe PlugX -
Executes dropped EXE 4 IoCs
Processes:
software_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exepid process 3164 software_reporter_tool.exe 4684 software_reporter_tool.exe 4160 software_reporter_tool.exe 2268 software_reporter_tool.exe -
Loads dropped DLL 7 IoCs
Processes:
software_reporter_tool.exepid process 4160 software_reporter_tool.exe 4160 software_reporter_tool.exe 4160 software_reporter_tool.exe 4160 software_reporter_tool.exe 4160 software_reporter_tool.exe 4160 software_reporter_tool.exe 4160 software_reporter_tool.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exesoftware_reporter_tool.exepid process 3752 chrome.exe 3752 chrome.exe 3484 chrome.exe 3484 chrome.exe 4900 chrome.exe 4900 chrome.exe 5108 chrome.exe 5108 chrome.exe 4304 chrome.exe 4304 chrome.exe 768 chrome.exe 768 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 5000 chrome.exe 4860 chrome.exe 4860 chrome.exe 3164 software_reporter_tool.exe 3164 software_reporter_tool.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
Processes:
chrome.exepid process 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
software_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exedescription pid process Token: 33 4684 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 4684 software_reporter_tool.exe Token: 33 3164 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 3164 software_reporter_tool.exe Token: 33 4160 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 4160 software_reporter_tool.exe Token: 33 2268 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 2268 software_reporter_tool.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe 3484 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3484 wrote to memory of 2004 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2004 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 2940 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3752 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3752 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe PID 3484 wrote to memory of 3984 3484 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://wwe2k22rewards.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc065a4f50,0x7ffc065a4f60,0x7ffc065a4f702⤵PID:2004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1704 /prefetch:22⤵PID:2940
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 /prefetch:82⤵PID:3984
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2912 /prefetch:12⤵PID:3144
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2928 /prefetch:12⤵PID:3156
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4384 /prefetch:82⤵PID:4352
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4356 /prefetch:12⤵PID:4396
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4888 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:4960
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4476 /prefetch:82⤵PID:5068
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:4244
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5536 /prefetch:82⤵PID:4292
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:4384
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3256 /prefetch:82⤵PID:4164
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:4576
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:2800
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:5088
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4460 /prefetch:12⤵PID:4388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2020 /prefetch:82⤵PID:5100
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:116
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:4300
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:2656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:3432
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 /prefetch:82⤵PID:4388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:4956
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:1320
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:1856
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:1352
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4456 /prefetch:82⤵PID:112
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:1732
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2764 /prefetch:12⤵PID:4348
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5672 /prefetch:82⤵PID:4784
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3544 /prefetch:82⤵PID:3156
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=jvVi/HEWfeMfOFBpr5khQjnUlfG5JbTFTLjgjVXf --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=NewCleanerUIExperiment2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3164 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=99.279.200 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff6949b25a0,0x7ff6949b25b0,0x7ff6949b25c03⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4684 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_3164_NVELZQFNKTAYUYKE" --sandboxed-process-id=2 --init-done-notifier=752 --sandbox-mojo-pipe-token=5978680833564376468 --mojo-platform-channel-handle=728 --engine=23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4160 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_3164_NVELZQFNKTAYUYKE" --sandboxed-process-id=3 --init-done-notifier=996 --sandbox-mojo-pipe-token=13793395889732752186 --mojo-platform-channel-handle=9923⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1696,1896951651526044044,7159521791994544002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:1752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e9a7c44d7bda10b5b7a132d46fcdaf35
SHA15217179f094c45ba660777cfa25c7eb00b5c8202
SHA25635351366369a7774f9f30f38dc8aa3cd5e087acd8eae79e80c24526cd40e95a1
SHA512e76308eee65bf0bf31e58d754e07b63092a4109ef3d44df7b746da99d44be6112bc5f970123c4e82523b6d301392e09c2cfc490e304550b42d152cdb0757e774
-
MD5
d0cf72186dbaea05c5a5bf6594225fc3
SHA10e69efd78dc1124122dd8b752be92cb1cbc067a1
SHA256225d4f7e3ab4687f05f817435b883f6c3271b6c4d4018d94fe4398a350d74907
SHA5128122a9a9205cfa67ff87cb4755089e5ed1acf8f807467216c98f09f94704f98497f7aa57ad29e255efa4d7206c577c4cf7fed140afb046499fc2e57e03f55285
-
MD5
7adcb76ec34d774d1435b477e8625c47
SHA1ec4ba0ad028c45489608c6822f3cabb683a07064
SHA256a55be2be943078157b7d1cfb52febd4a95e4c7a37995bb75b19b079cc1ee5b9d
SHA512c1af669ee971b4f4a3bb057fe423a63376cfc19026650036b29d77fed73458d235889a662ac5e12c871c3e77f6fbdb1fa29c0dfa488a4a40fa045d79eb61e7c4
-
MD5
5913dc18fc2a5dd49ba064655ac75c24
SHA1d941ea7f6a7aa6c8b7dbc65fa37b6bf41dcd9069
SHA256090b958bd2806e2571198847fad60ba446282b783d2da44efe3a879d0507701f
SHA512d71edd1d2a5fa643f22fe0947c5910cf6b796845f6a782dd8503907babce49055175010296fbd890ff9ce0b3dd5df7ebfe7b8fb079c0ae4b7e562099d6e84197
-
MD5
ced50723c5ae960adfd3fc726b34cdb1
SHA1962a477d168b786b3d1a301793ab91e1a850f376
SHA2565a9dc132339862cc79f38c1b17db4c0fafa58eec396608ac1583784f1b3b6532
SHA512ad70cac1f0a65362f4c2d1c221564c23fc2beecc9842aeb513a1448f2820d987e014af0557a30d50ae136d0bea83b8254ba871937576d3097fce567add578bee
-
MD5
6e1f355a54cf57047647beb9f5aca079
SHA1529f42911634143507f28d4ea0b6757d6f17af65
SHA25610a6c06788b110c0bfd26603d1dc4e3aec48ba917d4d80dac9fb34f83808eee6
SHA5125ca0bbd9d2337c2e0019969725e904c1ab829dde36d4b35235cc6175d86996dabd2542914d7be0378ed298b758c9e542e059107db8ab7e3de424ac48b8d3aa74
-
MD5
169a2ef320119891cf3189aa3fd23b0e
SHA1de51c936101ef79bbc0f1d3c800cf832d221eef8
SHA2561072d49da0a70640fb9716cb894f4834ff621ca96d4aea1f478754edf4d0f780
SHA5127fe27d360bbf6d410ea9d33d6003ab455cd8b9e5521c00db9bb6c44a7472ccf2083d51034bab5ffc5aef85db36fc758c76b02fa31f0d0024c9d532548a2bf9ca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe
MD53dcd45838971b3e51d01e62c09d36e08
SHA19884fc2f1ed03043d5a6aa5f59625b7a0cad4c2a
SHA256d7081c02c19718ed94ef3154ede0d045c50ba7d9e7653b7b5c589ac1a0b36f81
SHA5126e2b5e3b75bd872bd01c6b8feaea76aea733f75320e4b88877ef1aae061d37ac0de82943502c2c575f67dcd77961bba506d5f16489bd33b8aa621e472fe648fa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe
MD53dcd45838971b3e51d01e62c09d36e08
SHA19884fc2f1ed03043d5a6aa5f59625b7a0cad4c2a
SHA256d7081c02c19718ed94ef3154ede0d045c50ba7d9e7653b7b5c589ac1a0b36f81
SHA5126e2b5e3b75bd872bd01c6b8feaea76aea733f75320e4b88877ef1aae061d37ac0de82943502c2c575f67dcd77961bba506d5f16489bd33b8aa621e472fe648fa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe
MD53dcd45838971b3e51d01e62c09d36e08
SHA19884fc2f1ed03043d5a6aa5f59625b7a0cad4c2a
SHA256d7081c02c19718ed94ef3154ede0d045c50ba7d9e7653b7b5c589ac1a0b36f81
SHA5126e2b5e3b75bd872bd01c6b8feaea76aea733f75320e4b88877ef1aae061d37ac0de82943502c2c575f67dcd77961bba506d5f16489bd33b8aa621e472fe648fa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe
MD53dcd45838971b3e51d01e62c09d36e08
SHA19884fc2f1ed03043d5a6aa5f59625b7a0cad4c2a
SHA256d7081c02c19718ed94ef3154ede0d045c50ba7d9e7653b7b5c589ac1a0b36f81
SHA5126e2b5e3b75bd872bd01c6b8feaea76aea733f75320e4b88877ef1aae061d37ac0de82943502c2c575f67dcd77961bba506d5f16489bd33b8aa621e472fe648fa
-
MD5
2ac72eb7036a5865df0e11b57fc48f6f
SHA1edcc1907a043cecf6165f5d969238dba00951c6b
SHA25689dde43a592f4d91dd1f681e8ffd3d8572ccac885601c7997ce3c777c5f077cc
SHA512a33bae25e245fbdd32a4cc3a13cdc6ab6f3a7feff88dd0e6b85ef8e71c094e88523961b4b59e5be212ac4be6c0914959e14722613fb8ace053f909cfe276e1cd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_3484_1682499114\gkmgaooipdjhmangpemjhigmamcehddo_99.279.200_win64_bfvhlc4qxechbboqg5aqlmsmxe.crx3
MD5fc7e8f8dc9ca62a7bc79d2c5c2833aa8
SHA142c19d481d6b407005d5696db46802f96b180a78
SHA256f34e17cc90ce3e33fece88503070bc71be525c6a75d5a516addf758ae811eb5f
SHA512a4b81dad5dbdcc7442a99e35caeda2585277b9992ffd41bc24e992f89ab34391f82960cd778cb38a787fca80e6ea28e28e560ebd2f960c293aabd30630fcdec4
-
MD5
5e2ec48715685943e1d278ead69f5ec9
SHA1a96964084338ebcd2a0375f81777dea88ed2d8d0
SHA25670497f45af368f6d591eb9b93a097b7b56821b0770ee00f04b2f5901487a0421
SHA5126deaf5fd5456d0493cf8731a97e664bad1e7b00ffc73c099fc0df346e9468d450453d3baf10b18e4061a81b7d1f87cac12425ba7b18160a61c8d0318dc1d0122
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_3484_773346536\hfnkpimlhhgieaddgfemjhofmfblmnib_7227_all_lsfh6spyebdafmygb5defiwx4y.crx3
MD598452d56465c1d85203f6fb928fc844c
SHA16c5175be9ea74db05d76ba9e2cdd2dfb19b59894
SHA256246b5df35ae1e60507b19c3fdd31ccbf3ae2c00f9ebf74ab62daec62525b4a7b
SHA5120abe56e38cbc84ac0df44a82f39f0db93c84b31ed89329a8e70550b3c1a0197df5e256b231019e3e697afad462e5d535acf0d5ff46c97d3c0f07d4cbf52557a3
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_3484_969102917\jamhcnnkihinmdlkakkaopbjbbcngflc_102.0.4954.0_all_g7g6uahutj6lqzfgg72yav5kjq.crx3
MD50c759bb24b325092fc95625eade4c91c
SHA1dfea9712929f9be6efaca85a8465718791ef0049
SHA256e66fc19fe881071fceffec91eea5bf261fcd3912462f489e9350212485dbe50f
SHA512be1e239d66cd3c085764e58a2ae7cb106ffb0928ae9a9f30f1f63e0f51e4ed182cdeb5719a640f528e60e0e913778ea0dcaed4eddc78fe5bddbe9cd53924c7c6
-
MD5
9f02b14b7105ca2b4f136195567834bd
SHA1751e329ccb0873185841e26b60d6e97e0f500d36
SHA256964b969afc3c9a228f9a47ed02ff1f2a6008d94b596d45f05085dce687bffffa
SHA51286d9e1ed687ab427c1f2005cd8b7696ed59142cd798bc0d382f886c42aaa0145339c05abfa79d0a94acae5f591549db1e605c32a2f59d41c5824adb4c9063297
-
MD5
9f02b14b7105ca2b4f136195567834bd
SHA1751e329ccb0873185841e26b60d6e97e0f500d36
SHA256964b969afc3c9a228f9a47ed02ff1f2a6008d94b596d45f05085dce687bffffa
SHA51286d9e1ed687ab427c1f2005cd8b7696ed59142cd798bc0d382f886c42aaa0145339c05abfa79d0a94acae5f591549db1e605c32a2f59d41c5824adb4c9063297
-
MD5
9f02b14b7105ca2b4f136195567834bd
SHA1751e329ccb0873185841e26b60d6e97e0f500d36
SHA256964b969afc3c9a228f9a47ed02ff1f2a6008d94b596d45f05085dce687bffffa
SHA51286d9e1ed687ab427c1f2005cd8b7696ed59142cd798bc0d382f886c42aaa0145339c05abfa79d0a94acae5f591549db1e605c32a2f59d41c5824adb4c9063297
-
MD5
d0cf72186dbaea05c5a5bf6594225fc3
SHA10e69efd78dc1124122dd8b752be92cb1cbc067a1
SHA256225d4f7e3ab4687f05f817435b883f6c3271b6c4d4018d94fe4398a350d74907
SHA5128122a9a9205cfa67ff87cb4755089e5ed1acf8f807467216c98f09f94704f98497f7aa57ad29e255efa4d7206c577c4cf7fed140afb046499fc2e57e03f55285
-
MD5
7adcb76ec34d774d1435b477e8625c47
SHA1ec4ba0ad028c45489608c6822f3cabb683a07064
SHA256a55be2be943078157b7d1cfb52febd4a95e4c7a37995bb75b19b079cc1ee5b9d
SHA512c1af669ee971b4f4a3bb057fe423a63376cfc19026650036b29d77fed73458d235889a662ac5e12c871c3e77f6fbdb1fa29c0dfa488a4a40fa045d79eb61e7c4
-
MD5
5913dc18fc2a5dd49ba064655ac75c24
SHA1d941ea7f6a7aa6c8b7dbc65fa37b6bf41dcd9069
SHA256090b958bd2806e2571198847fad60ba446282b783d2da44efe3a879d0507701f
SHA512d71edd1d2a5fa643f22fe0947c5910cf6b796845f6a782dd8503907babce49055175010296fbd890ff9ce0b3dd5df7ebfe7b8fb079c0ae4b7e562099d6e84197
-
MD5
ced50723c5ae960adfd3fc726b34cdb1
SHA1962a477d168b786b3d1a301793ab91e1a850f376
SHA2565a9dc132339862cc79f38c1b17db4c0fafa58eec396608ac1583784f1b3b6532
SHA512ad70cac1f0a65362f4c2d1c221564c23fc2beecc9842aeb513a1448f2820d987e014af0557a30d50ae136d0bea83b8254ba871937576d3097fce567add578bee
-
MD5
6e1f355a54cf57047647beb9f5aca079
SHA1529f42911634143507f28d4ea0b6757d6f17af65
SHA25610a6c06788b110c0bfd26603d1dc4e3aec48ba917d4d80dac9fb34f83808eee6
SHA5125ca0bbd9d2337c2e0019969725e904c1ab829dde36d4b35235cc6175d86996dabd2542914d7be0378ed298b758c9e542e059107db8ab7e3de424ac48b8d3aa74
-
MD5
169a2ef320119891cf3189aa3fd23b0e
SHA1de51c936101ef79bbc0f1d3c800cf832d221eef8
SHA2561072d49da0a70640fb9716cb894f4834ff621ca96d4aea1f478754edf4d0f780
SHA5127fe27d360bbf6d410ea9d33d6003ab455cd8b9e5521c00db9bb6c44a7472ccf2083d51034bab5ffc5aef85db36fc758c76b02fa31f0d0024c9d532548a2bf9ca
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e