Overview
overview
10Static
static
URLScan
urlscan
1http://1.1.1.1.53
windows7_x64
1http://1.1.1.1.53
windows10_x64
1http://1.1.1.1.53
windows10-2004_x64
10http://1.1.1.1.53
windows11_x64
http://1.1.1.1.53
android_x64
1http://1.1.1.1.53
android_x64
5http://1.1.1.1.53
android_x86
5http://1.1.1.1.53
macos_amd64
1http://1.1.1.1.53
linux_armhf
http://1.1.1.1.53
linux_mips
http://1.1.1.1.53
linux_mipsel
http://1.1.1.1.53
linux_amd64
Analysis
-
max time kernel
1779s -
max time network
1795s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
22-03-2022 01:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://1.1.1.1.53
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
http://1.1.1.1.53
Resource
win10-20220223-en
Behavioral task
behavioral3
Sample
http://1.1.1.1.53
Resource
win10v2004-20220310-en
Behavioral task
behavioral4
Sample
http://1.1.1.1.53
Resource
win11-20220223-en
Behavioral task
behavioral5
Sample
http://1.1.1.1.53
Resource
android-x64-20220310-en
Behavioral task
behavioral6
Sample
http://1.1.1.1.53
Resource
android-x64-arm64-20220310-en
Behavioral task
behavioral7
Sample
http://1.1.1.1.53
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral8
Sample
http://1.1.1.1.53
Resource
macos
Behavioral task
behavioral9
Sample
http://1.1.1.1.53
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral10
Sample
http://1.1.1.1.53
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral11
Sample
http://1.1.1.1.53
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral12
Sample
http://1.1.1.1.53
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Signatures
-
PlugX Rat Payload 1 IoCs
resource yara_rule behavioral3/files/0x0006000000022155-174.dat PlugX -
Executes dropped EXE 4 IoCs
pid Process 5024 software_reporter_tool.exe 1360 software_reporter_tool.exe 1064 software_reporter_tool.exe 4164 software_reporter_tool.exe -
Loads dropped DLL 7 IoCs
pid Process 1064 software_reporter_tool.exe 1064 software_reporter_tool.exe 1064 software_reporter_tool.exe 1064 software_reporter_tool.exe 1064 software_reporter_tool.exe 1064 software_reporter_tool.exe 1064 software_reporter_tool.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 908 chrome.exe 908 chrome.exe 4140 chrome.exe 4140 chrome.exe 4300 chrome.exe 4300 chrome.exe 4140 chrome.exe 4140 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2232 chrome.exe 2828 chrome.exe 2828 chrome.exe 1484 chrome.exe 1484 chrome.exe 3844 chrome.exe 3844 chrome.exe 3832 chrome.exe 3832 chrome.exe 5024 software_reporter_tool.exe 5024 software_reporter_tool.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: 33 1360 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 1360 software_reporter_tool.exe Token: 33 5024 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 5024 software_reporter_tool.exe Token: 33 1064 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 1064 software_reporter_tool.exe Token: 33 4164 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 4164 software_reporter_tool.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4300 wrote to memory of 4140 4300 chrome.exe 83 PID 4300 wrote to memory of 4140 4300 chrome.exe 83 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 2220 4300 chrome.exe 88 PID 4300 wrote to memory of 908 4300 chrome.exe 89 PID 4300 wrote to memory of 908 4300 chrome.exe 89 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90 PID 4300 wrote to memory of 4116 4300 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://1.1.1.1.531⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ffb495f4f50,0x7ffb495f4f60,0x7ffb495f4f702⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1592 /prefetch:22⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2356 /prefetch:82⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2992 /prefetch:12⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2984 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4332 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4564 /prefetch:82⤵PID:676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4588 /prefetch:82⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4552 /prefetch:82⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4868 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4396 /prefetch:12⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 /prefetch:82⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=900 /prefetch:82⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1400 /prefetch:82⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4516 /prefetch:82⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4560 /prefetch:82⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2128 /prefetch:82⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4548 /prefetch:82⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=904 /prefetch:82⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4448 /prefetch:82⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4856 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=904 /prefetch:82⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4280 /prefetch:82⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4352 /prefetch:82⤵PID:776
-
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=tzsONo+I3XDBwxeyp9gYebPUmY3VmQhor3AuOfWl --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=NewCleanerUIExperiment2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=99.279.200 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff7c49625a0,0x7ff7c49625b0,0x7ff7c49625c03⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_5024_OANTQWSBSPXTDVAA" --sandboxed-process-id=2 --init-done-notifier=768 --sandbox-mojo-pipe-token=205382994114254741 --mojo-platform-channel-handle=752 --engine=23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_5024_OANTQWSBSPXTDVAA" --sandboxed-process-id=3 --init-done-notifier=1000 --sandbox-mojo-pipe-token=4392714220050240077 --mojo-platform-channel-handle=9963⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1584,10937756893395834370,4616088113501394594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4856 /prefetch:82⤵PID:3740
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:1376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:944
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:3624
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD512e2c40794242f6be8edf3d657b369f4
SHA1cff5024b69c0f99610b5ff175880103c4edcba6e
SHA25611526e419f69b59919799cb04ac5fb71c7bf6f231ccb417729911d3e7d7f9f6a
SHA512aa3362127079db5b4befacba0bc91241f426ee173183772b7b9320b76035aaec0db0833b07fb394be872ce7fc1168e0a891dfc65d5966dd6d74cf57f34a406e5
-
Filesize
1.2MB
MD5d84999e95a3b01ea71e09942eea95bc8
SHA1dbf5344115e89570abc7af3c2ef080b61f815f19
SHA2564c0c09abb7be2ac488b5a9e1471fffdad65855d350459712abffab4e62f757bd
SHA512bc549d4b207ffd632fb935c58b4d4e57de2eec2c32f77c353cda4945edf5547f6f2696bfddd658333279bf01e7b28ec51bb9fb1aa58848eaa6dd2143923603a7
-
Filesize
768KB
MD59f3ba7dc36a88ded6c8885dd4886a3c0
SHA1decccd7addd0020263cdd747b9a686528952b232
SHA2564decdb8365a615dcd71bad5a8a357ca25d74446c07bccd584e37ba47f3a4ee11
SHA5126d6cfe5a161fbc77adecb955ee2fd27a697df65ea7dca33630b616271863995838cfe60b17231c42699931362cee70c68c9c58c1f657fc9c47712643f778f5f3
-
Filesize
16KB
MD5fe4ed56fd303c5a1c053eaccc7430f83
SHA1952aee1f32060ea2859bda3e221f7987d13930df
SHA256f875966e111f865ffacecb4b2312a01a1b2d9f1baaae717bf032155860dbfccf
SHA512b562bb023e3b6463cc236f54994e13c38a80be20a664382dcdff62cec50b197257ad0cc348e6b316260e8a3799f4c92f40d0605c0f4aab2fc7895c69908b1627
-
Filesize
40B
MD5821c1122f0d1d5d9da13bb3a9b2bbe19
SHA1f571758a82487d499a3a594073d5d03860002a97
SHA256496c5a4bf9c2b9f82d5eed099129e60fd705da43a30511b7f7ac1c02513013d0
SHA51206b00209546e4f13b569191dfc36334c114e0a4b6bc4375e18b4927360e47582900694a10f8de7914ca20090ddc5a688d0907a054579ae961d572c3b5c2b2a38
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe
Filesize13.9MB
MD53dcd45838971b3e51d01e62c09d36e08
SHA19884fc2f1ed03043d5a6aa5f59625b7a0cad4c2a
SHA256d7081c02c19718ed94ef3154ede0d045c50ba7d9e7653b7b5c589ac1a0b36f81
SHA5126e2b5e3b75bd872bd01c6b8feaea76aea733f75320e4b88877ef1aae061d37ac0de82943502c2c575f67dcd77961bba506d5f16489bd33b8aa621e472fe648fa
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1092136905\0.57.44.2492_hnimpnehoodheedghdeeijklkeaacbdc.crx
Filesize6.4MB
MD5b92bbcfd3c31f799c5863d78154db555
SHA186b1b058e1e7d2f1f35e830db446b59e15670e5e
SHA2566f6bc93dcd62dc251850d2ff458fda96083ceb7fbe8eeb11248b8485ef2aea23
SHA51238be0c179619c045a321d1fa2c67dda8419a33075a87f548feed9a858f5ba19b5b980c53d4a3bb5b745c7ce566b53773785aa1f7677e37dd5793ccae76e83787
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1159071961\lmelglejhemejginpboagddgdfbepgmp_323_all_ZZ_adqdw77yqkpha32r7zhdr2jdg3rq.crx3
Filesize45KB
MD5f20ad841bad411b41af1cb4d608922ab
SHA147753d002863313567fb67a42c6442399dfd6c02
SHA256ca33735f84fd65b502ca0f70fc5e2184151a6dbbdbeb28043e6716f0985f5291
SHA512a9c8e82483b72e217055b1c14c415a27ec7a828ce7daaad12fec0e79c698606b776b861b5fdb5cef247b4651107fb3bb35696f7832d5f11b5665c0611ef4c6d2
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1163850008\1.0.6.0_aemomkdncapdnfajjbbcbdebjljbpmpj.crx
Filesize9KB
MD5538846624012e70d0f232abfc055f089
SHA14f51ed1a04440132b603ba782794fc656d877e9f
SHA256c25787c5c76ff9c4c50a87d32802301c9ed80d934830d677bbc6629e290cb5aa
SHA512bde91c6599cbdc2b690c7a24693e5631155d744751620d9bc775771f10d397a699edd4d807b377afc2c2750328ef8b9e3b6182a3282520bc3d737c9f9bfe3226
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1171314175\gkmgaooipdjhmangpemjhigmamcehddo_99.279.200_win64_bfvhlc4qxechbboqg5aqlmsmxe.crx3
Filesize6.5MB
MD5fc7e8f8dc9ca62a7bc79d2c5c2833aa8
SHA142c19d481d6b407005d5696db46802f96b180a78
SHA256f34e17cc90ce3e33fece88503070bc71be525c6a75d5a516addf758ae811eb5f
SHA512a4b81dad5dbdcc7442a99e35caeda2585277b9992ffd41bc24e992f89ab34391f82960cd778cb38a787fca80e6ea28e28e560ebd2f960c293aabd30630fcdec4
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1250380792\khaoiebndkojlmppeemjhbpbandiljpe_48_win_ccfl2wvh5b5bfuztfguafrvlpm.crx3
Filesize5KB
MD5e8fae5f775b15f88fd410e6c9b23c0c4
SHA1149151e2ad212b1a529ca40c5e5510adbd8bba84
SHA2565f1c8af8a15da419e629cc50d85e7326cda080bd1f7df8ac38a16b98e0a2739b
SHA5126d9999f4a2fe6101cb08c1be0299e73c5de7cba756caa4e628d18f80fd8e3243442af6bebdc96bd4c8ce32e24c54f81bc573a12368d8c6b8d826467f58b9baa0
-
Filesize
3KB
MD55e2ec48715685943e1d278ead69f5ec9
SHA1a96964084338ebcd2a0375f81777dea88ed2d8d0
SHA25670497f45af368f6d591eb9b93a097b7b56821b0770ee00f04b2f5901487a0421
SHA5126deaf5fd5456d0493cf8731a97e664bad1e7b00ffc73c099fc0df346e9468d450453d3baf10b18e4061a81b7d1f87cac12425ba7b18160a61c8d0318dc1d0122
-
Filesize
5KB
MD50bf5369cda2102f7a1f1fec9ae6f69ff
SHA11a6b9c07dd6cf2aa5d969499ddff8a0dfc15e86c
SHA256fd515ec0dc30d25a09641b8b83729234bc50f4511e35ce17d24fd996252eaace
SHA51239c131142cecb88eedf7f74bac4dfbc50c1de88f3ffd10d1cca79b154a95c59d6f09c78580367e39dbc648fa0a87a74a4e9a336d691f68388e43b7e2efd40f71
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_1697565310\ggkkehgbnfjpeggfpleeakpidbkibbmn_2022.3.14.1147_all_adu2ewrzm5fugsecmuxlx655fijq.crx3
Filesize9KB
MD5c7709a43f101c22828967a56a0d3a1de
SHA19165a4b834d3cf833187850684f3959bc1fec871
SHA256bfa1a6198e6ca1d70da66818e4de60ea78606520ef33ece1433eb5a3402560e9
SHA51234d4b303f27e7e80e21e9bc361fa682b25e3fcfe0145aba3cef1b1a2df3c7c0d36fa301d17cf73a1bb51cf734d7ee2e88a1b1643f6de83997916d20b159d9312
-
Filesize
111KB
MD5d7d63288830d5930f435d6841de6de5a
SHA1a2afc39ac8fd17fa88030ba8b48d9d8ee93c24d5
SHA256c64c9c1008f3ba5f6e18b3ca524bc98dcd8acfae0a2720a8f1f3ef0f8d643d05
SHA512d4d85fd16a291474f99a6fa9cc76d5432f5865fa0d76e4185ff5ab775045122cdab771e88da8fc317a059ab901373644b2e7251d31c4fa2c389d9b7584351e20
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_2000947545\2018.8.8.0_win64_win_third_party_module_list.crx3
Filesize5KB
MD5a27fd6952edc92d0ce6241a3926cd5e2
SHA1c7b44abb244be659e5afdd22827100a6a94a1f2b
SHA256a8a79d350c2a5e3bc36226633a8e0bed0dfab184e77f38fc8f0820ebacf8eafc
SHA5124a69f9726dda9f2819b87200397f8141cb49abcf08add5d390f84eec9c4da42f7a8c8ddac7840b137f85f9e2a9c13bc369225636fefec57022d63abe505f21cc
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_2108208562\hfnkpimlhhgieaddgfemjhofmfblmnib_7229_all_h72pv2oencmwofj3ce37gzp2oe.crx3
Filesize24KB
MD5bff93165c495ea91ae95071fc3be0842
SHA162ea7fd4ec2a68f2b0b306c7e8a18238ed63256a
SHA25634918dfad8c9af3cdf18ed5782c6670973a08e683d33186d1c761512d590809b
SHA51230951d1802e1840ba1945b8803749a61a991c94a8b01b1704daf19adbe00f7474ce6d27978ca86bc16cd687e0e4241322a5dbb0e668877844ce792e1310ec366
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_415496597\gcmjkmgdlgnkkcocmoeiminaijmmjnii_9.34.0_all_acb7qksdc2wjznjioir7p6lt3dwq.crx3
Filesize37KB
MD5c919be360bcc277412b08aaf36831db4
SHA17c33e8f1f9b245aec0e0e4168a54350615f52d9d
SHA25693823a4e71e764b932ee22dfcf84c24429867a440c5e480e55be527ac30de1ae
SHA512aa82748a902db51d80c6b4c0395d108e1067693d3ef031f599be6f7567bb80d2e76d66932c2e85a6708533e6d1fbbe45c514275be98069fbe887039037038a2c
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_669947555\jamhcnnkihinmdlkakkaopbjbbcngflc_102.0.4956.0_all_ogugyyqsn2cm2tfmo76eyfmhce.crx3
Filesize799KB
MD54c39f2934560747e10a2f3446bf02a08
SHA1753feb3cb47585d584685effb350d811addce0d5
SHA25614d7184db45a9fa27e4aeeba9ec6cf3cef8956f2b75b4546dff1ad545728359a
SHA5129a659dd0a775a8bba807d34e2bc1c9dcc2810c82e5d828eef5a68fe022bb9be3eeaecd6874edf2d5efc8fec1e5c04fc9b841d0f2107d5cdafb3ddc0f9cff65d2
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_690506867\obedbbhbpmojnkanicioggnmelmoomoc_20220222.432047118_all_ENUS500000_hbwjwk7bommr565nn72etjdnwe.crx3
Filesize5.1MB
MD5a75cd4f42d1c9dbdaf22b31e06c0fe44
SHA1dfea9712224315d809cf432b1d84128dfa11ada5
SHA256191e8d0245ef4a9e9fac8966c175ae9b3943d70cfe949de9e33d3c6a19b7c840
SHA512d7b54e94a2a42697a7b25fb287fae12d7342acde89a482dd00c37edbe5234f2c8f899732dd519a0fdff15c1f04cb21bbd618e78df4102e61878aad22a8826449
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_762354855\jflookgnkcckhobaglndicnbbgbonegd_2787_all_acgnvv6n3hacb3n4e4czianutfka.crx3
Filesize26KB
MD5fe78c6753cc2bdb3613881d5f32e2b62
SHA1aad2684de63a8a923163082ddfe8d5dd02e94ed2
SHA256a9316b83adecfbb08b86a942afa6a9dd27ac46decf77d0301482e99166d139c0
SHA512613dae6d1a5ce2e77d342f5c450ddffa74e60bd57feac5c49c1fddd622dea351771f64c152030916a5ff1f0125bfd3a49e3a04f998af6330cd283099a6060da5
-
C:\Users\Admin\AppData\Local\Temp\chrome_BITS_4300_782544570\kiabhabjdbkjdpjbpigfodbdjmbglcoo_2022.03.21.04_all_kysknvibv7hrxnl2wz3m5e3yny.crx3
Filesize10KB
MD5f379c6dd2e8ff62b87dfcf7ee182127a
SHA15ee94653ae72c643198834a1b3e29a241fc07911
SHA2562813194f400ac3d34ed4de57259243e9e8cc38c14f974da6916820ac01bc0342
SHA512eb209e92f3ba5fbef45155488f24a00bcd5b1bf1badc4673cb5dce686b5c7efc9d5169351e6946aa8ea5fddd6ce5efade9777bcd4f10a0156ce9f8552851f105
-
Filesize
9KB
MD5867bf8c831d8385cc3ffa006bc864a22
SHA1c0eaed582e36c741c9d904b89ef29954d2852042
SHA256b4ddbdce4f8d5c080328aa34c19cb533f2eedec580b5d97dc14f74935e4756b7
SHA512359a39916d9cfa6c24ac0c5b152945297a84106bf03aacf69e0439ddc70118adc5ae4a5e26efe9e111c3f26381a7418d9e49a117cd6fd00aedf0a410b9dd8218