Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
25-03-2022 01:19
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
PlugX Rat Payload 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe PlugX C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe PlugX C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe PlugX \Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\em004_64.dll PlugX \??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\em004_64.dll PlugX -
Executes dropped EXE 4 IoCs
Processes:
software_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exepid process 3088 software_reporter_tool.exe 984 software_reporter_tool.exe 528 software_reporter_tool.exe 1264 software_reporter_tool.exe -
Loads dropped DLL 7 IoCs
Processes:
software_reporter_tool.exepid process 528 software_reporter_tool.exe 528 software_reporter_tool.exe 528 software_reporter_tool.exe 528 software_reporter_tool.exe 528 software_reporter_tool.exe 528 software_reporter_tool.exe 528 software_reporter_tool.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exepid process 4092 chrome.exe 4092 chrome.exe 3956 chrome.exe 3956 chrome.exe 1160 chrome.exe 1160 chrome.exe 1760 chrome.exe 1760 chrome.exe 220 chrome.exe 220 chrome.exe 4004 chrome.exe 4004 chrome.exe 2548 chrome.exe 2548 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 2340 chrome.exe 1632 chrome.exe 1632 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
software_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exedescription pid process Token: 33 984 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 984 software_reporter_tool.exe Token: 33 3088 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 3088 software_reporter_tool.exe Token: 33 528 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 528 software_reporter_tool.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe 3956 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3956 wrote to memory of 3944 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3944 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 3904 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 4092 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 4092 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe PID 3956 wrote to memory of 1428 3956 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://paper.li/VUUN0GvrsqIi5egnrqkZp/story/shared-document-uYBiOJgPhBa0pRi59Ryuo1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffcd5ba4f50,0x7ffcd5ba4f60,0x7ffcd5ba4f702⤵PID:3944
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1492 /prefetch:22⤵PID:3904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2340 /prefetch:82⤵PID:1428
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2964 /prefetch:12⤵PID:2980
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2948 /prefetch:12⤵PID:2984
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4240 /prefetch:82⤵PID:980
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:1216
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:2828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:3208
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:3696
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:3760
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:984
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:3420
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:724
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:3068
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:3224
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:1444
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4388 /prefetch:82⤵PID:1520
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:1832
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4120 /prefetch:82⤵PID:1092
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2000 /prefetch:82⤵PID:1160
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4324 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:2888
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=j5tNAKl2Ybbw5yb3/QoXXDc1fVAqyDwRaq143+EQ --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=NewCleanerUIExperiment2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3088 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=99.279.200 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0x7ff7203125a0,0x7ff7203125b0,0x7ff7203125c03⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:984 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_3088_PVELZMVHOIQALHJA" --sandboxed-process-id=2 --init-done-notifier=724 --sandbox-mojo-pipe-token=16408185482475870629 --mojo-platform-channel-handle=696 --engine=23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:528 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_3088_PVELZMVHOIQALHJA" --sandboxed-process-id=3 --init-done-notifier=928 --sandbox-mojo-pipe-token=13506263892125053597 --mojo-platform-channel-handle=9243⤵
- Executes dropped EXE
PID:1264 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1480,1313726214627715289,8475409661327233115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe
MD53dcd45838971b3e51d01e62c09d36e08
SHA19884fc2f1ed03043d5a6aa5f59625b7a0cad4c2a
SHA256d7081c02c19718ed94ef3154ede0d045c50ba7d9e7653b7b5c589ac1a0b36f81
SHA5126e2b5e3b75bd872bd01c6b8feaea76aea733f75320e4b88877ef1aae061d37ac0de82943502c2c575f67dcd77961bba506d5f16489bd33b8aa621e472fe648fa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe
MD53dcd45838971b3e51d01e62c09d36e08
SHA19884fc2f1ed03043d5a6aa5f59625b7a0cad4c2a
SHA256d7081c02c19718ed94ef3154ede0d045c50ba7d9e7653b7b5c589ac1a0b36f81
SHA5126e2b5e3b75bd872bd01c6b8feaea76aea733f75320e4b88877ef1aae061d37ac0de82943502c2c575f67dcd77961bba506d5f16489bd33b8aa621e472fe648fa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe
MD53dcd45838971b3e51d01e62c09d36e08
SHA19884fc2f1ed03043d5a6aa5f59625b7a0cad4c2a
SHA256d7081c02c19718ed94ef3154ede0d045c50ba7d9e7653b7b5c589ac1a0b36f81
SHA5126e2b5e3b75bd872bd01c6b8feaea76aea733f75320e4b88877ef1aae061d37ac0de82943502c2c575f67dcd77961bba506d5f16489bd33b8aa621e472fe648fa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe
MD5b213c616927cc2d9c457b79b108c2562
SHA132535d94a64bb767d35a35034319f611b4c36a76
SHA2564f2f3349aeb728eb10479f41dd284b2aaa9e83e70e7cf41af2ef00ddae6ee3b2
SHA512153045347486e09f3da52a2a8dde001d36a9eef6c92cbc433c4725801a57b6217eefd1249f52563f3071e93aea04ce9ec1e33729eb6f51634a16cb255a531ffe
-
MD5
61a0f6272a6433d2a87bb48b99f9fe77
SHA1eddc211943253f42deedc376e83d50f84d80347e
SHA25620353878365dedfee8a92fd4de688ff484834bd602c64fe53dfd0ee72ff7f40c
SHA512cee35c9ee8d2e247d018f96256b6e06cf8c4df8e7629b28ffef8a432738a2fb66f6a059e59dfd5135ff6e4099348dd8128e7094b08cca6fa0637ad130f21b17c
-
MD5
d141b94e381dea02779cd8520bd056b6
SHA1ac5c2fa4eec506eb3d5e8c60ab9a949236ba5e52
SHA256d82f870352c079429388e72f843dde3246344c1e30bb0e2166afec8d9985a4b4
SHA512e79914ce5add8049678b204d8d8ab454fd4c2ed86a756c11b716fd371eb2dc0cb3689896175e255929ef50d8bd06562555609647f926da4dee6ee65a613529eb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d141b94e381dea02779cd8520bd056b6
SHA1ac5c2fa4eec506eb3d5e8c60ab9a949236ba5e52
SHA256d82f870352c079429388e72f843dde3246344c1e30bb0e2166afec8d9985a4b4
SHA512e79914ce5add8049678b204d8d8ab454fd4c2ed86a756c11b716fd371eb2dc0cb3689896175e255929ef50d8bd06562555609647f926da4dee6ee65a613529eb
-
MD5
d0cf72186dbaea05c5a5bf6594225fc3
SHA10e69efd78dc1124122dd8b752be92cb1cbc067a1
SHA256225d4f7e3ab4687f05f817435b883f6c3271b6c4d4018d94fe4398a350d74907
SHA5128122a9a9205cfa67ff87cb4755089e5ed1acf8f807467216c98f09f94704f98497f7aa57ad29e255efa4d7206c577c4cf7fed140afb046499fc2e57e03f55285
-
MD5
7adcb76ec34d774d1435b477e8625c47
SHA1ec4ba0ad028c45489608c6822f3cabb683a07064
SHA256a55be2be943078157b7d1cfb52febd4a95e4c7a37995bb75b19b079cc1ee5b9d
SHA512c1af669ee971b4f4a3bb057fe423a63376cfc19026650036b29d77fed73458d235889a662ac5e12c871c3e77f6fbdb1fa29c0dfa488a4a40fa045d79eb61e7c4
-
MD5
5913dc18fc2a5dd49ba064655ac75c24
SHA1d941ea7f6a7aa6c8b7dbc65fa37b6bf41dcd9069
SHA256090b958bd2806e2571198847fad60ba446282b783d2da44efe3a879d0507701f
SHA512d71edd1d2a5fa643f22fe0947c5910cf6b796845f6a782dd8503907babce49055175010296fbd890ff9ce0b3dd5df7ebfe7b8fb079c0ae4b7e562099d6e84197
-
MD5
ced50723c5ae960adfd3fc726b34cdb1
SHA1962a477d168b786b3d1a301793ab91e1a850f376
SHA2565a9dc132339862cc79f38c1b17db4c0fafa58eec396608ac1583784f1b3b6532
SHA512ad70cac1f0a65362f4c2d1c221564c23fc2beecc9842aeb513a1448f2820d987e014af0557a30d50ae136d0bea83b8254ba871937576d3097fce567add578bee
-
MD5
b1f911a1c0d2589a29f72ff96791f427
SHA1c9c1a7a56e767513f76fd0dbc53c84ec3fc066d1
SHA2561a2fefbd0803bf6b3875257b216cc7d397881293d122d04e95a5f7a54a72dd2b
SHA5127444dca90f3bccf07d5105ef8bbd262f87ce898be50ab1eef5a464cae3d075e2cefacd1ee8882300f6872b9d926c695f0211a19a6f6f3c3c089dcff87525bc54
-
MD5
169a2ef320119891cf3189aa3fd23b0e
SHA1de51c936101ef79bbc0f1d3c800cf832d221eef8
SHA2561072d49da0a70640fb9716cb894f4834ff621ca96d4aea1f478754edf4d0f780
SHA5127fe27d360bbf6d410ea9d33d6003ab455cd8b9e5521c00db9bb6c44a7472ccf2083d51034bab5ffc5aef85db36fc758c76b02fa31f0d0024c9d532548a2bf9ca
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
e9a7c44d7bda10b5b7a132d46fcdaf35
SHA15217179f094c45ba660777cfa25c7eb00b5c8202
SHA25635351366369a7774f9f30f38dc8aa3cd5e087acd8eae79e80c24526cd40e95a1
SHA512e76308eee65bf0bf31e58d754e07b63092a4109ef3d44df7b746da99d44be6112bc5f970123c4e82523b6d301392e09c2cfc490e304550b42d152cdb0757e774
-
MD5
d0cf72186dbaea05c5a5bf6594225fc3
SHA10e69efd78dc1124122dd8b752be92cb1cbc067a1
SHA256225d4f7e3ab4687f05f817435b883f6c3271b6c4d4018d94fe4398a350d74907
SHA5128122a9a9205cfa67ff87cb4755089e5ed1acf8f807467216c98f09f94704f98497f7aa57ad29e255efa4d7206c577c4cf7fed140afb046499fc2e57e03f55285
-
MD5
7adcb76ec34d774d1435b477e8625c47
SHA1ec4ba0ad028c45489608c6822f3cabb683a07064
SHA256a55be2be943078157b7d1cfb52febd4a95e4c7a37995bb75b19b079cc1ee5b9d
SHA512c1af669ee971b4f4a3bb057fe423a63376cfc19026650036b29d77fed73458d235889a662ac5e12c871c3e77f6fbdb1fa29c0dfa488a4a40fa045d79eb61e7c4
-
MD5
5913dc18fc2a5dd49ba064655ac75c24
SHA1d941ea7f6a7aa6c8b7dbc65fa37b6bf41dcd9069
SHA256090b958bd2806e2571198847fad60ba446282b783d2da44efe3a879d0507701f
SHA512d71edd1d2a5fa643f22fe0947c5910cf6b796845f6a782dd8503907babce49055175010296fbd890ff9ce0b3dd5df7ebfe7b8fb079c0ae4b7e562099d6e84197
-
MD5
ced50723c5ae960adfd3fc726b34cdb1
SHA1962a477d168b786b3d1a301793ab91e1a850f376
SHA2565a9dc132339862cc79f38c1b17db4c0fafa58eec396608ac1583784f1b3b6532
SHA512ad70cac1f0a65362f4c2d1c221564c23fc2beecc9842aeb513a1448f2820d987e014af0557a30d50ae136d0bea83b8254ba871937576d3097fce567add578bee
-
MD5
c73c95525a7b414d0f1335091e59f017
SHA1552139262332c27decc5685b2e458466e1e7e9a8
SHA2563bb798f49dbae00e17288d2ae95529e3111c7be0a2803166c65fd7e23ae24623
SHA512392106f4c5c0b264860a222763fe90d9cd655f73072250f1443940d467f6607456c594901457969e0f99bb28e81bbae79202af1e5e334a426e29d0a9ce23c720
-
MD5
169a2ef320119891cf3189aa3fd23b0e
SHA1de51c936101ef79bbc0f1d3c800cf832d221eef8
SHA2561072d49da0a70640fb9716cb894f4834ff621ca96d4aea1f478754edf4d0f780
SHA5127fe27d360bbf6d410ea9d33d6003ab455cd8b9e5521c00db9bb6c44a7472ccf2083d51034bab5ffc5aef85db36fc758c76b02fa31f0d0024c9d532548a2bf9ca