Overview
overview
8Static
static
URLScan
urlscan
1http://124.190.203.2...
windows7-x64
8http://124.190.203.2...
windows10-1703-x64
1http://124.190.203.2...
windows10-2004-x64
8http://124.190.203.2...
windows11-21h2-x64
http://124.190.203.2...
android-10-x64
1http://124.190.203.2...
android-11-x64
1http://124.190.203.2...
android-9-x86
1http://124.190.203.2...
macos-10.15-amd64
1http://124.190.203.2...
debian-9-armhf
http://124.190.203.2...
debian-9-mips
http://124.190.203.2...
debian-9-mipsel
http://124.190.203.2...
ubuntu-18.04-amd64
Analysis
-
max time kernel
1638s -
max time network
1804s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-08-2022 03:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://124.190.203.220
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
http://124.190.203.220
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
http://124.190.203.220
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
http://124.190.203.220
Resource
win11-20220223-en
Behavioral task
behavioral5
Sample
http://124.190.203.220
Resource
android-x64-20220621-en
Behavioral task
behavioral6
Sample
http://124.190.203.220
Resource
android-x64-arm64-20220621-en
Behavioral task
behavioral7
Sample
http://124.190.203.220
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral8
Sample
http://124.190.203.220
Resource
macos-20220504-en
Behavioral task
behavioral9
Sample
http://124.190.203.220
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral10
Sample
http://124.190.203.220
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral11
Sample
http://124.190.203.220
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral12
Sample
http://124.190.203.220
Resource
ubuntu1804-amd64-en-20211208
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
software_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exepid process 1616 software_reporter_tool.exe 768 software_reporter_tool.exe 1192 software_reporter_tool.exe 1980 software_reporter_tool.exe -
Loads dropped DLL 8 IoCs
Processes:
chrome.exesoftware_reporter_tool.exepid process 1684 chrome.exe 1192 software_reporter_tool.exe 1192 software_reporter_tool.exe 1192 software_reporter_tool.exe 1192 software_reporter_tool.exe 1192 software_reporter_tool.exe 1192 software_reporter_tool.exe 1192 software_reporter_tool.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exesoftware_reporter_tool.exepid process 1392 chrome.exe 1684 chrome.exe 1684 chrome.exe 756 chrome.exe 1684 chrome.exe 1684 chrome.exe 1508 chrome.exe 1616 software_reporter_tool.exe 1616 software_reporter_tool.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
software_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exedescription pid process Token: 33 768 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 768 software_reporter_tool.exe Token: 33 1616 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 1616 software_reporter_tool.exe Token: 33 1192 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 1192 software_reporter_tool.exe Token: 33 1980 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 1980 software_reporter_tool.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe 1684 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1684 wrote to memory of 1916 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1916 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1916 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1748 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1392 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1392 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1392 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe PID 1684 wrote to memory of 1516 1684 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://124.190.203.2201⤵
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefaad4f50,0x7fefaad4f60,0x7fefaad4f702⤵PID:1916
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1172 /prefetch:22⤵PID:1748
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 /prefetch:82⤵PID:1516
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2116 /prefetch:12⤵PID:652
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2096 /prefetch:12⤵PID:1504
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:82⤵PID:756
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3316 /prefetch:22⤵PID:628
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:1168
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1956 /prefetch:12⤵PID:996
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2268 /prefetch:12⤵PID:1740
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3080 /prefetch:82⤵PID:560
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:756 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3740 /prefetch:82⤵PID:1732
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3520 /prefetch:82⤵PID:1016
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3764 /prefetch:82⤵PID:672
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3588 /prefetch:12⤵PID:604
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2004 /prefetch:82⤵PID:1276
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2232 /prefetch:12⤵PID:1656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3656 /prefetch:12⤵PID:340
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=980 /prefetch:82⤵PID:756
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\104.288.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\104.288.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=JkTZpePSagx/w4k0aPJoJk94bS+V5Mw829PngXa3 --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=Off2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\104.288.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\104.288.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=104.288.200 --initial-client-data=0x160,0x164,0x168,0x134,0x16c,0x13f322d20,0x13f322d30,0x13f322d403⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:768 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\104.288.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\104.288.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_1616_VTJDOQNJKOZNOICN" --sandboxed-process-id=2 --init-done-notifier=492 --sandbox-mojo-pipe-token=2956836645729692046 --mojo-platform-channel-handle=468 --engine=23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1192 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\104.288.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\104.288.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_1616_VTJDOQNJKOZNOICN" --sandboxed-process-id=3 --init-done-notifier=644 --sandbox-mojo-pipe-token=16428991588682802815 --mojo-platform-channel-handle=6403⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2484 /prefetch:82⤵PID:2024
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 /prefetch:82⤵PID:524
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2232 /prefetch:12⤵PID:952
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3500 /prefetch:82⤵PID:568
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3416 /prefetch:82⤵PID:1560
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1724 /prefetch:82⤵PID:1040
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,12087453154735819800,16419241598923709683,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2244 /prefetch:12⤵PID:1596
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\104.288.200\software_reporter_tool.exe
Filesize14.0MB
MD5e6d6ddba378f802fff618da5fc2f6b8a
SHA1b6a2ea50a699349ae045012819e19edc689fbcc4
SHA256df958e7e33838f0edc01897959f05a80a69413bc9e498015161c6a77d1bf5c6a
SHA5122699f306fb2ad3ae75456a4fa844a26c0006048dbe96a0281c80ffd4a625b479a32786da83fa86561d401a5dc0b3d6ea6a1b6f90d9b8354c2654b0a91739e202
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\104.288.200\software_reporter_tool.exe
Filesize14.0MB
MD5e6d6ddba378f802fff618da5fc2f6b8a
SHA1b6a2ea50a699349ae045012819e19edc689fbcc4
SHA256df958e7e33838f0edc01897959f05a80a69413bc9e498015161c6a77d1bf5c6a
SHA5122699f306fb2ad3ae75456a4fa844a26c0006048dbe96a0281c80ffd4a625b479a32786da83fa86561d401a5dc0b3d6ea6a1b6f90d9b8354c2654b0a91739e202
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\104.288.200\software_reporter_tool.exe
Filesize14.0MB
MD5e6d6ddba378f802fff618da5fc2f6b8a
SHA1b6a2ea50a699349ae045012819e19edc689fbcc4
SHA256df958e7e33838f0edc01897959f05a80a69413bc9e498015161c6a77d1bf5c6a
SHA5122699f306fb2ad3ae75456a4fa844a26c0006048dbe96a0281c80ffd4a625b479a32786da83fa86561d401a5dc0b3d6ea6a1b6f90d9b8354c2654b0a91739e202
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\104.288.200\software_reporter_tool.exe
Filesize14.0MB
MD5e6d6ddba378f802fff618da5fc2f6b8a
SHA1b6a2ea50a699349ae045012819e19edc689fbcc4
SHA256df958e7e33838f0edc01897959f05a80a69413bc9e498015161c6a77d1bf5c6a
SHA5122699f306fb2ad3ae75456a4fa844a26c0006048dbe96a0281c80ffd4a625b479a32786da83fa86561d401a5dc0b3d6ea6a1b6f90d9b8354c2654b0a91739e202
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\104.288.200\software_reporter_tool.exe
Filesize14.0MB
MD5e6d6ddba378f802fff618da5fc2f6b8a
SHA1b6a2ea50a699349ae045012819e19edc689fbcc4
SHA256df958e7e33838f0edc01897959f05a80a69413bc9e498015161c6a77d1bf5c6a
SHA5122699f306fb2ad3ae75456a4fa844a26c0006048dbe96a0281c80ffd4a625b479a32786da83fa86561d401a5dc0b3d6ea6a1b6f90d9b8354c2654b0a91739e202
-
Filesize
2KB
MD50c08072e53a99dc06786fcae64753402
SHA19649217dcef840d805426f73e87d81ddaf960a6d
SHA2566447b2b5303864b5b5875785074b8dcaf9803ef04196f482ba74778638ea21a6
SHA512be2c090ac125c14e57a26cd4403e846efc0202dc4f27ccbb15587956827ab8fc10bb170812a32309b275584e9123cd4baf7e91a50f37395f1d71d114391e68e4
-
Filesize
40B
MD52865b22fa940a3f22c19d96a83f75193
SHA153e545fba695f8daeeda49155776da8362e57236
SHA2564c3c45881449527f4f3dba2be2363ceb3db059bf200b282522dfc6164640eb6b
SHA512e54f3408680f9efdbf9ed96d9395b92b1de765d18e392beecbb0767afdc410311b0991578ee9ab43934dc3958fa9cb148074f9b2cf3a250d28701a8d56b8c622
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
449KB
MD579d7f318441c21d17739e43990697d1d
SHA19683265bf401d11313b768dfc4b3aeb10015d18c
SHA2560ce49dc9f71360bf9dd21b8e3af4641834f85eed7d80a7de0940508437e68970
SHA51267c7a7d3bbadeff21951809d2f843311328771ed46bc1ca14edba486263f56f86922668dd89d11b05a16130380b7543f7c9556d79503c505807407763e9d3595
-
Filesize
37KB
MD5f8b7cac6e9587baabf4045c34890c7ce
SHA161814262c6ee5ceaab2c0263c913cae52e203af7
SHA2568b0613b91229c98dfa5398568a4fa40dde2a2d40028654f74923bc929d6b5b30
SHA5124f80021fa2a6e6bd3cdd8248d6139d105dca984a914184d5b1e251e97daa77e36c4e059ed3a617ad12dd998eb603accd34ef3951261ad997a081d8ac934b6211
-
Filesize
378KB
MD57adcb76ec34d774d1435b477e8625c47
SHA1ec4ba0ad028c45489608c6822f3cabb683a07064
SHA256a55be2be943078157b7d1cfb52febd4a95e4c7a37995bb75b19b079cc1ee5b9d
SHA512c1af669ee971b4f4a3bb057fe423a63376cfc19026650036b29d77fed73458d235889a662ac5e12c871c3e77f6fbdb1fa29c0dfa488a4a40fa045d79eb61e7c4
-
Filesize
2.2MB
MD51b573c20bf9df046d134fe127f0fa306
SHA1a7400ea404c8f66f36b1bc8ed7f5a376e4966bac
SHA25638874996fb8568205fbec9254cf63b504bdb93422a6966dcb4e5d47e977601a7
SHA5125a7149558932987c24ac768cb6805cc8136ffa0660dcc09e50986dd43ae2809eee77376f2e205e84f346b4ea0e841d441f64bc8616980968791ff6b0c6e2b01d
-
Filesize
1.3MB
MD5afa6a767b0745cb03c1e7f5189b258df
SHA1fb834620cb82c9354c103820ed53d67ae1550dcc
SHA2564539600b2b1c78aaae0f1a6766125afd07e24d3b4da5f3c875adf34e9ff8956c
SHA512a4f629a0ebac36b6f4c0f6c91b9a72a87fc716fc90c2e2786d8063b09372f045bb0ec4a0cb266e3ea89474939fc0bb6cf8589abd20e0142d4b37987dfdd0ece4
-
Filesize
6.1MB
MD5ee46beaa6c9244880e8a510d080b4416
SHA1a83c3946a2f53f064e91d8b60d5f6c697a560062
SHA256d4f17bd032ead2a73340e6c14e24a3fa901d0fbae78f49fe4d368a01b788b49c
SHA5124e69dddd1215b1675bac788996019ef3cb22418fbba75c0c7935dafb2b1742bad79cc9ea6814b5f8d1663657a7987499a155cdf57733d1afae42b0e25d475c25
-
Filesize
576KB
MD5169a2ef320119891cf3189aa3fd23b0e
SHA1de51c936101ef79bbc0f1d3c800cf832d221eef8
SHA2561072d49da0a70640fb9716cb894f4834ff621ca96d4aea1f478754edf4d0f780
SHA5127fe27d360bbf6d410ea9d33d6003ab455cd8b9e5521c00db9bb6c44a7472ccf2083d51034bab5ffc5aef85db36fc758c76b02fa31f0d0024c9d532548a2bf9ca
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
449KB
MD579d7f318441c21d17739e43990697d1d
SHA19683265bf401d11313b768dfc4b3aeb10015d18c
SHA2560ce49dc9f71360bf9dd21b8e3af4641834f85eed7d80a7de0940508437e68970
SHA51267c7a7d3bbadeff21951809d2f843311328771ed46bc1ca14edba486263f56f86922668dd89d11b05a16130380b7543f7c9556d79503c505807407763e9d3595
-
Filesize
37KB
MD5f8b7cac6e9587baabf4045c34890c7ce
SHA161814262c6ee5ceaab2c0263c913cae52e203af7
SHA2568b0613b91229c98dfa5398568a4fa40dde2a2d40028654f74923bc929d6b5b30
SHA5124f80021fa2a6e6bd3cdd8248d6139d105dca984a914184d5b1e251e97daa77e36c4e059ed3a617ad12dd998eb603accd34ef3951261ad997a081d8ac934b6211
-
Filesize
378KB
MD57adcb76ec34d774d1435b477e8625c47
SHA1ec4ba0ad028c45489608c6822f3cabb683a07064
SHA256a55be2be943078157b7d1cfb52febd4a95e4c7a37995bb75b19b079cc1ee5b9d
SHA512c1af669ee971b4f4a3bb057fe423a63376cfc19026650036b29d77fed73458d235889a662ac5e12c871c3e77f6fbdb1fa29c0dfa488a4a40fa045d79eb61e7c4
-
Filesize
2.2MB
MD51b573c20bf9df046d134fe127f0fa306
SHA1a7400ea404c8f66f36b1bc8ed7f5a376e4966bac
SHA25638874996fb8568205fbec9254cf63b504bdb93422a6966dcb4e5d47e977601a7
SHA5125a7149558932987c24ac768cb6805cc8136ffa0660dcc09e50986dd43ae2809eee77376f2e205e84f346b4ea0e841d441f64bc8616980968791ff6b0c6e2b01d
-
Filesize
1.3MB
MD5afa6a767b0745cb03c1e7f5189b258df
SHA1fb834620cb82c9354c103820ed53d67ae1550dcc
SHA2564539600b2b1c78aaae0f1a6766125afd07e24d3b4da5f3c875adf34e9ff8956c
SHA512a4f629a0ebac36b6f4c0f6c91b9a72a87fc716fc90c2e2786d8063b09372f045bb0ec4a0cb266e3ea89474939fc0bb6cf8589abd20e0142d4b37987dfdd0ece4
-
Filesize
6.1MB
MD5ee46beaa6c9244880e8a510d080b4416
SHA1a83c3946a2f53f064e91d8b60d5f6c697a560062
SHA256d4f17bd032ead2a73340e6c14e24a3fa901d0fbae78f49fe4d368a01b788b49c
SHA5124e69dddd1215b1675bac788996019ef3cb22418fbba75c0c7935dafb2b1742bad79cc9ea6814b5f8d1663657a7987499a155cdf57733d1afae42b0e25d475c25
-
Filesize
576KB
MD5169a2ef320119891cf3189aa3fd23b0e
SHA1de51c936101ef79bbc0f1d3c800cf832d221eef8
SHA2561072d49da0a70640fb9716cb894f4834ff621ca96d4aea1f478754edf4d0f780
SHA5127fe27d360bbf6d410ea9d33d6003ab455cd8b9e5521c00db9bb6c44a7472ccf2083d51034bab5ffc5aef85db36fc758c76b02fa31f0d0024c9d532548a2bf9ca
-
\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\104.288.200\software_reporter_tool.exe
Filesize14.0MB
MD5e6d6ddba378f802fff618da5fc2f6b8a
SHA1b6a2ea50a699349ae045012819e19edc689fbcc4
SHA256df958e7e33838f0edc01897959f05a80a69413bc9e498015161c6a77d1bf5c6a
SHA5122699f306fb2ad3ae75456a4fa844a26c0006048dbe96a0281c80ffd4a625b479a32786da83fa86561d401a5dc0b3d6ea6a1b6f90d9b8354c2654b0a91739e202