Resubmissions
19-11-2022 21:40
221119-1jgzlacd49 819-11-2022 13:48
221119-q4ed4adg34 1019-11-2022 06:26
221119-g7aqmscg91 1019-11-2022 05:30
221119-f67hjsbc8t 1015-11-2022 20:50
221115-zm3j2abf6y 1015-11-2022 20:50
221115-zmpm6sfh23 1015-11-2022 20:49
221115-zl6kasfg98 1015-11-2022 20:19
221115-y4ct9sff87 1014-11-2022 19:39
221114-yc4tnsdb92 1014-11-2022 19:34
221114-yakb9adb83 10Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-11-2022 20:50
Static task
static1
Behavioral task
behavioral1
Sample
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe
Resource
win7-20220812-en
General
-
Target
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe
-
Size
307KB
-
MD5
0abe50c1509136bf62d2184ab439e7a5
-
SHA1
722a7e2a0dd66f506ba93d24946b8bf504b100c0
-
SHA256
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50
-
SHA512
0c232d1eaf68c0099fb499fcd40bb33cd604f0259a71b853c296e00cc468342de95548ccf61d9e904cef5d34fd94defbb43f844e9f50a51517c7c95ab66862c5
-
SSDEEP
6144:Gu0FGLnBOUaLPP7S9dW8dsgMF24raEn2E1a:Gu0wTBOU2Pj6EisgM/uUv
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1476-59-0x0000000000220000-0x0000000000229000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
taskmgr.exedb79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exechrome.exechrome.exechrome.exechrome.exechrome.exepid process 548 taskmgr.exe 548 taskmgr.exe 1476 db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe 1476 db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe 548 taskmgr.exe 548 taskmgr.exe 1380 2052 chrome.exe 2060 chrome.exe 1164 chrome.exe 1192 chrome.exe 1588 chrome.exe 1588 chrome.exe 1380 1380 1380 1380 1380 1380 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exepid process 1476 db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 548 taskmgr.exe Token: SeShutdownPrivilege 1380 Token: SeShutdownPrivilege 1380 Token: SeShutdownPrivilege 1380 Token: SeShutdownPrivilege 1380 -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exechrome.exepid process 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exechrome.exepid process 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 548 taskmgr.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
pid process 1380 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exedescription pid process target process PID 1748 wrote to memory of 912 1748 chrome.exe chrome.exe PID 940 wrote to memory of 904 940 chrome.exe chrome.exe PID 1748 wrote to memory of 912 1748 chrome.exe chrome.exe PID 1748 wrote to memory of 912 1748 chrome.exe chrome.exe PID 940 wrote to memory of 904 940 chrome.exe chrome.exe PID 940 wrote to memory of 904 940 chrome.exe chrome.exe PID 1588 wrote to memory of 812 1588 chrome.exe chrome.exe PID 1588 wrote to memory of 812 1588 chrome.exe chrome.exe PID 1588 wrote to memory of 812 1588 chrome.exe chrome.exe PID 288 wrote to memory of 808 288 chrome.exe chrome.exe PID 288 wrote to memory of 808 288 chrome.exe chrome.exe PID 288 wrote to memory of 808 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 288 wrote to memory of 1800 288 chrome.exe chrome.exe PID 1588 wrote to memory of 1392 1588 chrome.exe chrome.exe PID 1588 wrote to memory of 1392 1588 chrome.exe chrome.exe PID 1588 wrote to memory of 1392 1588 chrome.exe chrome.exe PID 1588 wrote to memory of 1392 1588 chrome.exe chrome.exe PID 1588 wrote to memory of 1392 1588 chrome.exe chrome.exe PID 1588 wrote to memory of 1392 1588 chrome.exe chrome.exe PID 1588 wrote to memory of 1392 1588 chrome.exe chrome.exe PID 1588 wrote to memory of 1392 1588 chrome.exe chrome.exe PID 1588 wrote to memory of 1392 1588 chrome.exe chrome.exe PID 1588 wrote to memory of 1392 1588 chrome.exe chrome.exe PID 1588 wrote to memory of 1392 1588 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe"C:\Users\Admin\AppData\Local\Temp\db79d6a667294c81210d9aa4d989f35832e75151863c2d216787028ae673da50.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefa9d4f50,0x7fefa9d4f60,0x7fefa9d4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1080,743196072556502258,9601068264495869248,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1092 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1080,743196072556502258,9601068264495869248,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xbc,0xc0,0xc4,0x90,0xc8,0x7fefa9d4f50,0x7fefa9d4f60,0x7fefa9d4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1108,12206425462328645102,86079935806260714,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1120 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1108,12206425462328645102,86079935806260714,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefa9d4f50,0x7fefa9d4f60,0x7fefa9d4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1076,18081174598172077952,55871692829199463,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1092 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1076,18081174598172077952,55871692829199463,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1076,18081174598172077952,55871692829199463,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1076,18081174598172077952,55871692829199463,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1988 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1076,18081174598172077952,55871692829199463,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1960 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,18081174598172077952,55871692829199463,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefa9d4f50,0x7fefa9d4f60,0x7fefa9d4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1076,17779800989916735164,11255164272925558856,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1088 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1076,17779800989916735164,11255164272925558856,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD5ed6ee0ccef27e8eaaa207e84d4c0cfbb
SHA1a64fb92322975f57bab45209fa6d62ddd48c00b3
SHA2569b304751bccc46470a1ed655964e711da694ea06f8044da017b61a67121ca676
SHA512203becd67b55d13d2f60ccf74f09ec428d48258c1079a2ea16049a2e9a9aed6d97780457f9b8abd99b8b8a860cfcad1e81e32b74bad5cea0ad47810766f5648c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD5ed6ee0ccef27e8eaaa207e84d4c0cfbb
SHA1a64fb92322975f57bab45209fa6d62ddd48c00b3
SHA2569b304751bccc46470a1ed655964e711da694ea06f8044da017b61a67121ca676
SHA512203becd67b55d13d2f60ccf74f09ec428d48258c1079a2ea16049a2e9a9aed6d97780457f9b8abd99b8b8a860cfcad1e81e32b74bad5cea0ad47810766f5648c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD5ed6ee0ccef27e8eaaa207e84d4c0cfbb
SHA1a64fb92322975f57bab45209fa6d62ddd48c00b3
SHA2569b304751bccc46470a1ed655964e711da694ea06f8044da017b61a67121ca676
SHA512203becd67b55d13d2f60ccf74f09ec428d48258c1079a2ea16049a2e9a9aed6d97780457f9b8abd99b8b8a860cfcad1e81e32b74bad5cea0ad47810766f5648c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD5ed6ee0ccef27e8eaaa207e84d4c0cfbb
SHA1a64fb92322975f57bab45209fa6d62ddd48c00b3
SHA2569b304751bccc46470a1ed655964e711da694ea06f8044da017b61a67121ca676
SHA512203becd67b55d13d2f60ccf74f09ec428d48258c1079a2ea16049a2e9a9aed6d97780457f9b8abd99b8b8a860cfcad1e81e32b74bad5cea0ad47810766f5648c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD5ed6ee0ccef27e8eaaa207e84d4c0cfbb
SHA1a64fb92322975f57bab45209fa6d62ddd48c00b3
SHA2569b304751bccc46470a1ed655964e711da694ea06f8044da017b61a67121ca676
SHA512203becd67b55d13d2f60ccf74f09ec428d48258c1079a2ea16049a2e9a9aed6d97780457f9b8abd99b8b8a860cfcad1e81e32b74bad5cea0ad47810766f5648c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
88KB
MD50b8e28a81ad016dac22ab79992bc3a17
SHA127d369c28eda08cd2afac345530de477c1594684
SHA256cb857598327d54d49df88add1a08265ffaa0b0a48ae6f9234d57e5ed6b42d7d3
SHA512dab071f4017ad7822e0abb1c23c2ccaab4ca14c4fa6c74ff3e1f069f7ce719e31dc8a3938b0963d86542932db68b52573b5adcc22988e3b9e174d5c4e5c88bb4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
88KB
MD56eed2ffb5d21fc3b99c0bde9f7db2850
SHA1ade2ddb33ec7f4ff681a42a7df0e143d503bf515
SHA256d84a11165685ee50b74bee2bda698a6a16a5c3b5e3195c459f571183eb256088
SHA5125d69107d95661ba6890dcc88d555034b11493f6aac0fba7fd293b058f68372f52ba532122c406204c0f7db21414118980bb5ebbf5d8ebcb8bd80309358095757
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
88KB
MD56eed2ffb5d21fc3b99c0bde9f7db2850
SHA1ade2ddb33ec7f4ff681a42a7df0e143d503bf515
SHA256d84a11165685ee50b74bee2bda698a6a16a5c3b5e3195c459f571183eb256088
SHA5125d69107d95661ba6890dcc88d555034b11493f6aac0fba7fd293b058f68372f52ba532122c406204c0f7db21414118980bb5ebbf5d8ebcb8bd80309358095757
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
88KB
MD50b8e28a81ad016dac22ab79992bc3a17
SHA127d369c28eda08cd2afac345530de477c1594684
SHA256cb857598327d54d49df88add1a08265ffaa0b0a48ae6f9234d57e5ed6b42d7d3
SHA512dab071f4017ad7822e0abb1c23c2ccaab4ca14c4fa6c74ff3e1f069f7ce719e31dc8a3938b0963d86542932db68b52573b5adcc22988e3b9e174d5c4e5c88bb4
-
\??\pipe\crashpad_1588_URRVICPYHODNGTMGMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\crashpad_1748_ELZCNHPBGGHOYRXIMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\crashpad_288_CSUOZOTFHFUIIBLSMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\crashpad_940_BFQXSKFMPLLBEBPVMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/548-54-0x000007FEFB5D1000-0x000007FEFB5D3000-memory.dmpFilesize
8KB
-
memory/548-55-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1476-59-0x0000000000220000-0x0000000000229000-memory.dmpFilesize
36KB
-
memory/1476-69-0x0000000000400000-0x0000000000850000-memory.dmpFilesize
4.3MB
-
memory/1476-60-0x0000000000400000-0x0000000000850000-memory.dmpFilesize
4.3MB
-
memory/1476-58-0x0000000000988000-0x000000000099E000-memory.dmpFilesize
88KB
-
memory/1476-57-0x0000000074C11000-0x0000000074C13000-memory.dmpFilesize
8KB
-
memory/1476-56-0x0000000000988000-0x000000000099E000-memory.dmpFilesize
88KB