Overview
overview
8Static
static
1Trap-Stealer.rar
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...sample
windows10-2004-x64
3Trap-Steal...er.bat
windows10-2004-x64
1Trap-Steal...der.py
windows10-2004-x64
3Trap-Steal...der.sh
windows10-2004-x64
3Trap-Stealer/index.js
windows10-2004-x64
3Trap-Stealer/main.py
windows10-2004-x64
3Trap-Steal...tor.py
windows10-2004-x64
3Trap-Steal...mat.py
windows10-2004-x64
3Trap-Steal...per.py
windows10-2004-x64
3Trap-Steal...al.bat
windows10-2004-x64
1Trap-Steal...ad.bat
windows10-2004-x64
8Trap-Steal...oad.py
windows10-2004-x64
3Trap-Steal...ler.py
windows10-2004-x64
3Resubmissions
09-07-2024 02:17
240709-cqtpza1err 8Analysis
-
max time kernel
1049s -
max time network
975s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-es -
resource tags
arch:x64arch:x86image:win10v2004-20240704-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
09-07-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
Trap-Stealer.rar
Resource
win10v2004-20240704-es
Behavioral task
behavioral2
Sample
Trap-Stealer/.git/hooks/applypatch-msg.sample
Resource
win10v2004-20240704-es
Behavioral task
behavioral3
Sample
Trap-Stealer/.git/hooks/commit-msg.sample
Resource
win10v2004-20240704-es
Behavioral task
behavioral4
Sample
Trap-Stealer/.git/hooks/fsmonitor-watchman.sample
Resource
win10v2004-20240704-es
Behavioral task
behavioral5
Sample
Trap-Stealer/.git/hooks/post-update.sample
Resource
win10v2004-20240704-es
Behavioral task
behavioral6
Sample
Trap-Stealer/.git/hooks/pre-applypatch.sample
Resource
win10v2004-20240708-es
Behavioral task
behavioral7
Sample
Trap-Stealer/.git/hooks/pre-commit.sample
Resource
win10v2004-20240704-es
Behavioral task
behavioral8
Sample
Trap-Stealer/.git/hooks/pre-merge-commit.sample
Resource
win10v2004-20240704-es
Behavioral task
behavioral9
Sample
Trap-Stealer/.git/hooks/pre-push.sample
Resource
win10v2004-20240704-es
Behavioral task
behavioral10
Sample
Trap-Stealer/.git/hooks/pre-rebase.sample
Resource
win10v2004-20240704-es
Behavioral task
behavioral11
Sample
Trap-Stealer/.git/hooks/pre-receive.sample
Resource
win10v2004-20240704-es
Behavioral task
behavioral12
Sample
Trap-Stealer/.git/hooks/prepare-commit-msg.sample
Resource
win10v2004-20240708-es
Behavioral task
behavioral13
Sample
Trap-Stealer/.git/hooks/push-to-checkout.sample
Resource
win10v2004-20240704-es
Behavioral task
behavioral14
Sample
Trap-Stealer/.git/hooks/sendemail-validate.sample
Resource
win10v2004-20240704-es
Behavioral task
behavioral15
Sample
Trap-Stealer/.git/hooks/update.sample
Resource
win10v2004-20240704-es
Behavioral task
behavioral16
Sample
Trap-Stealer/builder.bat
Resource
win10v2004-20240704-es
Behavioral task
behavioral17
Sample
Trap-Stealer/builder.py
Resource
win10v2004-20240704-es
Behavioral task
behavioral18
Sample
Trap-Stealer/builder.sh
Resource
win10v2004-20240704-es
Behavioral task
behavioral19
Sample
Trap-Stealer/index.js
Resource
win10v2004-20240704-es
Behavioral task
behavioral20
Sample
Trap-Stealer/main.py
Resource
win10v2004-20240704-es
Behavioral task
behavioral21
Sample
Trap-Stealer/obfuscator.py
Resource
win10v2004-20240704-es
Behavioral task
behavioral22
Sample
Trap-Stealer/tools/cookie_reformat.py
Resource
win10v2004-20240704-es
Behavioral task
behavioral23
Sample
Trap-Stealer/tools/pumper.py
Resource
win10v2004-20240708-es
Behavioral task
behavioral24
Sample
Trap-Stealer/trap detection/final.bat
Resource
win10v2004-20240704-es
Behavioral task
behavioral25
Sample
Trap-Stealer/trap detection/payload.bat
Resource
win10v2004-20240704-es
Behavioral task
behavioral26
Sample
Trap-Stealer/trap detection/payload.py
Resource
win10v2004-20240704-es
Behavioral task
behavioral27
Sample
Trap-Stealer/trap extension/IBAN_Stealer.py
Resource
win10v2004-20240704-es
General
-
Target
Trap-Stealer.rar
-
Size
861KB
-
MD5
3a846882eb3f3cdf812d66c6e65eaba6
-
SHA1
e2ece70ff477c4728e49e7cdf6d274c517ec7f14
-
SHA256
953592b85e8972a6496f4f6674b260829cda59c6876ca4a15d03d8440ecc62f6
-
SHA512
63ed471b8ba7aa614d6ebdb00f06dccc68f8f367c9e9e385f8f1164bf893710f007bd574700ef886781334736548d93c50cf690fc3e250f0e8721fabab084323
-
SSDEEP
12288:UxNkHbkbLAuhXj839phX8AufQhCgyJQUgpMTW8V2N9bfBfruqXqsTWfczUx4SP4E:GeY3AiXi9btumn9YWJ9r9qqTYHx4S1hB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133649650926885389" chrome.exe -
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2776 chrome.exe 2776 chrome.exe 3444 chrome.exe 3444 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
OpenWith.exepid process 2912 OpenWith.exe 2912 OpenWith.exe 2912 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2776 wrote to memory of 2080 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2080 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 640 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 4316 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 4316 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe PID 2776 wrote to memory of 2072 2776 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Trap-Stealer.rar1⤵
- Modifies registry class
PID:4048
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2912
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8b480ab58,0x7ff8b480ab68,0x7ff8b480ab782⤵PID:2080
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:22⤵PID:640
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:82⤵PID:4316
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2268 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:82⤵PID:2072
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:12⤵PID:3908
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:12⤵PID:3036
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:12⤵PID:3944
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:82⤵PID:3444
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4808 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:82⤵PID:2396
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:82⤵PID:1376
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2428 --field-trial-handle=1900,i,11640478977704909831,3484939493884279338,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\73e4619a-3cdb-4337-8bf5-2d6239024c80.tmpFilesize
285KB
MD5235a1bd20d2b4f2cd7435edfa1351a22
SHA179ecf283d915cce165f01d0f2703a36c752ee944
SHA2563221f94e6ca737402fedbc65c7f87d4734ee271810da1d0fffff90ee1ca110db
SHA512d851d379bf31f83d6e1d3e226088eb57b35aba24112e43794683f3036f09a80e73d650fb2f90a82df86060fe9fd84db8c7864545e51adfc7782e955fb7eb042a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD54ae718c6cf0b4659504c8acd3520f519
SHA13ad16429a7d1ab9bcb1ef712c320c9b3daf0c3e4
SHA2566f1a0af093af8e799e96ef284bb0d73621fc822c228d6cd4f8815b9f3d6dbc96
SHA512199be20cf0960cbdc06d10eb065d42bc1a7cfb0eba55640fe8795ea9718117725be00272a1be6f9ea9fa2d5c8d09d20d3778277639b2628cd8d4667a52d904b9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5b4520d9b995a6e4064d314b2a89febaa
SHA14998ef077be1b5746a2b69d6548e8ff1da81e7a8
SHA256251d7ee1cf668b01298e144f13c799fdd3c428f709ca56b0f7a21b68f060acb6
SHA5120bd039ebc4a87cbb5d02088d9c0a8edbf81328162943bd50cdb0681334c03358c9b3b6493a92b45c0bec9563671f7ecfebfb7d8620ef9000629b9dae634220d5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5c9b8bd013e89bc5e98d038a1140863f6
SHA11ea877fb5d1795b4fc6e0fce9a936b6ab66d6dd5
SHA2563703525822f04c697b6c36eb366b809b555650d6a184bfde9eb3425708c62c3f
SHA5123349ef696ea23b1f8d5677543df84ba97668bc8dfc546a6737a84c779c412d1901704f2394be1ebe8c6c790e1ae96d878e3f108bc380780e500566d17f550968
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
356B
MD53137cd126e0eb5ee8c6318f2d4b6e555
SHA1ea84cbf6548d3735901938670351d93c0c9565d1
SHA256363ea939efa9229dfa3bba735520c630da08a8bc222e3c4ff1a6536e78650966
SHA512c272ef1d171daf44064596671ecb2095deac7f8c3036ddcc6dbf39895ecd943cc30509f5714393f6ef06ed20caad60b5cf0371816731f1966e25bc81f54fe656
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5404dda78000c9df7fbc9c3f3ee3de24d
SHA1b2cff1e6f1650bfbe5eb853295ddc2d641918c4e
SHA25618283969604366ed5f5c270892f7ef55bcf877798f3a8796236181b5a4fc7422
SHA512d01b88c98086c39f5f871ee5b9a3c16ac62c789c8f5387803062b378333c3177148adbc88bfe2bd3ec338806b132a018daedf2c75b9a9c7fb15784c4e6eda3aa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b724f0f2-82a3-4d20-9d6b-310750647186.tmpFilesize
16KB
MD54945de3c04036500e6a995fa963fd3c6
SHA17371d270e589bd7a58cf43660a9c88d4933b8c1a
SHA2560209fc3d96ea11b448aeb5f1df492b4ef9e6a6aae46bfddd8d287fc01eaa035c
SHA5120988a5fc78400c524f0c1bb93453722cd93eedef78cfbac7caad4fd1a2b1dd99fe5b4d0f6a6c9d67254ac3465011dc43a0d7fe09f2b28bb76620d730b1cd737b
-
\??\pipe\crashpad_2776_CGHGMRHCGIUYPMSVMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e