Overview
overview
10Static
static
107zS850A099...ed.exe
windows7-x64
37zS850A099...ed.exe
windows10-2004-x64
77zS850A099...1a.exe
windows7-x64
77zS850A099...1a.exe
windows10-2004-x64
77zS850A099...b7.exe
windows7-x64
107zS850A099...b7.exe
windows10-2004-x64
107zS850A099...5e.exe
windows7-x64
67zS850A099...5e.exe
windows10-2004-x64
67zS850A099...a0.exe
windows7-x64
107zS850A099...a0.exe
windows10-2004-x64
107zS850A099...95.exe
windows7-x64
87zS850A099...95.exe
windows10-2004-x64
77zS850A099...cb.exe
windows7-x64
107zS850A099...cb.exe
windows10-2004-x64
107zS850A099...58.exe
windows7-x64
107zS850A099...58.exe
windows10-2004-x64
107zS850A099...7f.exe
windows7-x64
107zS850A099...7f.exe
windows10-2004-x64
107zS850A099...32.exe
windows7-x64
107zS850A099...32.exe
windows10-2004-x64
107zS850A099...c3.exe
windows7-x64
97zS850A099...c3.exe
windows10-2004-x64
97zS850A099...e9.exe
windows7-x64
107zS850A099...e9.exe
windows10-2004-x64
107zS850A099...8c.exe
windows7-x64
37zS850A099...8c.exe
windows10-2004-x64
37zS850A099...8c.exe
windows7-x64
67zS850A099...8c.exe
windows10-2004-x64
67zS850A099...rl.dll
windows7-x64
37zS850A099...rl.dll
windows10-2004-x64
37zS850A099...pp.dll
windows7-x64
37zS850A099...pp.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 10:03
Behavioral task
behavioral1
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7zS850A099E/libcurl.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
7zS850A099E/libcurl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
7zS850A099E/libcurlpp.dll
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
7zS850A099E/libcurlpp.dll
Resource
win10v2004-20241007-en
General
-
Target
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
-
Size
1.4MB
-
MD5
435a69af01a985b95e39fb2016300bb8
-
SHA1
fc4a01fa471de5fcb5199b4dbcba6763a9eedbee
-
SHA256
d5cdd4249fd1b0aae17942ddb359574b4b22ff14736e79960e704b574806a427
-
SHA512
ea21ff6f08535ed0365a98314c71f0ffb87f1e8a03cdc812bbaa36174acc2f820d6d46c13504d9313de831693a3220c622e2ae244ffbcfe9befcbc321422b528
-
SSDEEP
24576:M4UpDMuCSO5T9iKvkK1dA97hfNpZZ06nlvmp78nLBuzPG+7:AplyTv1gpJk98nLBuzu+7
Malware Config
Signatures
-
Socelars family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\jfhgpjbcoignfibliobpclhpfnadhofn\10.59.13_0\manifest.json 61e74fd78769f_Tue234b6c24d9a0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 18 iplogger.org 19 iplogger.org -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61e74fd78769f_Tue234b6c24d9a0.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 1736 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133756202365054872" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe 180 chrome.exe 180 chrome.exe 180 chrome.exe 180 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeAssignPrimaryTokenPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeLockMemoryPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeIncreaseQuotaPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeMachineAccountPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeTcbPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeSecurityPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeTakeOwnershipPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeLoadDriverPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeSystemProfilePrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeSystemtimePrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeProfSingleProcessPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeIncBasePriorityPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeCreatePagefilePrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeCreatePermanentPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeBackupPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeRestorePrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeShutdownPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeDebugPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeAuditPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeSystemEnvironmentPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeChangeNotifyPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeRemoteShutdownPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeUndockPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeSyncAgentPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeEnableDelegationPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeManageVolumePrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeImpersonatePrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeCreateGlobalPrivilege 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: 31 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: 32 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: 33 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: 34 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: 35 3520 61e74fd78769f_Tue234b6c24d9a0.exe Token: SeDebugPrivilege 1736 taskkill.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 2292 3520 61e74fd78769f_Tue234b6c24d9a0.exe 94 PID 3520 wrote to memory of 2292 3520 61e74fd78769f_Tue234b6c24d9a0.exe 94 PID 3520 wrote to memory of 2292 3520 61e74fd78769f_Tue234b6c24d9a0.exe 94 PID 2292 wrote to memory of 1736 2292 cmd.exe 96 PID 2292 wrote to memory of 1736 2292 cmd.exe 96 PID 2292 wrote to memory of 1736 2292 cmd.exe 96 PID 3520 wrote to memory of 4612 3520 61e74fd78769f_Tue234b6c24d9a0.exe 103 PID 3520 wrote to memory of 4612 3520 61e74fd78769f_Tue234b6c24d9a0.exe 103 PID 4612 wrote to memory of 1280 4612 chrome.exe 104 PID 4612 wrote to memory of 1280 4612 chrome.exe 104 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 844 4612 chrome.exe 105 PID 4612 wrote to memory of 4448 4612 chrome.exe 106 PID 4612 wrote to memory of 4448 4612 chrome.exe 106 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107 PID 4612 wrote to memory of 4992 4612 chrome.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd78769f_Tue234b6c24d9a0.exe"1⤵
- Drops Chrome extension
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd6e97cc40,0x7ffd6e97cc4c,0x7ffd6e97cc583⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2024,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2004 /prefetch:23⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2124 /prefetch:33⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2112 /prefetch:83⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3124 /prefetch:13⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:13⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4432,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1572 /prefetch:13⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3828,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3836 /prefetch:83⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4676,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4688 /prefetch:83⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4672,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4836 /prefetch:83⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3836,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4600 /prefetch:83⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5016,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4928 /prefetch:83⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5032,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5020 /prefetch:83⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5004,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4924 /prefetch:83⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5028,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5000 /prefetch:83⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5268,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5248 /prefetch:23⤵PID:180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5244,i,4120834546727330823,8567932834135728393,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5036 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:180
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1028
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD528b478ae5da83bfed3db4e95b302558d
SHA104fa54f86613fff91dc7aa15747248103e170309
SHA256dd63bb4071675a631e3553cfa6726558857709826d13c5d90847dfb736fe3297
SHA5127cc636fd63cefd349eb63079bc8aaa66d1062f5d62811f7d0de2690573f826fcd3d2ae09779562a62f621deb01709b02975c9747f125cb66d468a9a997583595
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD5704485fce09fe6e9fa500e61ceeec464
SHA1beab04901b8fdf4e62927e6998572d131f3cf065
SHA25644109abd94ca1e2ac8209aeaba63cc11d6e653dd55352f6c63620f322c9338e0
SHA51244accac82b13b360cbf6caced815f7fca932c7deae1948647216c4ccd206df8768e3100656f5a87291e0297b00f2ca75e7cb0eb087e62a85fbf6a8e2665a6ec4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5daffdacf31ff77ed98ce49ed2820fe3e
SHA12284c00bc406dc7d0b670ffc940828885d962d9b
SHA2564ef82a05c55612e2713d8e2f0e4c633865efdb3edce3bcc29fdf003f4b09de80
SHA5121ef211ad03923c944ce9edeb78ba2c518a1a58079ef1f582802e9ffbf25cfa6d32601ec342261e16888cb86092b2138dc209986b16c39b2c24371173eccc8c75
-
Filesize
9KB
MD587c4329622ee6300a9639739ace09a4a
SHA1abe797fbf979b0a029c5511bbc082545d959175c
SHA2561e37a6d9df07138276c1625c02c261bb79beea4ad3ae8f025b0da0c3a21cb845
SHA5120cd2f53706f8258b7cc1d5c5400d10fdcdab722c8031f20a78b73df3103a2ea34888117de9f59a9659d33bdb7af5dec2e49bc83b14ee807192fb8a34639b7eaf
-
Filesize
9KB
MD588aa5fed559cd8a81ecd748481fe4e69
SHA16563e17689aee42ed92e357bbcb1789289635a50
SHA256e9443abbe78b32696f7ac9b288abacdd3bd5f5cfcc28154a22b8ff7cbfa00474
SHA51214efd420c6770d43149aa0352bc7bc0398728dfe06e1d65b1e92502693a3c0ce79869c3bac23cbebe7526b9ba0f16afdf91448b81cd07a99d534b72cdf842b45
-
Filesize
9KB
MD5f29f2cf9498df577efc28fc0a25c7ddc
SHA1c85599cdf338a0e4786a0fe357040e3da99b8ed7
SHA256d357273ad6858693edc29f9f6ba24eec7fd8a2f170bb92e64a6260e9d9b5a086
SHA512184371e1e22b358ee36cc1f0f93637d0d352b63f746ebac1bd4655e52854be99db0d260799e4fdd51452eb84ab49d84e89d1ba79f73d1a39748599212f0d5df0
-
Filesize
9KB
MD5601870b27ae5e3a81b69e1bf0cf494ac
SHA190493dc6a0f4d5e07ad6466b755ec536205e60ef
SHA256cd92722849963eb9845e3d6dc8d90bacc24a055914f002cbe88918e22c2603bb
SHA512747810f3cdeb60c94f1c3b67d733468ec6a4a277aae582f6b5bf2682ff076d94473ad7e9765edc6939394c60a6f5dee536de2b04042f8d18251efa1a5cc28a7f
-
Filesize
9KB
MD5614463b4fed0f8daa0517a1567cee2d3
SHA18fdb8d8031ea7e70b509e74140c43452a0091132
SHA256b9c0b62394136f764c7b502e3ceb91d565ba56aeeecc545157f05a6459a22101
SHA5129bf95bf8c3d1284862ae6c09ba3bd8b1b6b7ac10c09e4d18d6536d52e154f01b4d19d75fde2caec650d07b1f094fbad024afa452bef6097bf5782b8fa0a3238b
-
Filesize
9KB
MD59dc718de61b6a5046c2e16dc89ff1aa4
SHA15877c1afff7b7fbdb760fef81df5b730b84b6785
SHA25688b4ab8fc637a4b39203979c387b0e32c4e5faf675b6d3bc22fe208e9a9d826a
SHA512821350b4a0b870b306266d42d1f9c8a3251f22644337f13a8b9b479816aec71f1ff029bd53160541e686bbedde50899d7d91fb0597d2019d83dc76d8a498253a
-
Filesize
17KB
MD5323a8aecb373992550d8f1fcadb6ce9d
SHA1075e3542af7dbcb0df5d1ff1c9a21298f1348124
SHA256decf401a1aaf084846d7e352992ae4440a4d98bce047d6acada838b15ff8d103
SHA51234581cb860a13b40514cf265af4f03c2c0d751ed6486b473ad22a0d770f1442211b4a675b50e0eb154c95da3d5440fd11c10689d04eef19ece6ef88cf526db1f
-
Filesize
17KB
MD51c3197c221078e0d4c490d2df156d3d9
SHA131e5036956e4db971bde99364b685a228db349f3
SHA256321328d425166d7541464b30a5f234678b50ff1bbd77fa7aa302eda5b6b0f903
SHA512862eabdb8f0a5878c6a073b5ecd624e180a2c0f25edbde617d75795a40d4baebaaf0950499f3d1accdad601abd176db1475c47d592b031f8d950aaf4add90693
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD585d1533e42da2be95b1e9e5102831a65
SHA12efdde8284352659bb7441408f8f3303724d350d
SHA2562df89e2c9d8a4d048fadcdf6564e4d5b339391e1b0220eb549330b113515ae55
SHA51261c4b9cc226156959eb9488725d5aafdbd2c42532083ddabdea2101921c46f8b8bf14e0b4c1cf4aed13ec402967c2551553cfdd906bff5ab232d6e19fb939861
-
Filesize
232KB
MD5c9a7348c43dbf9500976d37d83178c5a
SHA19cae4d7d67edb500e0fdf591d3ed2a978d3fd0eb
SHA25622319db9cf1f3edf78b68ab43b3e0b29180c9acc203faf2e062b7015e5275542
SHA5129ace993004268981f656cf80306f08595e2355ea82d79c23d617ca53218e29fd0c2c9b48bad1f080acf88d16a527449c5a319290fcc4a5889a6b4de7f650f808
-
Filesize
232KB
MD5875cfa38bba00cc49f78b177c7aded1d
SHA1cb21ea095f744a2241a5b3755c47519437ac4349
SHA25682ddb7275241f43277a2aab8f5f9ebe8d4f965570f5f2afb077a895d39c3fc55
SHA512c71ed0b5fa0a429203b46c5a7c4b714bc9fdf03c0c5c00c89a95c2e1ea32b52c5188551476661f0f5b9ddee6c10ea8688939d662e473ba1a6ee908aadd3242bb
-
Filesize
132KB
MD5da75bb05d10acc967eecaac040d3d733
SHA195c08e067df713af8992db113f7e9aec84f17181
SHA25633ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2
SHA51256533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727