Analysis
-
max time kernel
295s -
max time network
280s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 07:34
Static task
static1
General
-
Target
CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe
-
Size
778KB
-
MD5
4fd5ae8446fc97f481011ebe56bee23b
-
SHA1
438e310a2a92cc1d889c29dada25d9a15ffbf0eb
-
SHA256
6927f5860d17522a78a4e93599a9dc4230fa920f37665c5775250d02e18e9568
-
SHA512
f2fdb70e40f889e0bd86b6527e5ceb28a224e2cb0ec71c7192d5e6fb2c855a12510f109f6132521a877dd71c35d972990a5b19412bbea5d9034628cc1178fc36
-
SSDEEP
12288:j7jnKo7r7xDKW49kF9rIz38om4LsI0nF/dBhdRfviOxbCDTh5F:j7Wo7vNK9gNe8oBqF1TXfviW2Dt5
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.normagroup.com.tr - Port:
21 - Username:
[email protected] - Password:
Qb.X[.j.Yfm[
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 11 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exedescription pid process target process PID 1072 set thread context of 3484 1072 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exeCN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exepowershell.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exeWINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133765617710739603" chrome.exe -
Modifies registry class 1 IoCs
Processes:
mspaint.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings mspaint.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2024 WINWORD.EXE 2024 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
mspaint.exeCN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exepowershell.exechrome.exepid process 3528 mspaint.exe 3528 mspaint.exe 3484 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe 3484 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe 3484 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe 4604 powershell.exe 4604 powershell.exe 4604 powershell.exe 2988 chrome.exe 2988 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exepowershell.exechrome.exedescription pid process Token: SeDebugPrivilege 3484 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe Token: SeDebugPrivilege 4604 powershell.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
chrome.exepid process 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
mspaint.exeOpenWith.exeWINWORD.EXECN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exepid process 3528 mspaint.exe 3964 OpenWith.exe 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 2024 WINWORD.EXE 3484 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exechrome.exedescription pid process target process PID 1072 wrote to memory of 4604 1072 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe powershell.exe PID 1072 wrote to memory of 4604 1072 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe powershell.exe PID 1072 wrote to memory of 4604 1072 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe powershell.exe PID 1072 wrote to memory of 3484 1072 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe PID 1072 wrote to memory of 3484 1072 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe PID 1072 wrote to memory of 3484 1072 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe PID 1072 wrote to memory of 3484 1072 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe PID 1072 wrote to memory of 3484 1072 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe PID 1072 wrote to memory of 3484 1072 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe PID 1072 wrote to memory of 3484 1072 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe PID 1072 wrote to memory of 3484 1072 CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe PID 2988 wrote to memory of 4808 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 4808 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 3920 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 4256 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 4256 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1916 2988 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe"C:\Users\Admin\AppData\Local\Temp\CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe"C:\Users\Admin\AppData\Local\Temp\CN-Statement of Accounts and ETax-OB-XXXXX6856-03012824201808801.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3484
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ResizeMove.jpg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3528
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:3376
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3964
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\OutGet.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2024
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x11c,0x120,0x124,0x118,0xf4,0x7ff9e1bdcc40,0x7ff9e1bdcc4c,0x7ff9e1bdcc582⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,796773030218784699,15328409438924636725,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1804 /prefetch:22⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2036,i,796773030218784699,15328409438924636725,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1684 /prefetch:32⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2304,i,796773030218784699,15328409438924636725,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2508 /prefetch:82⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,796773030218784699,15328409438924636725,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3256,i,796773030218784699,15328409438924636725,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4572,i,796773030218784699,15328409438924636725,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2828
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD50c9856d9b790ec88117b98b78b45da66
SHA1e7b9e60400e52e3f5a3d2fcc51066fc7794e9555
SHA256d6c5ef91ab35e3d721ab1f2e25550aacbc2b0ce5253278ba3ed203aa66bdd2ce
SHA51212c11e36a6f277edd1f5850f8e68e31aeb0313f11409ed5bae2b013d7dd8f450bee0f46d72223b624f284a1b04b90f4a4d18340f0dc736263cacf03f4279592f
-
Filesize
1KB
MD504c7f190efcf33c00d9df27d372033d5
SHA1adef56f804bc27e1e307e02bae9aa12727633c9d
SHA256ec53269c54f71259029bba7311906d9bb244548d47a6e62968391c7300964950
SHA5129714a69e683263a417bdd91671e8927d1aac8b8c6bbc8f0558e4ea7c68e6c66e1cf11b354a9125b569891207cd3e417da05cc625bbc67e05aca379965ef38381
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5caddde66a1d86fc084cbc5e80559742f
SHA13ce27fcfa24039eb097ee1287c8b0975282a7ac0
SHA256174cce89637b38b9e252df9a6dfece8bca2536788312734a813c017ee007a171
SHA512a4d4a8bdf18f403335c7a10aa933153cd8905d977830a8eb876dd6d7cf3d90aca284ddfab012caba1a39b2998ef2c7fba22bd15ddff04bec36c5002eab54eb79
-
Filesize
8KB
MD565ef6af43b76ba55a0742ef6d395b781
SHA1f5f4a13b0c9b2bd9365020d8c05731e2a3a471de
SHA256e8511576226f0112eb10cca2f0966aa1f59905975ff5c543df87a663e47b8470
SHA512d81cd08a4f6342fda1917d367f2e82dd7aee1757a24b1b428e49a58cb6341c27de2e717f7235549d5e7de812fd0ab29200f757028841b2a757179a5edf1a4217
-
Filesize
116KB
MD57f14a927fa74292185d372de552cda45
SHA18f94f61fe4bb9608e3980b7a930376db07c4ff7d
SHA25677895a419bf0da87859c3d9b423ec16df53ceaab99773161cded24f41a17243b
SHA51283dc2a0c70c50359800b11c146a017b8598a5ad4f4b51a42e4857be2ac2ed6978d693ee09ac11bb2d697e005dac4a2fe77a5387ba785c17faac962b90b468342
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
299B
MD58f755d9a643b079e34476319578a5fdd
SHA17e974d6b389039d043e5d71ee8763c7bbfe94078
SHA256ddec6a2a0d9d8ad6a12cf497bd64b7eae35e9407fc78eb18e6f60d908392aa11
SHA5121899e46d7574eecf6344e2455a77c1f84586dbef412c17b98da39805cc3f60df02bb8b240f1990caca1e022152339de8993dadaabe08ae564e3e62132c419bf7
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e