Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 03:34
Behavioral task
behavioral1
Sample
43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe
Resource
win7-20240903-en
General
-
Target
43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe
-
Size
1.4MB
-
MD5
c521a65d11dca76a0ac886f15e0ba15b
-
SHA1
56154763cc5c5073682c583ee86e99bb2dec14d2
-
SHA256
43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13
-
SHA512
77f7fcb92f1cec4f0de7fc2d5cc226db66f73aebbfd1b65e869e5bb57a1a0995160ecb5c00a0aae2d2993d0a9b3d445bbc8889fefce36f8942feb7198889b486
-
SSDEEP
24576:6sLp0FasdJu/+/dfMs2KLoyaU/5DeTgtMyPtTohzo/Kf4d:npncZO+HCyPtToJoCwd
Malware Config
Signatures
-
Socelars family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 29 iplogger.org 28 iplogger.org -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.png 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.js 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.json 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.js 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.html 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.js 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.js 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.js 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 4260 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133793120994118425" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe 4512 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeAssignPrimaryTokenPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeLockMemoryPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeIncreaseQuotaPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeMachineAccountPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeTcbPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeSecurityPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeTakeOwnershipPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeLoadDriverPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeSystemProfilePrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeSystemtimePrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeProfSingleProcessPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeIncBasePriorityPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeCreatePagefilePrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeCreatePermanentPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeBackupPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeRestorePrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeShutdownPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeDebugPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeAuditPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeSystemEnvironmentPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeChangeNotifyPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeRemoteShutdownPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeUndockPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeSyncAgentPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeEnableDelegationPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeManageVolumePrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeImpersonatePrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeCreateGlobalPrivilege 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: 31 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: 32 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: 33 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: 34 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: 35 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe Token: SeDebugPrivilege 4260 taskkill.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3092 wrote to memory of 3240 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe 84 PID 3092 wrote to memory of 3240 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe 84 PID 3092 wrote to memory of 3240 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe 84 PID 3240 wrote to memory of 4260 3240 cmd.exe 86 PID 3240 wrote to memory of 4260 3240 cmd.exe 86 PID 3240 wrote to memory of 4260 3240 cmd.exe 86 PID 3092 wrote to memory of 3980 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe 89 PID 3092 wrote to memory of 3980 3092 43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe 89 PID 3980 wrote to memory of 3692 3980 chrome.exe 90 PID 3980 wrote to memory of 3692 3980 chrome.exe 90 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 4364 3980 chrome.exe 91 PID 3980 wrote to memory of 2896 3980 chrome.exe 92 PID 3980 wrote to memory of 2896 3980 chrome.exe 92 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93 PID 3980 wrote to memory of 2824 3980 chrome.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe"C:\Users\Admin\AppData\Local\Temp\43fe43a7462d892ae08bfdb50dc07249796bf90631a4975ea75738291b484f13.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff90babcc40,0x7ff90babcc4c,0x7ff90babcc583⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=552,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1776 /prefetch:23⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2208 /prefetch:33⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2468 /prefetch:83⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3144,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:13⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:13⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3804,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3860 /prefetch:23⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4724,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4660 /prefetch:13⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4916,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4976 /prefetch:83⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5020,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5028 /prefetch:83⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5304,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5032 /prefetch:83⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5016,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4984 /prefetch:83⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5556,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5308 /prefetch:83⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5012,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5324 /prefetch:83⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5500,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5560 /prefetch:23⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1164,i,11704956166061402689,2539960427003483740,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5152 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
786B
MD59ffe618d587a0685d80e9f8bb7d89d39
SHA18e9cae42c911027aafae56f9b1a16eb8dd7a739c
SHA256a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e
SHA512a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12
-
Filesize
6KB
MD5c8d8c174df68910527edabe6b5278f06
SHA18ac53b3605fea693b59027b9b471202d150f266f
SHA2569434dd7008059a60d6d5ced8c8a63ab5cae407e7152da98ca4dda408510f08f5
SHA512d439e5124399d1901934319535b7156c0ca8d76b5aa4ddf1dd0b598d43582f6d23c16f96be74d3cd5fe764396da55ca51811d08695f356f12f7a8a71bcc7e45c
-
Filesize
13KB
MD54ff108e4584780dce15d610c142c3e62
SHA177e4519962e2f6a9fc93342137dbb31c33b76b04
SHA256fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a
SHA512d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2
-
Filesize
19KB
MD57167f3803863f6a58f67454e0a4ffbb5
SHA1f860dd4ae91d9f9a4074d68e7ce8afcf37213979
SHA2568d51734f6822a267dc43f5659d7ffe5677558fe860d4fe956a843cc2e7a1c162
SHA512e3608b53f6100fe92062b6e0613710a1b7bd9e10b3feeffda9f356754165882ad9489fdb27f9e9fc57101a8b6abdf941d1a7029d8d9349dfc35464c323c9eb34
-
Filesize
3KB
MD5f79618c53614380c5fdc545699afe890
SHA17804a4621cd9405b6def471f3ebedb07fb17e90a
SHA256f3f30c5c271f80b0a3a329b11d8e72eb404d0c0dc9c66fa162ca97ccaa1e963c
SHA512c4e0c4df6ac92351591859a7c4358b3dcd342e00051bf561e68e3fcc2c94fdd8d14bd0a042d88dca33f6c7e952938786378d804f56e84b4eab99e2a5fee96a4c
-
Filesize
84KB
MD5a09e13ee94d51c524b7e2a728c7d4039
SHA10dc32db4aa9c5f03f3b38c47d883dbd4fed13aae
SHA256160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
SHA512f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a
-
Filesize
604B
MD523231681d1c6f85fa32e725d6d63b19b
SHA1f69315530b49ac743b0e012652a3a5efaed94f17
SHA25603164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a
SHA51236860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2
-
Filesize
268B
MD50f26002ee3b4b4440e5949a969ea7503
SHA131fc518828fe4894e8077ec5686dce7b1ed281d7
SHA256282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d
SHA5124290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11
-
Filesize
1KB
MD56da6b303170ccfdca9d9e75abbfb59f3
SHA11a8070080f50a303f73eba253ba49c1e6d400df6
SHA25666f5620e3bfe4692b14f62baad60e3269327327565ff8b2438e98ce8ed021333
SHA512872957b63e8a0d10791877e5d204022c08c8e8101807d7ebe6fd537d812ad09e14d8555ccf53dc00525a22c02773aa45b8fa643c05247fb0ce6012382855a89a
-
Filesize
649B
MD58d533a3be6e5136f32c1bebb9cc97f63
SHA1dc10f4f8316f3a18cc0695ed920af729d5ca453b
SHA25677d4a3a187c3859a779626a27c8280559532c1d838cef0471c102fc79a46bf46
SHA512739a30fecfd17ae124160875093663e1e261aff903c04c387d15e97ce07a8e8922bbe9d38f8ecee39644bc847c059aaa26bc4a320eec69b6f19c365e2b3b8503
-
Filesize
168B
MD5bed6a9467806d6d30b3836eaeb166867
SHA148cbf16bc73469b001810c65935c58bcd869c379
SHA256a8b3539c060c84cf0bc115f61695aa0ebda2c64dac68185fae4c1d9d43930730
SHA512395f40a8356bb045aec0e1f6a3e4f6b13c1b8af36f2c34c99b01e425823ceb97a18183455e6f0feb090758fe70bf18094db25d7af53809c5339cdc95920155e1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD598a5d9ecbb6bf2b5bebaf689d9d82c62
SHA130a186030f3a64bdc11e38dd5b6a9952cf0f9492
SHA2561a867de03bf9efd6182ca65c3c002cd5cc24f743fbae534e566d7974fe26f219
SHA51251a6ba69895a883c570aee802732ceb7efd2286f5912d55cc93f06890373b13987048dc1a30f9a38468c029142a6f8b266d231a081ca090d218bafbcd3e481dc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD5469b5e678423c989a37d5db09cbb06b1
SHA1b750e8f33b826a5e31780d4a8d3796b991b63405
SHA2566cfc1b1e31046b8780c96914cd3c981fa285d49582390a4ca009256f371c03c5
SHA51211f3c4fb2851a9457619c26a51990bcd4a0876d77b51d1ae079d2b936c460d1d81ac0491ebb35874f6e1cf447c733a64bf671499b13d49c78669ec01ddddff0e
-
Filesize
855B
MD50228fdd058a11e904d4f804ecd40bab2
SHA12c5a08b1bdb82bde09b7963c95b9e299720de03f
SHA25651f76c814cb8a1cd4db8e736295d5c3f8a37a950e699f873c0d85fe052809b38
SHA5121627627770e3441894649f72c152f80c037c0dd4aef85582bc91c5bcdcf0da69fe5e43a3fbaaf9abb031d12110263fbb3f761f89ee7c98ff9af1271e9c80d765
-
Filesize
859B
MD5eb1990c2422aa48de3cc2c1716dcb3ab
SHA1e03d18186e03b694cee4352cb37c9effe57b7ec1
SHA2564cb6d149f7486f292d0f14e038b670ed63c409a26434aab36c1154727860dcc5
SHA5121b2ee847455852289dfb7a7a23d1452008d14fb99ccddac6294dde210c79a808ebf45f68e8e3edf73671270419d59b23bf688ddba0317397c7c240d0b5b4e8f1
-
Filesize
859B
MD5c8d4c94746aee50fed764e4a881da296
SHA17e5c4bb247fc974ce66dc51604e819ac390330d3
SHA25620f79be22f0e3a8fe150f29db7522a3053c5f764596458c96bb21fc05a456e66
SHA512168cfdfedaa25d24503e7b14a7d81140f07c4466574c2f294242c3af5ca208bba7a04543b2b565e7a8247c8944646396c6a0ea0edb810807e9adfb5466eb1e40
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
9KB
MD58a23478879353366a2d91f71c9067da5
SHA1ee3acd5c4a9574a9947ec75e5bf5ff5d8bc3e9b0
SHA256b9793bc11bf795f02a0d5071824a84512a15debdf33f14eda20bc573f02d479a
SHA51226fc20f91c9a998c2acb24140b9d48c971721dedbd2446f1cd9b6b34f5d8fa12988cc188b687860a7a895b3dfb19740747d140c6b23e3ec10920f7bb57f74be8
-
Filesize
9KB
MD563556c135d3747a4a379897a7cd4f96d
SHA14ee108eb9399bd77632690994cf77210554528ab
SHA256ab32b75cc2e8a0f38c15c27fe73621caaf06bdfe9cfc6a756b0d2e5be53898b7
SHA512e8b827127df74e714e4af9583a203206b2a87b56d960f766e7ca54f68194afd928b17ee9d0104ede1bbdbb5358cc7dd8ae0b13ec4a3bd19d106aa55b145e0106
-
Filesize
9KB
MD5fdcd3f451098c2f50ad7316064cb2ba6
SHA109ce0bef98343868914a8ce3b9b2800f926c7937
SHA256eac3f137da173dda390021ff54fcfa25e48dcf4d507aafcceba221532e703d9b
SHA512b614372d4328d26d0eb75a81a3f74ff13efcb0101329f5e57791f9742da669f8a3b00e195d12ce24bf242f9f02b00e6999958c999f3d6addbec43a14b5776d70
-
Filesize
9KB
MD52ecd55831057f58404e775554285b868
SHA13a4678f76337e04fe1069ec2ac18e53cb2048410
SHA256f90fb0b805bf7dc583e912b769d02030eb6ced1147b90fb29cd2094d2e9c133c
SHA51264cdee2f7c20e04f113adc395422cbfa55fe7cad11ce3d7fd90793ce4002bf4fe9481c8ff0cf6d7711dd7ea147c48cea866d52aa6fa00a7450579f1d59e6cfc7
-
Filesize
16KB
MD5798c6faf7de78fb48e2bfd6ca027d14a
SHA1ca1adba1fa5cc0e5ef54e78d54f3f9ca0110b046
SHA25681305a29d5c4673def44a32b8b3b40e03fcf4cb2852375516f95b97c5a0ca05f
SHA5122620d9695d5732667d42656992e6f6b77e1f70126cacd585a3f6d044d8a7e9cef011f22b353f5f29061553e0baaf0eb62346fd590c8716a8c209e6d5b2b8a0d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD58c96f0906a4bd27ee0547ccec073414a
SHA153f3255fe35ac39c3f22cfd7d3d58b960783f985
SHA256cade4afbdcd00e97fced33013d35aa6e0b3c10ffe6aad14218b1d1498bdc68ad
SHA51297c4e43cbc0294b75299c29cbcd3c0e799840c436d9fb78b60591c9927b9a5178068221ae983067d3b5ef2714de9f6f2023a98efaaf1a792e4e113f0b439dd83
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\cfd58579-5c86-44d3-a532-df933ff19f54.tmp
Filesize16KB
MD55f9d3ba975aabc50220d515ff2da5f0d
SHA1722a67c9f6e30b200ebd43a7952ccf0816ae5cb2
SHA256c4d256cf9dac74d2dd9d0a3277e23dcc9399f34358cdab642ac716b36eacd9bc
SHA51233fa222dc62af03d8362653acbb1c84abc3577b913573314fef12c77a1affb9dcad6e0cf3fcea1333e9e112bb36ae2b9dcfabd31b26107c466a3b71f1aeb93f3
-
Filesize
231KB
MD5875857de21f320858f424e202ec2a1ce
SHA17a897dc01e0f3285041740e506674b0ac2d79395
SHA256383ba2d27622e6e94878a5c2f01bc0f1ca885759b211d6c9ff4bd863b34f998a
SHA512843c4c41e2dc6a46635d484342495cac291a6fa944a8f455081f8525c2739a3019c4516464e7e9b0eed0a5fcd98b0b4400275e246865cb67f04e3c78d84b8961
-
Filesize
231KB
MD51dfdb6c16114dcef44b87a9ad82d94f5
SHA1533b971c1156e70ac8853ca378b4e81b8051c0bc
SHA256591dfabefeec4f1d9da2da4dc709b4c2c4f4896fff6066932c4ca61271f87735
SHA51242e3c4c68a9fdf6a67499c71d5dacf905e30408236280c66742b353eccc75f2275cfec5338779a211e931580318de8406f95eb612777ba6b54741bf3b1d1f68e
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3980_1951544410\d3044b88-b385-4378-8dd2-ada865754372.tmp
Filesize150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c