Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 20:57
Behavioral task
behavioral1
Sample
c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe
Resource
win7-20240903-en
General
-
Target
c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe
-
Size
1.4MB
-
MD5
12e347e158f019389307ddb157078a5c
-
SHA1
7a5d5f03f4c50ac1faca4fbd10c9a28ca92b6ab7
-
SHA256
c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b
-
SHA512
5c3a0c034675420a9942cf248839d570aff3cec8be34aa0e61d35665d77bd8f83b84479d6418499b69404ec067605245ed60e7c266ca1be75cce40107ede4707
-
SSDEEP
24576:qsLp0FasdJu/+/dfMs2KLoyaU/5DeTgtMyPtToFQo/NkGd:XpncZO+HCyPtToWoVkGd
Malware Config
Signatures
-
Socelars family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 28 iplogger.org 29 iplogger.org -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.png c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.json c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.html c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 3860 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133793746488070965" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1104 chrome.exe 1104 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeAssignPrimaryTokenPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeLockMemoryPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeIncreaseQuotaPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeMachineAccountPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeTcbPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeSecurityPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeTakeOwnershipPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeLoadDriverPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeSystemProfilePrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeSystemtimePrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeProfSingleProcessPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeIncBasePriorityPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeCreatePagefilePrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeCreatePermanentPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeBackupPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeRestorePrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeShutdownPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeDebugPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeAuditPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeSystemEnvironmentPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeChangeNotifyPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeRemoteShutdownPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeUndockPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeSyncAgentPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeEnableDelegationPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeManageVolumePrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeImpersonatePrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeCreateGlobalPrivilege 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: 31 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: 32 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: 33 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: 34 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: 35 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeDebugPrivilege 3860 taskkill.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe Token: SeCreatePagefilePrivilege 1104 chrome.exe Token: SeShutdownPrivilege 1104 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3408 wrote to memory of 4760 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe 84 PID 3408 wrote to memory of 4760 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe 84 PID 3408 wrote to memory of 4760 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe 84 PID 4760 wrote to memory of 3860 4760 cmd.exe 86 PID 4760 wrote to memory of 3860 4760 cmd.exe 86 PID 4760 wrote to memory of 3860 4760 cmd.exe 86 PID 3408 wrote to memory of 1104 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe 96 PID 3408 wrote to memory of 1104 3408 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe 96 PID 1104 wrote to memory of 2236 1104 chrome.exe 97 PID 1104 wrote to memory of 2236 1104 chrome.exe 97 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 4812 1104 chrome.exe 98 PID 1104 wrote to memory of 1916 1104 chrome.exe 99 PID 1104 wrote to memory of 1916 1104 chrome.exe 99 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100 PID 1104 wrote to memory of 5048 1104 chrome.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe"C:\Users\Admin\AppData\Local\Temp\c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9e2c2cc40,0x7ff9e2c2cc4c,0x7ff9e2c2cc583⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1944 /prefetch:23⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1912,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:33⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2572 /prefetch:83⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3132,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3140 /prefetch:13⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:13⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3800,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3876 /prefetch:23⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4620,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4704 /prefetch:13⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4980,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4992 /prefetch:83⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4996,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5012 /prefetch:83⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4992,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5180 /prefetch:83⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5208,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5300 /prefetch:83⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5012,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5008 /prefetch:83⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5016 /prefetch:83⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4960,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5240 /prefetch:23⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5156,i,4857298104609319304,7592794320223427172,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5020 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3388
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
786B
MD59ffe618d587a0685d80e9f8bb7d89d39
SHA18e9cae42c911027aafae56f9b1a16eb8dd7a739c
SHA256a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e
SHA512a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12
-
Filesize
6KB
MD5c8d8c174df68910527edabe6b5278f06
SHA18ac53b3605fea693b59027b9b471202d150f266f
SHA2569434dd7008059a60d6d5ced8c8a63ab5cae407e7152da98ca4dda408510f08f5
SHA512d439e5124399d1901934319535b7156c0ca8d76b5aa4ddf1dd0b598d43582f6d23c16f96be74d3cd5fe764396da55ca51811d08695f356f12f7a8a71bcc7e45c
-
Filesize
13KB
MD54ff108e4584780dce15d610c142c3e62
SHA177e4519962e2f6a9fc93342137dbb31c33b76b04
SHA256fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a
SHA512d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2
-
Filesize
19KB
MD54822b021eab059531eef38552ee23e90
SHA18dcfe26e88b5d4a13060c4c590d12e01d163a76d
SHA2560f2e227138adcd1d1e50c13cc516fc7717a68ca6c3113775543fa07eb359409c
SHA512007c9ad523f742df297f788a968af6116fa741ffe01b96f05dd8c1af59290b6c51c0d57c6ae63b699b9e3c248c554a5c3c1d8dc8ee31d69cf88458d182773f59
-
Filesize
3KB
MD5f79618c53614380c5fdc545699afe890
SHA17804a4621cd9405b6def471f3ebedb07fb17e90a
SHA256f3f30c5c271f80b0a3a329b11d8e72eb404d0c0dc9c66fa162ca97ccaa1e963c
SHA512c4e0c4df6ac92351591859a7c4358b3dcd342e00051bf561e68e3fcc2c94fdd8d14bd0a042d88dca33f6c7e952938786378d804f56e84b4eab99e2a5fee96a4c
-
Filesize
84KB
MD5a09e13ee94d51c524b7e2a728c7d4039
SHA10dc32db4aa9c5f03f3b38c47d883dbd4fed13aae
SHA256160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
SHA512f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a
-
Filesize
604B
MD523231681d1c6f85fa32e725d6d63b19b
SHA1f69315530b49ac743b0e012652a3a5efaed94f17
SHA25603164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a
SHA51236860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2
-
Filesize
268B
MD50f26002ee3b4b4440e5949a969ea7503
SHA131fc518828fe4894e8077ec5686dce7b1ed281d7
SHA256282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d
SHA5124290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11
-
Filesize
1KB
MD56da6b303170ccfdca9d9e75abbfb59f3
SHA11a8070080f50a303f73eba253ba49c1e6d400df6
SHA25666f5620e3bfe4692b14f62baad60e3269327327565ff8b2438e98ce8ed021333
SHA512872957b63e8a0d10791877e5d204022c08c8e8101807d7ebe6fd537d812ad09e14d8555ccf53dc00525a22c02773aa45b8fa643c05247fb0ce6012382855a89a
-
Filesize
649B
MD51023be5ceb09ab2f0ee72121836d7e37
SHA1e1cae70a86c7fa03377de5e0972cb9b01792c5ed
SHA256f2ca002d1e6b22452d1c5f86aa007e71c2277f7cdc5af63acf17878166cf171a
SHA5124361d2c4636ef97c9e45f77467d536e33d00e507e017f349429752b011547454c7abdcd074286742fc606cdde65e3ef8848bbcc43482f6d8a4c37cb3e5b9fcfb
-
Filesize
168B
MD5a97238efa5b879e8ecace9312462a78c
SHA11c615ffe60af4fdcfca7ffa69b6bfd49ffcefe54
SHA256ec925ee00446c790939afb7ef1b29833cf7113c33f38671a329b39a2321ef119
SHA51289e232e9918b73c5e19bc8eba2a6702656baae955cac44505010d75237ea6ed9a19ea41f5ac4ed6959884047198508db08c3d59271a32531e4146cf3e385e0f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\73cf3123-8fdd-49a2-8d56-d068e741bf63.tmp
Filesize859B
MD5dd4afde91da38c4b0655abddb9e082de
SHA14bea0757aa71f8750e8c5f7647cedf5aa4a800e9
SHA256299e3e11c83ea3b09da6e39d96a084d8432e374fade6e7631a3c479da0dcbb09
SHA512f5cf2f8d808bea07694c5bb199bcada39efe3ee5e9107b6886d8d2534c53c12054d777e3cb91afc9040fdd38d1220e83a178d86752a16279fba42a9794462311
-
Filesize
2KB
MD52c77ad493a35e000fef19e2344ac1f9f
SHA116925fd13dd0cc0fb7b1e2903a54db8f3faae9a5
SHA2561e41db7366d3f33bf4398414278e15c30812b342d81e55bfd1ef23d6b0f7bf11
SHA512827e0b316349e4f2eed6cd544fc878065159272aecc7e6235465140d6b2ca843a84141fd28909e21be2133ea9da340a27eb1f2c38b36b8c856a4218a886bbdb0
-
Filesize
2KB
MD5eb1774f712db7daef52e79c83ec33c4d
SHA1de0e7a182f38467a7ebcce0770a60e59470ea828
SHA2562615c9163e3f82896e2ef5e38301c17562644862dd2f9d25327668586b26d1b5
SHA5121e574cc158c408ce63e1439bc36c15035d7366dc20293cfd37612d9e6519d5509773464c614c3a42a64d389f16520758bec61b559d094ce4e33d64b2c81173c3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD58b80f49a246eb7e7607946d533b08329
SHA1189a76bcc200b41bb4407df0c78aceebf6a5b4a2
SHA256100bd3972ee26887775851b6d1268aa87278e657d63247aaf85882ca25ee67d4
SHA512bfb5f025e156b885a1aefed693cadf63b3a2ff7df23629f7b331f502b769afc5f1ee677dd16e83570f0db11f7229f50356804cd4a5079f8036da40b0ea2d53da
-
Filesize
859B
MD5ac09ecaa4d7f6fa56656850399d66686
SHA1cb50e24bbe7ca778bf4b2912695689ca7e690389
SHA25662f9632ce2a7c2ad90355d5b2e3724dc5b8b2d1373ac24cb08cd40c62024f284
SHA5122ee484fd3b12875e1cf6dc91058f03e7acb474720c7db01472895085fc168d660f6a61cfde74f27e228083f7c3566001f7fc8dfa54fae9a63e095ab4d61b1e71
-
Filesize
859B
MD521d5c535fe6fc95cad2c167968197406
SHA150cf738f0e22944e0ee8b345360f4d640280052f
SHA25624a8ac34ed7e42cca63363ed8822a24bcfa4b8dcdca67d1ca9887ef290127bd3
SHA512a560ac06d0264273694ef022c62c9db507d48bffcfcdb174aefa78ae537b086d2b200e23ff49b8a22964acfe588c0f809aba7bbf7f114acf20fb07395e3e8b91
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
9KB
MD5b1dd847e86daa5a5457324ef30a9ed65
SHA1ea0ad0ba5bd42d5b6b23d2f0c3a2dbab5fd9c8f5
SHA2561d75cd833044aa7f067a1012e5e0494e6d43ed9634f31faf4365605b5aaae5b1
SHA5129ae753f61386e28c27a8dc3553a534cb1b940f4c9978d807c6f699076ccf07699fcc873586d5d09dc28c829c25a94f0f8f86ac2a8009132045bec2cad7492f15
-
Filesize
9KB
MD50cb495a1e883d2725203ac749bc65d24
SHA14d9be8ea21eaaaaa3a1d06781d3e37e382cf0c1f
SHA256d0d46c3bde467483858c61b6288fb8ac35d98bbd2c76619a3594ede649f5d4be
SHA512bcd6a01b6f7d8c979a0b9442203fe267af195f526d39cef6e5e166404175a07df99ff5f3a24c5369491844b94e80bbf5fb84599fa361124a79bb0d7a02136e91
-
Filesize
9KB
MD548cf68690c1991fc6e30fbe96ae7c04d
SHA19dab10245ce573662414b86477bc6675312bbd87
SHA25601d9b8be920d47be520b883a8edb2aed9987dd0886465770bb9899db70d664b5
SHA5126ccf4bb259c85b8333bfdf64f757e1a257e694a1d73bd2b0123a67893c4f1ebf9cffdce0c2055b910ab9992fbee0e01ba49eb6254861cefe87030eb1bd0544a7
-
Filesize
9KB
MD5e915d2db71ca224fdf5b56ad1bb5f4be
SHA15bc61039d1efcaefd4a359598b567cd081129e45
SHA2567ef4e11369b2db59094d844558235c06630fbede91eaa014ea0fcfb6edcfd90e
SHA5129d3cc3cb8bca68cb6fc27bcb22f22f46f894961331fc5348ff46b0ffe179b5083b669d07be3356f2a7bea4dc4851a780fd6d4d6867d1e89bd0a26a25e8dc8333
-
Filesize
9KB
MD515f3d4169defb225653b5efe903d6825
SHA1388ae0484d41ac96c3774ddf78a0537ede82314e
SHA25689dac17d0e88026b9ac620d8981b88ca92f1d9b635e9c6b3535550f8d54fac63
SHA512d067d418151ceb38f8287b99c11ef9a57af701112948820107e5fb42a1ff804df9dc6937e0f9d7f497983f8bc60319a1f6e4cee470faf3527c6ef7a14535eb46
-
Filesize
9KB
MD5849de1afad51308f06968063ae8485e3
SHA1836b0563676e20edc540483595f8a3827cc09c4a
SHA2566573460489023e7f94050c07502b5a257f9a28e29981c48a4634cb453c66cddf
SHA5129738c8962e5e0a5c6f8a48da7d3f0d628b990f6a7dfe89d704b06b0c8396bc653de90aff753cc79db9610031d147116d6916d3fd44c46668a3f1ea3e3f8fe85d
-
Filesize
9KB
MD5020cb2af565b7c6ebad3d991e7fa88d7
SHA1310c6e887fb955546e70d4d67118197386e8354c
SHA256ca36256ac7bd7e8b001d3b86b90cd79796767db1dae44399d633eb1ba916b395
SHA51234d47ea2b647c25a4e7f84cc32bdb20b137ef422c0905820909b8d753253cf52b86a532e1e4581eb79b55e330dbec0044a89c86dd33b5bf6346e6ab17b9597f4
-
Filesize
16KB
MD5798c6faf7de78fb48e2bfd6ca027d14a
SHA1ca1adba1fa5cc0e5ef54e78d54f3f9ca0110b046
SHA25681305a29d5c4673def44a32b8b3b40e03fcf4cb2852375516f95b97c5a0ca05f
SHA5122620d9695d5732667d42656992e6f6b77e1f70126cacd585a3f6d044d8a7e9cef011f22b353f5f29061553e0baaf0eb62346fd590c8716a8c209e6d5b2b8a0d0
-
Filesize
16KB
MD57c6693d841b9bb1917a14455ce0838e0
SHA1a6dd200f3057b1af79a8a90af5f15968c626fef0
SHA256ec4b3aae260dd539d3eda9e2a34e060805f6a647cb8513cbccd18ff8132fb62f
SHA5126d3a1f0b2bd01383917c7ff4d8f4ff664acc7957d1a01461c1fcde47d3cb5906be609a0dcb06202d1806c54554c7945448a3ae29c98f318f9a67d7907a8b7527
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5680c1946966e9799395487b3abd5c677
SHA152fca797c4c0cb8918500d06ec734206952d2ba6
SHA256b544006000ff4ab0c127612eaa411333ff0a2107bb34f9f812359283519e3508
SHA5123d009871086c0ccfbc3ab11d0bd66534b50fed5eb387e829934c6115812fa3a7781bda49bca8301778c6162465e747d071dd8806975a27c6542bfb53ff20df88
-
Filesize
231KB
MD50ac6157ef69ab59bcd70357420715596
SHA1c0dedffcf0e1e53d856efe6c76fb9dbc4b71d21f
SHA25618630cfeb89fe143850928ba19c9732ae08c57dcabdbe340921650525692cef7
SHA512ea52af42b68eb7412761398975b6334273d0e41d4a778aec329dcec3c54e3fb0a1ccba6cdb2f70277ec78952732be5fee49fa36439e08c1fc6ff93b230bb882a
-
Filesize
231KB
MD552126fe6190c0d209fff63bff22eaf52
SHA14fa48c0960755fdded15abeb3deb041c40ab06f6
SHA25684e803ace972ac57f423f669f78df6d207310bfa6e4747729bcd6fd68aca504e
SHA512263225ce2250fdcc42c3d4f212707bd050ec2948121ef89c101714f7a97cf1e9350690e530d0d477d6bee2264e7fbcc2933c41bd82ec29279b3caab046f63864
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c