Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2024, 23:04
Behavioral task
behavioral1
Sample
7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe
Resource
win7-20241010-en
General
-
Target
7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe
-
Size
1.4MB
-
MD5
f6cf161ceac1cd6a312c47296477119c
-
SHA1
688d886dc04ec246109e39ce228cf72b2b10ec07
-
SHA256
7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27
-
SHA512
565c473e4a4bba69203e1b6f2ee071364df01d40b3d214535a3eb6817482abe15141a2c9424f1c64b8dd6259eb3300438d7bcb0b5e6b4bd36f4a18fd00cea62b
-
SSDEEP
24576:xsLp0FasdJu/+/dfMs2KLoyaU/5DeTgtMyPtTotso/hkGd:2pncZO+HCyPtToaopkGd
Malware Config
Signatures
-
Socelars family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 27 iplogger.org 28 iplogger.org -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.js 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.js 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.png 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.js 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.js 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.js 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.html 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.json 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 4348 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133794687057320656" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3932 chrome.exe 3932 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe 4180 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeAssignPrimaryTokenPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeLockMemoryPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeIncreaseQuotaPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeMachineAccountPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeTcbPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeSecurityPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeTakeOwnershipPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeLoadDriverPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeSystemProfilePrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeSystemtimePrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeProfSingleProcessPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeIncBasePriorityPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeCreatePagefilePrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeCreatePermanentPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeBackupPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeRestorePrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeShutdownPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeDebugPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeAuditPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeSystemEnvironmentPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeChangeNotifyPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeRemoteShutdownPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeUndockPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeSyncAgentPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeEnableDelegationPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeManageVolumePrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeImpersonatePrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeCreateGlobalPrivilege 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: 31 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: 32 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: 33 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: 34 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: 35 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe Token: SeDebugPrivilege 4348 taskkill.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe Token: SeCreatePagefilePrivilege 3932 chrome.exe Token: SeShutdownPrivilege 3932 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe 3932 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4304 wrote to memory of 4264 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe 83 PID 4304 wrote to memory of 4264 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe 83 PID 4304 wrote to memory of 4264 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe 83 PID 4264 wrote to memory of 4348 4264 cmd.exe 85 PID 4264 wrote to memory of 4348 4264 cmd.exe 85 PID 4264 wrote to memory of 4348 4264 cmd.exe 85 PID 4304 wrote to memory of 3932 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe 93 PID 4304 wrote to memory of 3932 4304 7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe 93 PID 3932 wrote to memory of 3396 3932 chrome.exe 94 PID 3932 wrote to memory of 3396 3932 chrome.exe 94 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 2368 3932 chrome.exe 95 PID 3932 wrote to memory of 3036 3932 chrome.exe 96 PID 3932 wrote to memory of 3036 3932 chrome.exe 96 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97 PID 3932 wrote to memory of 5076 3932 chrome.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe"C:\Users\Admin\AppData\Local\Temp\7620f3939ef9e4a4ff561b57fa9f97f591c816d69773d96ff1ddd85e725fbd27.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbd315cc40,0x7ffbd315cc4c,0x7ffbd315cc583⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1868,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1864 /prefetch:23⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2188 /prefetch:33⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2412 /prefetch:83⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3140,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:13⤵PID:1988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:13⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3888,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3908 /prefetch:23⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4740,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3676 /prefetch:13⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5016,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4580 /prefetch:83⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5176,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5228 /prefetch:83⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5224,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4580 /prefetch:83⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5360,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5228 /prefetch:83⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5340,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5616 /prefetch:83⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5228,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5608 /prefetch:83⤵PID:184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5240,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5580 /prefetch:23⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5612,i,17180387022210031895,5203368095984176093,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4620 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3860
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
786B
MD59ffe618d587a0685d80e9f8bb7d89d39
SHA18e9cae42c911027aafae56f9b1a16eb8dd7a739c
SHA256a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e
SHA512a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12
-
Filesize
6KB
MD5c8d8c174df68910527edabe6b5278f06
SHA18ac53b3605fea693b59027b9b471202d150f266f
SHA2569434dd7008059a60d6d5ced8c8a63ab5cae407e7152da98ca4dda408510f08f5
SHA512d439e5124399d1901934319535b7156c0ca8d76b5aa4ddf1dd0b598d43582f6d23c16f96be74d3cd5fe764396da55ca51811d08695f356f12f7a8a71bcc7e45c
-
Filesize
13KB
MD54ff108e4584780dce15d610c142c3e62
SHA177e4519962e2f6a9fc93342137dbb31c33b76b04
SHA256fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a
SHA512d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2
-
Filesize
19KB
MD5f1dc16c5765e4445fffc9b4d4cc81fe4
SHA1e98dcd4fe69f526451f65d30d1babbad76a1f201
SHA2566819a5fd49392ad9c8ec7a74b49557bd6172a0d11e704f6344f603427a133019
SHA512275d2c1f4b1e11620aaed13301299896c66a08ee18766157e269ce3af4c93103f9d8a1c028c82367ccd0dce5318b0e0b939a8ad8807a14592d4ebd8298bc8b90
-
Filesize
3KB
MD5f79618c53614380c5fdc545699afe890
SHA17804a4621cd9405b6def471f3ebedb07fb17e90a
SHA256f3f30c5c271f80b0a3a329b11d8e72eb404d0c0dc9c66fa162ca97ccaa1e963c
SHA512c4e0c4df6ac92351591859a7c4358b3dcd342e00051bf561e68e3fcc2c94fdd8d14bd0a042d88dca33f6c7e952938786378d804f56e84b4eab99e2a5fee96a4c
-
Filesize
84KB
MD5a09e13ee94d51c524b7e2a728c7d4039
SHA10dc32db4aa9c5f03f3b38c47d883dbd4fed13aae
SHA256160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
SHA512f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a
-
Filesize
604B
MD523231681d1c6f85fa32e725d6d63b19b
SHA1f69315530b49ac743b0e012652a3a5efaed94f17
SHA25603164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a
SHA51236860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2
-
Filesize
268B
MD50f26002ee3b4b4440e5949a969ea7503
SHA131fc518828fe4894e8077ec5686dce7b1ed281d7
SHA256282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d
SHA5124290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11
-
Filesize
1KB
MD56da6b303170ccfdca9d9e75abbfb59f3
SHA11a8070080f50a303f73eba253ba49c1e6d400df6
SHA25666f5620e3bfe4692b14f62baad60e3269327327565ff8b2438e98ce8ed021333
SHA512872957b63e8a0d10791877e5d204022c08c8e8101807d7ebe6fd537d812ad09e14d8555ccf53dc00525a22c02773aa45b8fa643c05247fb0ce6012382855a89a
-
Filesize
649B
MD5fb1aeb2653bd0b7658060f18d965b9bd
SHA1bf546fbf7aacd02737ff7f44cdc53b12834c5d4f
SHA256f2634110d05bf90e789ae039f3af18b8b9014543a45f614b77fb9f7a63de9eff
SHA51210f28736e783aa27195a4f79db46e168eb8ceae3697c281ea63a24dc2ff36d26dfa5d8e289e4c7093b8dd56e01922a896478583d63a591a3ea1c5b674b3c899a
-
Filesize
168B
MD5581c2963dda5f69a6d74c932a24f86f1
SHA1af515bf5136ab2a6d8278a6e835e2f4edd033765
SHA25615f99d07e3ef63632997f2f67c93d30bfbafde045ccc307825356c20c6620a57
SHA51201b7b97b046f9ae436d20ac5c8b1ee70265bc5e4ed8b21f622989d05f31e7eba5856668c896af44a587d7549c23551e542026e69fe3790cda40086a30abc9c2d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD59163b25bcd73022a3ba5e1e3c96bdfc5
SHA1c55c7f69e6b5066b586b136309540d0089bd74b4
SHA256f5c56b3d4efe8f0525de4db865b7dddb330f756aa02abfc287704d51292e02b9
SHA512514331ed5c268faaab30e6d78606feb3ea36fcc393cb4606914545b329c9b718613027181bdd59d9f2580e1e39cf2bf2f6e19b0d21ab2307a56923a6a294f8b3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
851B
MD5ed33c151cff5400d0bc1089d89ffea85
SHA19ac580a1fcf91c7def3992118bd25675b257d1b5
SHA256ca4f1d54bc2d5e33d3b7a7e252930817ba2eb267e36dc516648710bdbe4cbad2
SHA512fa65fc29cfe4f5137ec98caa422587b1ed0b28123056fdbfa5692e8b23fbfcc462cc0f0d15df8fa9750ca88b4d5cc2f73d66f7a87aa283dc669243ddfb006d9b
-
Filesize
843B
MD516ac5bab3bb2b2fd8c31f265f2fcd725
SHA1963b1cfee0422725a1a894c0f239a9264c96c117
SHA25636387c6c8cf7d7ebf82086cea7ea0235b5d124f3733bffe174fc89a2f7ee3f43
SHA512bb4964664cb6b6f1dccf17711f401610b664ecc014187e6df02e1cda8ecebffb7fb7c1f41e1728e1b96c4b38987a711bcfdcf1465c641ce11d76160b006721de
-
Filesize
851B
MD53106b62d8dbe7e7b43d3c7bd6770dc47
SHA1d3bf5185e0652247ba1aa2bd7ddef22febebc284
SHA25637377921344b6c197f8d058c8246d6d90a12da9bc84a8a8d6784105afdd84ef1
SHA512681c5e79166d55f2761837634930f97249a40cfad3a22984e8d9a2c5695fef0add13753765d6446c47e9d20b23ed7dc7f0503a80b02f4c4cea0a8a426296555d
-
Filesize
843B
MD55358bbf463091a75c8537a005d735120
SHA1b222e5c47f29a10fadbedada43fc03bada4adcab
SHA256010fc3feecaf4dc17c7a45ba85ffca61447ac1e9709d09930bc99bbca4fdeaab
SHA51258e9bf748c4e1eea4e29bd40eeb012fb36e57d07801db774cd5ae5184c43e1d0c8bcf96444b798ceaff63b79b805b27989df403b1d0b087b6dcc0a1e95ee09de
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
9KB
MD5d026775867f976181c90c119baa55780
SHA1128d2f085d946ae28711434aa1a79b1640720e37
SHA2560f7add20d8eef40e4440b3992657af14041240d454cb8f9a99c5b0d72e7b74f9
SHA512c365afb5a00a750810173ec5b28c9e60ed06a7313710cac768e93a1d0823f94ce2fcc4b26b3da7cfc805815c7ae495373831b41b98296e3a930e273a9296c53f
-
Filesize
9KB
MD52b803501a1d4863c7613ae5225754b7f
SHA107f5e9ce9eed0874b19441d49667d67429934959
SHA25674a0b4f2b3c2fed8c9667071a263ec0a7e11db250f3426b50177cdc226ab659d
SHA51210bdfdcaa5a91310587c592fe4c77a7897c9830b3e80b620e1c0b5ac8e1208a5c9711512e1475206efcf60e1ff16429e943f348a2571ef358ba42f794bf944dc
-
Filesize
9KB
MD58cd8e2d6b5044aadde0fd16a6902dd46
SHA1affcd9fdd4f95ee64d977000b8c7c44120cef601
SHA256d1541b0f6fcf5cb1c40eee36c1cbbdff0c7856c2979be9b7bdfba364613e6865
SHA5120be997aab46bd85e81b652f02bfadcc34819a2cd900af95e2b613249eef55e8b3158edf0f13df401326dbb5cd3b97a129ea9e219bc9f844ae2ec0322003b1691
-
Filesize
9KB
MD5b3d2d1037f56952c1039449deb83377f
SHA1d17566f1e73e1332d7c466c28952a9b77c9c9bfa
SHA2560d3aefb241f1f49c3c7675dd9349c4800c5d48cef99dce5841c11d14f274de71
SHA51202fc0f764498f6991945b67b3574f1d9b3f5e30fd43c5f47b3b6ca2d12e6981ed1893faf3de2aa2d5defb0f5293cc5c9847e11b2596b175315288dee7e1b1bbc
-
Filesize
16KB
MD51028224129135c7a9a9939e46400248a
SHA16feaeaa2a499ed8c4bc3da8d99a6cef2d0d4f505
SHA256d85f8623ccacaf4d95d5d41a9aa2e098c85e34189d76ea9b842229faf96b597f
SHA51273d74786bb2352515bbbdcdd2b36b9552cc18fafe6ed06a133a14ccbbb20a4e2a878ee526295041e81251266fce8a4a1ee8a47ae3216a97992e99b2c6f09f8a3
-
Filesize
16KB
MD58352ed5bbe3a7c0fbd94c2e14bc5de31
SHA1615d9809bb3144ab25b4ee7568644bea36bf9713
SHA256fa82205adab69607bc80a103488725267ee51f7bae8d6a860ab7f969b8b89308
SHA5129cc9345e0591135e12308625c589d195ff6178276cd6245d43d46419c7e77165558de27fc05e3aab4214491a8fd7250bc5b9e1dc3cebdbe4fa988dbebb69372e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD510e33ed6f7dc77d0848a223ee7396059
SHA170d3cfd5d6d18bde9f859133509ac9501a2921fb
SHA256406a941d1a486f871b6aebc14848ca4117d5262c476f30cad9bc28d1e175c662
SHA5120b31ee75d187622741ca89050fd527354a3b98a415769230ec4b96fb46aafde005e2293a049769412a107a1c2816fa11560cc7d00a6e75ad036143041c409a91
-
Filesize
231KB
MD5658f132b719f6525ae1408d35aedd5a0
SHA1c8a4f9477c9a1d721abb42da9925679efb21d12a
SHA256fb98cee1b63be94d62ca918537804004f08609224fad256f0670e5c96f0ec618
SHA5129b1ba4942a852bebf746c890cff2fa1df91e886aaf56398ad5c625e5a036d54952026dcb017e29ae1fe599ffd4b2781dd190e50761c50541a40ea6aa5d8050ca
-
Filesize
231KB
MD5d50f3a058220221613e5bae0a5a44c50
SHA1443a2817102afa558214f401cbc6414b3ae9a3f0
SHA256305f358f2680e135a5488f2bb1a65b355d4aa9dab273d654a944f7dc66d0df42
SHA51286d58fff3209fc0e2266f77d37a30489d6337a1455ba50690b557b39022b1f6091505a7e8ce2b956e8e101bbabb0200c797f04e5b857f9f6a71101c85c336dd3
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3932_1167301762\65807530-15d7-4dc8-be26-a29a228051dd.tmp
Filesize150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727