Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 21:41
Behavioral task
behavioral1
Sample
470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe
Resource
win7-20240903-en
General
-
Target
470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe
-
Size
1.4MB
-
MD5
c1130d6862b644d0753fd6fa9fdb77d3
-
SHA1
2f552ba784da631295d6bdc3b8cf9a6fe88e04d8
-
SHA256
470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f
-
SHA512
227a21b17f7ba4c95c4ba365c787c432b85b589f00871121182d16b97756f96faf920f40874ddb1c3b521f5b09400693562deeeb78f91e85adbf4874db9403e7
-
SSDEEP
24576:OsLp0FasdJu/+/dfMs2KLoyaU/5DeTgtMyPtTo5Do/Sf4d:jpncZO+HCyPtTohoKwd
Malware Config
Signatures
-
Socelars family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 27 iplogger.org 28 iplogger.org -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.js 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.js 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.js 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.json 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.html 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.png 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.js 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.js 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 2068 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133795500890624208" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe 2128 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeAssignPrimaryTokenPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeLockMemoryPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeIncreaseQuotaPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeMachineAccountPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeTcbPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeSecurityPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeTakeOwnershipPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeLoadDriverPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeSystemProfilePrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeSystemtimePrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeProfSingleProcessPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeIncBasePriorityPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeCreatePagefilePrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeCreatePermanentPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeBackupPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeRestorePrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeShutdownPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeDebugPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeAuditPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeSystemEnvironmentPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeChangeNotifyPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeRemoteShutdownPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeUndockPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeSyncAgentPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeEnableDelegationPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeManageVolumePrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeImpersonatePrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeCreateGlobalPrivilege 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: 31 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: 32 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: 33 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: 34 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: 35 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe Token: SeDebugPrivilege 2068 taskkill.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 660 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe 84 PID 3440 wrote to memory of 660 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe 84 PID 3440 wrote to memory of 660 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe 84 PID 660 wrote to memory of 2068 660 cmd.exe 86 PID 660 wrote to memory of 2068 660 cmd.exe 86 PID 660 wrote to memory of 2068 660 cmd.exe 86 PID 3440 wrote to memory of 4120 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe 88 PID 3440 wrote to memory of 4120 3440 470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe 88 PID 4120 wrote to memory of 2208 4120 chrome.exe 89 PID 4120 wrote to memory of 2208 4120 chrome.exe 89 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 3484 4120 chrome.exe 90 PID 4120 wrote to memory of 2284 4120 chrome.exe 91 PID 4120 wrote to memory of 2284 4120 chrome.exe 91 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92 PID 4120 wrote to memory of 4388 4120 chrome.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe"C:\Users\Admin\AppData\Local\Temp\470965e28355171daf1c1b68a98e11cc5d1859de58d4bcd69a2b963ae2c1d54f.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe591bcc40,0x7ffe591bcc4c,0x7ffe591bcc583⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2084,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2080 /prefetch:23⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1880,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2128 /prefetch:33⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2296 /prefetch:83⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3128,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:13⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:13⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3844,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3880 /prefetch:23⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4700,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4728 /prefetch:13⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5004,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5012 /prefetch:83⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5044,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5036 /prefetch:83⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5092,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5040 /prefetch:83⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5480,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5048 /prefetch:83⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5352,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4976 /prefetch:83⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5504,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4928 /prefetch:83⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5772,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5592 /prefetch:23⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5888,i,11725507456884992599,517421494031898992,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5920 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3788
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
786B
MD59ffe618d587a0685d80e9f8bb7d89d39
SHA18e9cae42c911027aafae56f9b1a16eb8dd7a739c
SHA256a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e
SHA512a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12
-
Filesize
6KB
MD5c8d8c174df68910527edabe6b5278f06
SHA18ac53b3605fea693b59027b9b471202d150f266f
SHA2569434dd7008059a60d6d5ced8c8a63ab5cae407e7152da98ca4dda408510f08f5
SHA512d439e5124399d1901934319535b7156c0ca8d76b5aa4ddf1dd0b598d43582f6d23c16f96be74d3cd5fe764396da55ca51811d08695f356f12f7a8a71bcc7e45c
-
Filesize
13KB
MD54ff108e4584780dce15d610c142c3e62
SHA177e4519962e2f6a9fc93342137dbb31c33b76b04
SHA256fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a
SHA512d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2
-
Filesize
19KB
MD535af46571977a75bd8f5f2ce43368a52
SHA13d18eade3dc5dacf61593b9f0f29ac4e84672102
SHA25634760153ce02c55fdaa170abffa5a55d2ff759cf68bc34fa59f1d4000963b9dd
SHA51283076072307fb7af6980b4e2aeac5659e55677b541e26662b3ea1ed456bb493e645fea135d457674e2d8db3622b143944e337ffb8d7139c05dc51fbd9e6f3b8d
-
Filesize
3KB
MD5f79618c53614380c5fdc545699afe890
SHA17804a4621cd9405b6def471f3ebedb07fb17e90a
SHA256f3f30c5c271f80b0a3a329b11d8e72eb404d0c0dc9c66fa162ca97ccaa1e963c
SHA512c4e0c4df6ac92351591859a7c4358b3dcd342e00051bf561e68e3fcc2c94fdd8d14bd0a042d88dca33f6c7e952938786378d804f56e84b4eab99e2a5fee96a4c
-
Filesize
84KB
MD5a09e13ee94d51c524b7e2a728c7d4039
SHA10dc32db4aa9c5f03f3b38c47d883dbd4fed13aae
SHA256160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
SHA512f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a
-
Filesize
604B
MD523231681d1c6f85fa32e725d6d63b19b
SHA1f69315530b49ac743b0e012652a3a5efaed94f17
SHA25603164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a
SHA51236860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2
-
Filesize
268B
MD50f26002ee3b4b4440e5949a969ea7503
SHA131fc518828fe4894e8077ec5686dce7b1ed281d7
SHA256282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d
SHA5124290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11
-
Filesize
1KB
MD56da6b303170ccfdca9d9e75abbfb59f3
SHA11a8070080f50a303f73eba253ba49c1e6d400df6
SHA25666f5620e3bfe4692b14f62baad60e3269327327565ff8b2438e98ce8ed021333
SHA512872957b63e8a0d10791877e5d204022c08c8e8101807d7ebe6fd537d812ad09e14d8555ccf53dc00525a22c02773aa45b8fa643c05247fb0ce6012382855a89a
-
Filesize
649B
MD5c11dd93de7dcc6a9ae39d8fd2077b8b5
SHA10049d21660f135e07aebe7e9c473bf5517a66aeb
SHA256320161cc37c92fb34706fc8fe13e1f977c6ff5f104b65e49ccf1ab384bbcdd30
SHA51256c95ef03f6624757ad0d7fc344604667530fe6f509d0f188ddc1ffcede2b06fc1cbeae34d848074304074554a84ae67678718717b629fcf45927c6c9aebf987
-
Filesize
168B
MD5ddc54c77a5e4636e115b992810efffe9
SHA1ef84791516e420a0571efae68d2a2e6d75c6cd15
SHA2562cf879c7a0dfc42afd2319efe0325bdaab69ba5e7019601f844d484dd6accc2f
SHA512aa79bda87f28161fef7aff219f9ff76019fde29428248057e77183e013725059a8183b3ec3d67b7453f971fb1d43d856ca3d36035f107b89de41d3ea141d68f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD57627e36cf890b168fd49e8bb72775baa
SHA14375082d5ed592af274fc5c666bd072de4c88471
SHA25631810ba6bc236a0648c05ab745984cccb25ef8b453709fd1de9c837b2b264d71
SHA512660af7b3e0be59e2845a8baa222b11a17c93bb00a29042571d730354e5cef5604f99d0dc59fee474b2b30df7f205f64ba88ba064b76070eef1e0801272ae7dae
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD555d6581f0c1b74e59164b29c41ae3bd8
SHA110a3b4a872fcdd814150bfaa2b7dc0fd9bbb515f
SHA256a0dda065973cd81ca23ce79f22bff8feba2507897daed6541d48369c12058eca
SHA512829f44a5dde2578d5ec34b01aacaf1cf70e2752f1c1baa9c4f98c291e69a28dbbeb5ef382813d164addba9f3fa7cbcdfe1c1e72860377d1c34039b4b0be68dc0
-
Filesize
859B
MD599034ac368254ff0856b17282fc0c305
SHA116eae74559b96c60cb9846ebd3bb5f296d40487c
SHA256e166304c4daee709c86174637049250402da14e8f954a1edf7e0c51e79c01d7b
SHA512f027b29fe18dc5a18d3f29f1b09235d41611fc2a8dcfd9460f15319f6f7fe18c6e5e1abc5524372bbee40e0d6433e2af7a8de7b320bca111c3ac40a6ae726067
-
Filesize
859B
MD5c26eeb501f0494bd7b5ac8afe70b511b
SHA1cde43c33d85f56bc1e27dfae95d4ae0ddbe3fdba
SHA25642a9d2bd137095dd0c6e164192b0559a0a155aecda299f09ba31801da7f99485
SHA512351a45045647bb47908cbe45faeeedebfd8cd73cec16e89c19526a123f1fb450474ba075d90f09e1132bc09eb473d8abbc373a7e0dea3477668937bc4140185b
-
Filesize
859B
MD547ff299d61a0376ab0880bfa45e571d3
SHA17fc6429baa798257c1ed73256d76d1e10ddb31d8
SHA25678c25b053954f18ce8c9c4f6900fa1eec58eb05cdb8bf4f52bddb6e5fdc0d84a
SHA51256afa92a1f131ffa068c2959e6d5af2821b06789edf026a60c53b54dd347bcbd6fd21157675bb90cf0382ff78e88b617c5e609c3a43fe93a5ade5858108dd4b6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
9KB
MD566219c3773ebe64feebd4afe53263dd1
SHA1e07e55236018dae7807b380bc22cf59db60f6403
SHA256795c88019455fd49514c4dd4594ab75c6a99bfdc8f8cb2bc8e914f984a88c02b
SHA5121f23e4645c30355dd7ba70be9978c74ca6b8d28fe39a1371ed7445906680774d03804e21208a68b9e214ff19a5ad49123499e91fe917303c18159cfb7df6ec1d
-
Filesize
9KB
MD51448b7bc988e42c2c4522ecbbd305fc0
SHA15369b6fd062fb6378b03124df3b6c0db807f7366
SHA256606b8deda5ff8d6d7b9e262fe0340503be2cf7e043b2215392badbded4021ef2
SHA5125f93e1f8cea10f86b338b86842a2ff72f880f453f9f28a6d1ad498543d0395d109502f9a55dd9cdc0bf31eb62007bf7730b62408b752393e0224ee06852dc340
-
Filesize
9KB
MD58fe4e4c27094fd62a8fced8bb52c262b
SHA1cb445fcef56710799fec653257fbc874a7eede4c
SHA256dc29894448d4e5bce09dc356fc02380e1462ff81cbb3f34ac1cd611bc419920a
SHA512754b081954611e82668ca27d55411f2df9b2c8d89f94fa2e26fe1c96de0138ddcc3b27c5dcf6ab3016ccc62b4dfc389b2da56cbe72e24387d65cd6d996df08ea
-
Filesize
9KB
MD58b3d395a42bb5557ce827f32cb362a9c
SHA1c680cb72d9ae47ab123d5e762c4a1a2a6b4d5849
SHA256a668be4744fa5d45676f65447167dda33cd296d0a2564aa72d76e7464e5f0864
SHA51233f04d11dfeb428cf42e20f77abfa8b9a182b6cd7a2a7ba6c3bd9c7b4aa0ee4354c5d59cf86ede5925c43232b9e69eeddd59123070ad8c02fbbb29d6f90be810
-
Filesize
9KB
MD578d9025ba2abccafb8e5cd5d0542b0d9
SHA1100e1ef4865bdda238527526cdb8fcace79e73aa
SHA256b2c65358ba4bf1c4817ced7eed56cd0daca6e0e712067cdb85d34077fe99f250
SHA512002c84d23de937f1e6ade4fea0b37653ccf4a1b5002976c6bbf362712e4a5e59035208b7a11483cbcc05bdb583f59e05b2c5e5862670265bb75214ad9d115463
-
Filesize
9KB
MD5fb992cb04d36a6aae0f640a68148c7ca
SHA193da0c10896358721b252a9a54868e8c2964135c
SHA256d395943f9601ca9c72e7ef56f39160d2a61a9a5766978af2264aee339b0da492
SHA51215270515437520a57633bf57d406cbbefd96bdf047dffdb1428c36ee9dc28410cfe61efca8f6dfebd0ac81429d0269a0faf514deca56be03efc54f20e22ede87
-
Filesize
16KB
MD5eec1c35d84f8d2e86e88b5f2d9e7084a
SHA10760679123b1feb1cd2dac10008a8cc43fba5578
SHA256ae1f801b2e9e5c35153c83d4e6a78311e52b91a0f21a2adab0436a4ed9513ebf
SHA512467a0b6430eee814369cc535eaf1de4d180560dfc0e041b3065555d1064745625d93a8311ba756f4926b6a5e6f30a1cce397fd5fbd26eb5326ef1c0a23bd7ab0
-
Filesize
16KB
MD51b3508e13d7a526f6a93081c208fbc41
SHA1676e5c01d5ff00ea215b8295534c9fa74572f9c1
SHA256fdf2fbbfaacf015e81f21d4597bf6d533c81078a0936bc58ff651cc1bc91f0e6
SHA512ca2f7f43baa851dc8eebbed043da05f5022b0b4202e7d21c9d059819c5d285e3be747fcc6276108f2fc4ee2970bec1937335ea7e53043522c2030c7187f72d9f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD576124b0808f15cae8f2f2e53b58f13df
SHA168972ba04e3eb372826bde3f49eae81f36ea23d0
SHA25607f51ad51c1b479d1795de137733937e8a2af4614ed348fb1c33167ccc85dbc4
SHA5121c545aa2982d3433a802e69cd4732134d62d1e0eb1ec9f92ddfe70b5ba056043cff13a7280665e3e8317379ed538b2ea469f9e2048dad8d42683490d5601071e
-
Filesize
231KB
MD5ff14fe1b64203089800fd816bd384038
SHA1bbf11abe89288dd6abdd6d36901cff6fbf61860d
SHA256290b57494cd339512a05be8acbbd31ccd1bfcde11493f8194a6196c7b9ff08e3
SHA512960b6c0bbe2643d17948a5afe60e3f344f4113f7c5d49c598d2f2deada726e2beff47729bf7013f5ac22c873507218d3af011e7e6cff6111151dd584e17792b6
-
Filesize
231KB
MD5078512266aa3f084d16d389dba7e9e3e
SHA129f41fa3ac3a210eae796765feb82b7e26b7bf60
SHA256e9b4e794398b50cb282190620186c85a00645ce541e9a4b8c79e944165ea02d1
SHA51249aa66be7db41166d0998ab8261e526237afdc65040ec5dd3962e841cff50edb8787aad88c6524d5e0548d38d8081e01bd5c693b591aa24e2241bf075b5500d3
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4120_1665570762\44905fdb-3a87-4014-ae4b-a060afc2e8c4.tmp
Filesize150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727