Overview
overview
10Static
static
107zSCD97F9B...72.exe
windows7-x64
7zSCD97F9B...72.exe
windows10-2004-x64
7zSCD97F9B...28.exe
windows7-x64
7zSCD97F9B...28.exe
windows10-2004-x64
7zSCD97F9B...82.exe
windows7-x64
7zSCD97F9B...82.exe
windows10-2004-x64
7zSCD97F9B...7c.exe
windows7-x64
37zSCD97F9B...7c.exe
windows10-2004-x64
77zSCD97F9B...08.exe
windows7-x64
77zSCD97F9B...08.exe
windows10-2004-x64
77zSCD97F9B...5c.exe
windows7-x64
67zSCD97F9B...5c.exe
windows10-2004-x64
37zSCD97F9B...51.exe
windows7-x64
107zSCD97F9B...51.exe
windows10-2004-x64
107zSCD97F9B...09.exe
windows7-x64
17zSCD97F9B...09.exe
windows10-2004-x64
17zSCD97F9B...cd.exe
windows7-x64
67zSCD97F9B...cd.exe
windows10-2004-x64
67zSCD97F9B...9d.exe
windows7-x64
37zSCD97F9B...9d.exe
windows10-2004-x64
37zSCD97F9B...69.exe
windows7-x64
87zSCD97F9B...69.exe
windows10-2004-x64
87zSCD97F9B...5c.exe
windows7-x64
67zSCD97F9B...5c.exe
windows10-2004-x64
67zSCD97F9B...57.exe
windows7-x64
107zSCD97F9B...57.exe
windows10-2004-x64
107zSCD97F9B...00.exe
windows7-x64
37zSCD97F9B...00.exe
windows10-2004-x64
37zSCD97F9B...61.exe
windows7-x64
97zSCD97F9B...61.exe
windows10-2004-x64
97zSCD97F9B...rl.dll
windows7-x64
37zSCD97F9B...rl.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 13:36
Behavioral task
behavioral1
Sample
7zSCD97F9B7/16409730233472.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7zSCD97F9B7/16409730233472.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
7zSCD97F9B7/16409730238228.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
7zSCD97F9B7/16409730238228.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
7zSCD97F9B7/1640973023982.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
7zSCD97F9B7/1640973023982.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
7zSCD97F9B7/61cf42cab6116_Fri1740da7b7c.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7zSCD97F9B7/61cf42cab6116_Fri1740da7b7c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7zSCD97F9B7/61cf42cc94cfd_Fri174cd2108.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
7zSCD97F9B7/61cf42cc94cfd_Fri174cd2108.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
7zSCD97F9B7/61cf42cd9d3e3_Fri172b3fcd2f5c.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
7zSCD97F9B7/61cf42cd9d3e3_Fri172b3fcd2f5c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
7zSCD97F9B7/61cf42cf81412_Fri1748d73b51.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
7zSCD97F9B7/61cf42cf81412_Fri1748d73b51.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
7zSCD97F9B7/61cf42d8cfbf4_Fri175590209.exe
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
7zSCD97F9B7/61cf42d8cfbf4_Fri175590209.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
7zSCD97F9B7/61cf42d96bbd5_Fri1768e6cd.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
7zSCD97F9B7/61cf42d96bbd5_Fri1768e6cd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
7zSCD97F9B7/61cf42da3aadc_Fri1749497d9d.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
7zSCD97F9B7/61cf42da3aadc_Fri1749497d9d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
7zSCD97F9B7/61cf42db8e020_Fri179863c92d69.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
7zSCD97F9B7/61cf42db8e020_Fri179863c92d69.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
7zSCD97F9B7/61cf42dc105f3_Fri17e8bf67cf5c.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
7zSCD97F9B7/61cf42dc105f3_Fri17e8bf67cf5c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
7zSCD97F9B7/61cf42ddca121_Fri1754a29da57.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
7zSCD97F9B7/61cf42ddca121_Fri1754a29da57.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
7zSCD97F9B7/61cf42de1af96_Fri179a299200.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
7zSCD97F9B7/61cf42de1af96_Fri179a299200.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7zSCD97F9B7/61cf42df34a5e_Fri1721957b061.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
7zSCD97F9B7/61cf42df34a5e_Fri1721957b061.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
7zSCD97F9B7/libcurl.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
7zSCD97F9B7/libcurl.dll
Resource
win10v2004-20241007-en
General
-
Target
7zSCD97F9B7/61cf42cf81412_Fri1748d73b51.exe
-
Size
1.4MB
-
MD5
0a058a7671659d7864802f509fee9478
-
SHA1
7eb76e6b0e58c2bfc685644b3bf93aafab3d1900
-
SHA256
0fbfd4aeeda37b64b59ed22d85e7253352b3ae930726f073cbd36998f98c8a8e
-
SHA512
31e59a18b2b75e72f8db422279f324a674d41ca554c46f683496196d5003856d59f74e5ceae0a667e7caf3b9875015264ee416b3ee51e16d4ddc8856f6c0aa88
-
SSDEEP
24576:Qvp1T0ZhIjR+IXbtCOEqmb3tUJoEYdG/9QDMbh7zXIqmjvLZL:+pCuZ4OuD4+AhzXIqmjjZL
Malware Config
Signatures
-
Socelars family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\jfhgpjbcoignfibliobpclhpfnadhofn\10.59.13_0\manifest.json 61cf42cf81412_Fri1748d73b51.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 iplogger.org 5 iplogger.org -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61cf42cf81412_Fri1748d73b51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 3932 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133796074081326292" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeAssignPrimaryTokenPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeLockMemoryPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeIncreaseQuotaPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeMachineAccountPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeTcbPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeSecurityPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeTakeOwnershipPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeLoadDriverPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeSystemProfilePrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeSystemtimePrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeProfSingleProcessPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeIncBasePriorityPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeCreatePagefilePrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeCreatePermanentPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeBackupPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeRestorePrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeShutdownPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeDebugPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeAuditPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeSystemEnvironmentPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeChangeNotifyPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeRemoteShutdownPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeUndockPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeSyncAgentPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeEnableDelegationPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeManageVolumePrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeImpersonatePrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeCreateGlobalPrivilege 3508 61cf42cf81412_Fri1748d73b51.exe Token: 31 3508 61cf42cf81412_Fri1748d73b51.exe Token: 32 3508 61cf42cf81412_Fri1748d73b51.exe Token: 33 3508 61cf42cf81412_Fri1748d73b51.exe Token: 34 3508 61cf42cf81412_Fri1748d73b51.exe Token: 35 3508 61cf42cf81412_Fri1748d73b51.exe Token: SeDebugPrivilege 3932 taskkill.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeCreatePagefilePrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3508 wrote to memory of 5044 3508 61cf42cf81412_Fri1748d73b51.exe 83 PID 3508 wrote to memory of 5044 3508 61cf42cf81412_Fri1748d73b51.exe 83 PID 3508 wrote to memory of 5044 3508 61cf42cf81412_Fri1748d73b51.exe 83 PID 5044 wrote to memory of 3932 5044 cmd.exe 85 PID 5044 wrote to memory of 3932 5044 cmd.exe 85 PID 5044 wrote to memory of 3932 5044 cmd.exe 85 PID 3508 wrote to memory of 1504 3508 61cf42cf81412_Fri1748d73b51.exe 87 PID 3508 wrote to memory of 1504 3508 61cf42cf81412_Fri1748d73b51.exe 87 PID 1504 wrote to memory of 1312 1504 chrome.exe 88 PID 1504 wrote to memory of 1312 1504 chrome.exe 88 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 2780 1504 chrome.exe 89 PID 1504 wrote to memory of 4964 1504 chrome.exe 90 PID 1504 wrote to memory of 4964 1504 chrome.exe 90 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91 PID 1504 wrote to memory of 4476 1504 chrome.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zSCD97F9B7\61cf42cf81412_Fri1748d73b51.exe"C:\Users\Admin\AppData\Local\Temp\7zSCD97F9B7\61cf42cf81412_Fri1748d73b51.exe"1⤵
- Drops Chrome extension
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa3a40cc40,0x7ffa3a40cc4c,0x7ffa3a40cc583⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1984,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1980 /prefetch:23⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:33⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2240 /prefetch:83⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3140 /prefetch:13⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:13⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3756,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4592 /prefetch:13⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4780,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4816 /prefetch:83⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4972,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4996 /prefetch:83⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4832,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5128 /prefetch:83⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4820,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4816 /prefetch:83⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4824,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4952 /prefetch:83⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5184,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5276 /prefetch:83⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5504,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5512 /prefetch:23⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4940,i,17674395398587079127,4776674025763846783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=832 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2024
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5c5e451d0020915808b7aee0930aa4193
SHA161ea1aaf2fec2dd35c095f8513b051ab563d43eb
SHA256a11d2e4ed57adccf055ab52ec1190282053d7b44b4e9ca460e5d89fdc5bc1db2
SHA5122a3535ea402340e283a93fac72966366c31c5b410f0bb61be411071d2594fb636ec0a9ede449aab961616bdcb47b48764e00a1acff59b6c7a3922bc4d51cc39b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD575b77063270637c60a51ea0e0c2458f1
SHA121d6d647aad682172387c0112490b915faec828c
SHA256e2af6ecdd94a9cb0c30bbffd4ba3d5b72afb31e5c1acc1ae278f1d3304a4be91
SHA51251c7b1ef99dba6c10951afd6127f467fe41f43657813de86ee955423ec98f105148b58391c6be5321326d708d043c37bba2d25734d27d815f83a4edc107160bb
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5043604ed45ece3d3acb0e6f84a4a9c3b
SHA1ea41e60c76687861dee907a76dfe428a2e377c22
SHA256040d57ca4f489285f852323ae3643490509ea4d3eba7fbb125c31af7ab1d00ae
SHA512f3c3e586a199295e5ba38c196e8aeceabbd916b035c7ebf58028e9b8ba8a6348e0d66ac1f0cb313a96017a84f0806ae5ff76cf8674020105d44463a217d27754
-
Filesize
9KB
MD533be27b681acd8847e39abca170c67c9
SHA16d68ec02bd34c884f7ceb82e62f2ba09fbd4b73a
SHA2563f702e0186dc56629c5d6336b146f178905d6126398dd44aafb5a926aed7ce44
SHA512d98b53b7b8195231484d38fd15c5b19374cb0becc86e3946bc499422fcc461d393cb693bc44300317d9366e545acb9d1b55670ae1abadf318a82c492655bf3d1
-
Filesize
9KB
MD50b9c97ea4b2d1cdca558321d1fe78caf
SHA1b6d4808a227000dc839a4a7f0342e879a4bf54b1
SHA256dc309cb6206681b252882b41bbd1e23d48f714cfb7647d79d3d848ec7c5188bf
SHA51221e4c737ec977d7e29e73084db30e64b93189ee0edf591f4d88bef29c7a205a40e005971410a788e34c235ab9fe4827f4d996c6c9d9ae256103c292e63a2dd5e
-
Filesize
9KB
MD5e4f861cbe4a98b6796f7b308c3f599bd
SHA16dfba0524eef1bdbb1095e20a963da2fc0193f0a
SHA2562957429d2d08e2dae5bc1baec4257268c39dbc4ba1c7b5726376363a07ad11c1
SHA5120e3ccc953fed5d84de0acf8493d9e5577311e0ea3a952860619d048bb6e3b8dbbd3d03369851139c4a5f258c5f22066077384b0d372dc696b9a7b36d58ccb87e
-
Filesize
9KB
MD5bd3f151730f1a5499b26105572b6f8db
SHA1fc20ef238ea7158c4097f4b4d3fd344e843973d9
SHA256295e197ec7ebba2f236350897ef31cf32b0899b031631f86f797add2340a91a4
SHA5123adf572f8d5f885c37a5ad052c59dbc0cdf42cbeb3f8571971f56810e353283878ed326b76e4a7ff652b6775358a23cd3fb8ee4fd00f131a96d288d6dd18863c
-
Filesize
9KB
MD5fc795554b0538d658e4f8808101cbbda
SHA101fab09251a44c98d1e17e2e50f3ba4d820a9ae9
SHA2565620b80ec395a275679a4c4e6895da30caaff8218d2d4950ed1744aa492868dd
SHA5129485c2b87f892d06c2a0e3b2391f27d32e3cb7ad31e76f1d70355df66e99932ab1f4e8588ae5152a1676ccb06781cde53dd242b36bcb0e15c2c558d7560fdc57
-
Filesize
17KB
MD518e99c4dc9e7b5aaf6f92ee76d1e96da
SHA1bca7c6d714bf96c78a3c0f44e6249811b9b8f0b5
SHA2567a6b13cbcba25525bc855cb0b3406e2008d883732768a46c1be698168742c633
SHA5124f1349579f2c4deea39b255c5165a13e6b4341b580cb4207fe92fdb0281e956f552d2ada12d8cdc1dd9f7a30fceeadc3a9624cc92f0e0ba13cea188ae9c7e146
-
Filesize
17KB
MD5f58419196c169c0e4de7a6018c870fe7
SHA1e4802d79e9e044faf7e18774285f54fb060aec18
SHA25682748bb633ac8d60021928b42de6f82670377e9bbfc9b8ed583e893724199db2
SHA512d5d6034fe1cb9131b5c64bfebd4d62818e06f27a1aa55dc4a44f39b5318458b680f9004690e2557168c75ce9c0ed088d81f13cd69d9f2d895225ae706353ea1f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5f2cba5b3abcee1c3314408243543b7e9
SHA1a7b890d5bbd6addc45b474041f440d05d88dbc63
SHA256229b28f3f5cb9854365dfa7f23bc51638c3cd1feb160fb4082b8cd60cd1fd169
SHA5122d33b1f349c9263976d85defebef2d62aa03c50353ab287020eb09e47f28878ca49851d790c08acdb40f808becad216e8f2aac6eb7ed3e18f22009dcf53ebc28
-
Filesize
231KB
MD5bc0ea51a3f7ab5f264095ed87aa6f376
SHA1e62be7e71c8365b884807684ef3d5337d09acaef
SHA256fb0be279c85dab05f7bb75519d381698c05199e8287a76cb8e74516a842f9505
SHA5124e3a2e01bbf32b3eb406fcc5c61fa25533dd90880d10fd7cd40166e70f81671b2a153ba04aeab434383a8e2049e0c1136e40df7e0b249577b912f270feae96df
-
Filesize
231KB
MD5e8b23e08c3976c1ae1755eb8bacb8f1e
SHA112d9ae5eedf067fba7a99e91c8f3293decec7318
SHA2565e29f6a6879a3439d8569ec493090685972dfc5c8aac31b876db4c73437ca1e2
SHA51201ea52dff390596c68731a5fdde906da9f788745ea306ebf9afff653924dbbd8a7d88a1a041450ab46c3cb2453f3af693bb5ab7406412ea98c44b33b2af8cd86
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c