Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 16:12
Behavioral task
behavioral1
Sample
JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe
-
Size
1.4MB
-
MD5
275ed964b4feb7d2d12053dd8eeecb7a
-
SHA1
8c33019c08529ce2868c7ed86a04a16c5046a718
-
SHA256
82d2e2a8529d4704d2eabfb845dc262234b73866819ef835e291c7f9818aa9b1
-
SHA512
8cc6c9912dbb6482b2481d8924d4dd17aa7765b40655f2cf946b930335ec0f62cab939158d13f89155ea3ce15d2e0eb3d712fb0fb74081be5756e3d893347246
-
SSDEEP
24576:dxpXPaR2J33o3S7P5zuHHOF2ahfehMHsGKzOYf8EEvX32Z1qsa:npy+VDa8rtPvX32Z8s
Malware Config
Signatures
-
Socelars family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\manifest.json JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 iplogger.org 4 iplogger.org -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 3340 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133801351794806112" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 764 chrome.exe 764 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe 2360 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeAssignPrimaryTokenPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeLockMemoryPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeIncreaseQuotaPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeMachineAccountPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeTcbPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeSecurityPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeTakeOwnershipPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeLoadDriverPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeSystemProfilePrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeSystemtimePrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeProfSingleProcessPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeIncBasePriorityPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeCreatePagefilePrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeCreatePermanentPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeBackupPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeRestorePrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeShutdownPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeDebugPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeAuditPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeSystemEnvironmentPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeChangeNotifyPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeRemoteShutdownPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeUndockPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeSyncAgentPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeEnableDelegationPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeManageVolumePrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeImpersonatePrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeCreateGlobalPrivilege 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: 31 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: 32 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: 33 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: 34 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: 35 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe Token: SeDebugPrivilege 3340 taskkill.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 3356 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe 83 PID 3672 wrote to memory of 3356 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe 83 PID 3672 wrote to memory of 3356 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe 83 PID 3356 wrote to memory of 3340 3356 cmd.exe 85 PID 3356 wrote to memory of 3340 3356 cmd.exe 85 PID 3356 wrote to memory of 3340 3356 cmd.exe 85 PID 3672 wrote to memory of 764 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe 93 PID 3672 wrote to memory of 764 3672 JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe 93 PID 764 wrote to memory of 3616 764 chrome.exe 94 PID 764 wrote to memory of 3616 764 chrome.exe 94 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4712 764 chrome.exe 95 PID 764 wrote to memory of 4740 764 chrome.exe 96 PID 764 wrote to memory of 4740 764 chrome.exe 96 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97 PID 764 wrote to memory of 868 764 chrome.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_275ed964b4feb7d2d12053dd8eeecb7a.exe"1⤵
- Drops Chrome extension
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa10d9cc40,0x7ffa10d9cc4c,0x7ffa10d9cc583⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1844,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1836 /prefetch:23⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1808,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1948 /prefetch:33⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2452 /prefetch:83⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:13⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3336 /prefetch:13⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3864,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3852 /prefetch:13⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4908,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4948 /prefetch:83⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4740,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4944 /prefetch:83⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5128,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4948 /prefetch:83⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5148,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4744 /prefetch:83⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5132,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4660 /prefetch:83⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5060,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4404 /prefetch:83⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5172,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5196 /prefetch:23⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4696,i,15058471336583445181,16123171189659457218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=836 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2276
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD56f5da7e89dd3bef13a2de806bb2a0847
SHA19e540318e491a3af2b2e9ed447edf66a624828b1
SHA2566268f688ba23933d16d1e2c84c6b72082584860263bf4474de609420b21a48ef
SHA5122682246361afb14103e4a5148e8fefd2b34278e5502b59cdb460ae36ffb27b2509113b4228861477decfeab1e1accd60916da5c072c7e256c84ec786267df96e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD5a7a28fccc8ea116ad7c29346913d3af8
SHA1f06dcc8a28ff7297ce0af6ef6e858234777fb062
SHA256dc8a6a41ef11683f3203d432eba39ea067309a48b3f9e6b7aae6d23d84a886f1
SHA5127e5c052e13651f3743dcac7c64c00f87efde87837367e4d944440e165433ad6083b1ddc570688804cca19b22b35bf2e812c706e8b9911167756c183e252dfb97
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5e98875b9375cdf548c09cc9531f47549
SHA1fc0753509657c7b59c104b159e257ee97853a496
SHA256f0182be1f0fbdccc82a127745ce8386af84dae3311b4701deb83bf6a456a239c
SHA51284611ca474ff253de751c35050a87b15dc61399ef6b51372a85c14e5185bfb453151715479307fba075beb927e33bc75c859709264c5d24e64a3104a32aab949
-
Filesize
9KB
MD5c17cf166ddeb5eff06b46d5c1ddd1f8c
SHA1375013ee20bf88392837fd6dcfd4cd42dd18a591
SHA256066e064bc738ad6af757d80506e6416b25bfe8add2aa74b1082112e2a3766fcd
SHA51285d6b3cfb28e944dd71fb41025d7ec11aa31cd31b288a9b77140d0776934ac8806e3b316ddc869a602b75a52d3b4cdc51309a1a236613126c5d85eeac0dbf680
-
Filesize
9KB
MD53dacae9457647ad4bafd20a1b8a1ef6b
SHA1b18408f2d58d1980725814aac39c3929bb97cc00
SHA256bf843fe8441725409d2cbd808bdfdebb09b3a69d7c1ae33650e8ee217eb50a92
SHA5121d02fc60827e777fdbe9c94427c7c89f86b01f529d18cc07b9a525520aa7460ce61b451f990a78bfc0b1c6df15deb4938b799ea3bf442b57b831b1e267add21b
-
Filesize
9KB
MD5c03f2cb8a162258919af55a741cd277e
SHA1241f3e6b89f6ca840a05dedd0ebd88deac568dc4
SHA2567fadb6f955b0c84155b28e048b52ca4fc1404078f655e235a0bcf87678d6a265
SHA512f03013d66c08e65c6edf52565b7770b9515a489e07b36db0c6a86525fcf9315f7b03ceff49a45777758921a78fda7fd78745e136a56a19d1be9a310669e7f894
-
Filesize
9KB
MD5c3f4ffc86b6cebbb182596afcee0b1c9
SHA18ed7b0b0b8b9209e6237b7be88a3031771fae631
SHA2564254972962fd8cfe7278a6c7992e92a1b0fd020f693f8a885737ef44a2653a47
SHA512008c39be6da3e206da24f0b2bde69974d1fab54d20115ae8bf1e587458d53113002265987e373e2ffc49c025ad2375e87b7680bd21cfc03e69977d169467617a
-
Filesize
9KB
MD5dc0d7893f6b3aaf376a0fd47b2915459
SHA1ff9c2f1e964a970759ed34ea5283f4d3894ec7ae
SHA2562c0963d147d0349535b13432067cc8df3eb9ad2bf23498c11371338fac48ed8d
SHA51214085bab69b36873b0698543556e9c263971e3276d7b762803973b6a8001b8fbb78a61acd59d109ec22143f56a97ffc56f0d1ece5a33196f1e590d7bee808032
-
Filesize
19KB
MD596b384606777028bfb4a66ee61ef9add
SHA1e574c702582a5b5da3320726d7b58aa4682f744e
SHA2568f8f541a3a049c37e88c305eb436ce68b96d9864c363722674a0cf7045b6a664
SHA512d8101a1b57f3f8bcff78e19f9320a149ba2d986f170848ba6fd1cf164ea6e35ddb1efba7bf3ab508313a804fb52058204d0b48d4bca0151d105c7dc29736dfe0
-
Filesize
18KB
MD5b0d69f6c2ea1b723c66686cd6984f1d5
SHA156141ec6480551fd40f0eeaadf78b1f4c2108d2c
SHA256c963841f866c066cfd04179200f05d8ba517c3efbcea772bc36e42c52e3248c7
SHA512bd7c303e2a2a3e0006e565d52289a6b11faa49a1ef056eb3a9e81cc0c25cb71308cef68958512d72bb84fcee7ca7d61b996a4563e6b3af1be9da8ed84b20c4c0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5037f8602f23f4e2cd8fdf97077414637
SHA15c0145d094d103d06c34cf400e2c42ece05fea90
SHA25663369f030f84d24c1d54bd99d90395d9ee2303e576c8c4fd09e6924cbbd1a608
SHA51205f71aa395b4a38b0bc716e4628f231e6752357fa2cd543a9bb7f4fd738d2b031decb6cb49aaf3876d44e84e4f1db26761b2725f6a4199a325ad3a54aee1dd96
-
Filesize
231KB
MD56f3a33bbb7afb2883721d044ada69f93
SHA13ce80e4cd76d0030db5e57003aa3b0f30f0ef4b1
SHA256ad6db6a0c1b4f28738cd053f60f1333e4dcba652df8164506ae5116eadfcc58e
SHA51218f3794e635f748425552d04c7ffefc75b961a8ef0b4390c15b2f338b30ff5102241b4dab874f0f744e914bc1cc2d8272e2dfc8952cb000b356de72f9ea9072a
-
Filesize
231KB
MD596eb761817f8ba708ae8c595fd4fef76
SHA1f94defb35f68c5be6e015a19d78ddb38cc59058d
SHA256170976a6f91e1b7ca64c20a8d92603677b42cfe9a3bea2fa14823cc42622fddc
SHA5128746c379af0f9e55e092dcab402d6a793a2a4ba21afdc72758a0ab19925d2c9b25cd7b8024f7dcba8ee216d5172c4c9dea03a480b8db4b508bc7ad9f9db97755
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727