Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2025, 04:22
Behavioral task
behavioral1
Sample
JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe
-
Size
1.5MB
-
MD5
8b28b4cfd5fc4e1ef82f7a96f10bf89c
-
SHA1
b3508ba8a9e143063f98fc2d0cdb4782fa838e22
-
SHA256
6585676245e22cca9f08c5a2f4b7b3020dd02e544a9caa57b1df22687a43192f
-
SHA512
603d2aea823ae99f9e437cad499d91f539c833123dc525e63262662455b1a826e6840d59f64cb006a8c8e7a228848692eda4c056aeb9b6c33ac4a0bda29ee23a
-
SSDEEP
24576:VxpXPaR2J33o3S7P5zuHHOF2CxfehMHsGKzOYCMEMfX4RZ13:/py+VDi8rgHfX4RZJ
Malware Config
Signatures
-
Socelars family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\manifest.json JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 iplogger.org 5 iplogger.org -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 2576 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133805245345486786" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1520 chrome.exe 1520 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeAssignPrimaryTokenPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeLockMemoryPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeIncreaseQuotaPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeMachineAccountPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeTcbPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeSecurityPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeTakeOwnershipPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeLoadDriverPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeSystemProfilePrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeSystemtimePrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeProfSingleProcessPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeIncBasePriorityPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeCreatePagefilePrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeCreatePermanentPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeBackupPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeRestorePrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeShutdownPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeDebugPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeAuditPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeSystemEnvironmentPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeChangeNotifyPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeRemoteShutdownPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeUndockPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeSyncAgentPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeEnableDelegationPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeManageVolumePrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeImpersonatePrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeCreateGlobalPrivilege 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: 31 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: 32 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: 33 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: 34 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: 35 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe Token: SeDebugPrivilege 2576 taskkill.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe Token: SeCreatePagefilePrivilege 1520 chrome.exe Token: SeShutdownPrivilege 1520 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe 1520 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 3728 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe 83 PID 2336 wrote to memory of 3728 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe 83 PID 2336 wrote to memory of 3728 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe 83 PID 3728 wrote to memory of 2576 3728 cmd.exe 85 PID 3728 wrote to memory of 2576 3728 cmd.exe 85 PID 3728 wrote to memory of 2576 3728 cmd.exe 85 PID 2336 wrote to memory of 1520 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe 88 PID 2336 wrote to memory of 1520 2336 JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe 88 PID 1520 wrote to memory of 1544 1520 chrome.exe 89 PID 1520 wrote to memory of 1544 1520 chrome.exe 89 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 2832 1520 chrome.exe 90 PID 1520 wrote to memory of 5000 1520 chrome.exe 91 PID 1520 wrote to memory of 5000 1520 chrome.exe 91 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92 PID 1520 wrote to memory of 3996 1520 chrome.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b28b4cfd5fc4e1ef82f7a96f10bf89c.exe"1⤵
- Drops Chrome extension
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xdc,0x104,0x7ffd7616cc40,0x7ffd7616cc4c,0x7ffd7616cc583⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1744,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1736 /prefetch:23⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1900,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1988 /prefetch:33⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2448 /prefetch:83⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:13⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3152,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:13⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4516,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4504 /prefetch:13⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4800,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4816 /prefetch:83⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4884,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4808 /prefetch:83⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4540,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5092 /prefetch:83⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5048,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5116 /prefetch:83⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5032,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5180 /prefetch:83⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5168,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5152 /prefetch:83⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4664,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4808 /prefetch:23⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5008,i,4654693132107434462,4168575890462730226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5012 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:780
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD59fe175877a64cfbef98c28f38e59dbe1
SHA125a1db58f66fab69124310df4fcaaecb333b7e4b
SHA25668201294dbaa950690b275dd380d14d7a397aac6e2e15f870481bf1328af226b
SHA512351a99e148e76884fa7d4d57500079314cc46c304cef9319fef6f6bf668b3c0eb8632aff46249a50508d29dafeda79ec90a1862220ef04da7b7bfedc9c84274d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD5981909fb57ccdef15c9c76ab539ac6c9
SHA1f60a3b3da2bd3ec42dfb7076ff9a3380fc69d6ba
SHA25699de61733c8046b37ac1faba9c0b131e838e971bdf45b3decb0c4999d2d174ea
SHA5123416f8d80f5e21b7be6fc421d6d78040fd082d8c8ae0aa093a332a7e11408578772ea7a78e6292e13c88b821c96a536cb036d4d82b96200e5d2ae767c1877b79
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD55246325d30d1085b09e7686f70790247
SHA1d7ecc2d25dfb499ce8877b789346dbf4eb1aafbd
SHA2567c081cf8a45de554907d5c1decb7fd679e3ae08883221534a0a8648bbeb95f7d
SHA5120caf1e24b74b7d1b8e7c01ab298be7caccc128ba121cf71dc1b9fc32f7558dc54b32860201b291c472c6266457d05c197313b4b0aab33e021a25f094ba63ed28
-
Filesize
9KB
MD55499b69df67830d4510b35518d724ff1
SHA1755267f44503949f2ddc50ffe3803f64d6764a42
SHA2564d0d533258acf7e2b4335b598e5672c13b91c6f1dc5780396f3e35a2a623042a
SHA5123219d925f38203d3413d488a7f10ec90b01f5121dba1123565ca77ed9abeb5d8e6382e14e13ab3bf6e8fd9a790ce7a4a60167cbb0b4515f5d29ae13899c118ec
-
Filesize
9KB
MD5aae650f4a59e5e99738ede9085f0586e
SHA1dd057042dbd29a090b167050a286c4555a45b7c3
SHA25616f6049364e3d58c2f07986a9983e4fbbcb1c641fd4beded8f3979f862c2b8e1
SHA5128f23b87dfb7f0b431067f7865f2902d714e3665fbe3f577db04b094f72e074c0159498632746770d02f994e1c4892d24f888ed8b4436238d793f80ecf37a5f19
-
Filesize
9KB
MD57a3206ae052cf816fde75cb482a19cb0
SHA1ed012112a6dd85f37b8d6115adc2927dc297c31e
SHA25604898c2ebb65bd5a44526834fe0546a0eafe6644a5e9e5a8bc758bd942004ce5
SHA51276c9f8a94d90dbd92af114cbf83ba7a9020a7b179dd5d2a031e051f2d6f342a9b6af84d6864b95804b0911540576aaf7910f7d6f35e196192d20c43dcadae3d4
-
Filesize
9KB
MD5bdd54d4ff1e4390dbeb323fab2eef2c4
SHA17e9378b97dcb6b1b5a3f3ab90c54ccf3ed038421
SHA2563dece40e68ea06523bcd70c1ca8955311a4faef8686bf9b416f6d64e491f9f0c
SHA51256cccacdb2461675f1108512eeabe0175de7392cf35f4b8188c53a08c15b1ae1e292500f0b6fe52c06c6205c432ec088694a23a77f8ae27b75d42c85065dfe36
-
Filesize
9KB
MD5e1a59c3cab99f780eb21f4ae525da534
SHA1c1d8828fd4edaf153db0508b40d3704cf18846fb
SHA256935c38548117b8152c50f193166ddc10a16267bcd47cb4c5ce29b4507c5f30d6
SHA5128adab6693deac82c2be1f6f7dc8e84cbc288089328345e2afb93ddf60f68b047e8b6aa4fa184f5486d2b8557a31a0fa92fb5782788541067a09853f0bd87abac
-
Filesize
19KB
MD574649e08c0b70a5220f230585be1419d
SHA1d57c112cdab709ce86b63e0705a6d565c2b15e73
SHA2560975d68b54ef88a3a1ed0c9ad41ab904c8e31c6a11bb1423cb8cb5477c3b29b8
SHA512ac2d2b6ee0dfb20dac651e404dc862b227dfb798d2da75c73966d0c15a4d702fafb099d7dcf7b040225a72575343a2cdc453aaf899cf0cbf27e666b0f428b05b
-
Filesize
18KB
MD5b0d69f6c2ea1b723c66686cd6984f1d5
SHA156141ec6480551fd40f0eeaadf78b1f4c2108d2c
SHA256c963841f866c066cfd04179200f05d8ba517c3efbcea772bc36e42c52e3248c7
SHA512bd7c303e2a2a3e0006e565d52289a6b11faa49a1ef056eb3a9e81cc0c25cb71308cef68958512d72bb84fcee7ca7d61b996a4563e6b3af1be9da8ed84b20c4c0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD549073ae5e5b6653ae17d02e79549dd82
SHA17dc2a8b7a6dc159554e5e5e6e83046aa5c06f204
SHA256aa372c219123f18e951434d4d269f18c57a98b1e93145107d63a21d32d2001b0
SHA5125e4cd44414930609cba396a4b33573b8c318688eb0ccaed0c10f898b708e44302b38e05e14cc1dff3a07f57757d854c0d8af7b24efc0a8df26637a15a7920c19
-
Filesize
231KB
MD5915d8fe22822e45271eeb273b8786055
SHA1aedc09ab890428a0277bcd202501193c81715660
SHA256797e37075401733e800ec4de3470ca80ae11467d9f180420c4409d74470ecfce
SHA5127a69e4f59bdf44ebf63426a87f64b4b5d2d36d72f6edfaa7860b0ee642e138880368db6ae24ce9f546dba82e75806375aaa22b26c0883902277a65d943de9a16
-
Filesize
231KB
MD5b399352199376a218d2fbc1d3dd94a84
SHA19ddc3ff088396333e8fc504c1b7519fe5a0364bd
SHA256523e45ea018a870d8edf20173cc7b987e800bc5d0cf7839d8f370393bbaa329e
SHA5127cdefa17fdd3af682a4bcde36c0c1f43685392d6166ae89fdb0b1c509be9eb261779cb27b3ffcb20bb217b8390f2bc8225e79846183afc21be89eb9f280ef84a
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727