Resubmissions
25/03/2025, 04:35
250325-e717gsvkx9 1025/03/2025, 03:46
250325-ebx5ysz1b1 825/03/2025, 03:44
250325-eafvaazzh1 625/03/2025, 03:40
250325-d8ngcatps8 625/03/2025, 03:37
250325-d6g7jstnz8 625/03/2025, 03:34
250325-d44b1azzdx 825/03/2025, 03:29
250325-d2dzbstnv8 825/03/2025, 02:53
250325-ddd97atkw6 1025/03/2025, 02:47
250325-dadjgstkt3 1025/03/2025, 02:44
250325-c8f7lazwaw 10Analysis
-
max time kernel
163s -
max time network
164s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/03/2025, 03:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Google.com
Resource
win11-20250314-en
Errors
General
-
Target
http://Google.com
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Bromine.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bromine.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133873476713936667" chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "177" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\BromineTrojan-main.zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 4472 chrome.exe 4472 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe Token: SeShutdownPrivilege 1668 chrome.exe Token: SeCreatePagefilePrivilege 1668 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe 1668 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2208 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 3656 1668 chrome.exe 78 PID 1668 wrote to memory of 3656 1668 chrome.exe 78 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 5912 1668 chrome.exe 79 PID 1668 wrote to memory of 3344 1668 chrome.exe 80 PID 1668 wrote to memory of 3344 1668 chrome.exe 80 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82 PID 1668 wrote to memory of 4260 1668 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://Google.com1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbc8cdcf8,0x7fffbc8cdd04,0x7fffbc8cdd102⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1956,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:5912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1432,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2224 /prefetch:112⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2348,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2548 /prefetch:132⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4180,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4208 /prefetch:92⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4628,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5068,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5136 /prefetch:142⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=212,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5324 /prefetch:142⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5428,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5432 /prefetch:142⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5436,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5256 /prefetch:142⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5420,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3780,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5668 /prefetch:142⤵
- NTFS ADS
PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=5752,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5424 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4616
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4960
-
C:\Users\Admin\Downloads\BromineTrojan-main\BromineTrojan-main\Bromine.exe"C:\Users\Admin\Downloads\BromineTrojan-main\BromineTrojan-main\Bromine.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:432
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004CC 0x00000000000004D81⤵PID:2376
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a2e855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5edf0377de57a88c0dc510c8f46c6344f
SHA1a745040eaa3eabc83d19a109b09bd4508558c387
SHA256f346ab8fe296fce87163828208fbafc4c4b48604ef53eb8d4c0fb5817c95d272
SHA5123737fd7cb918ab6bac0261adbd1f834033daeec6e372969ec3aef804e3899629e5ea7f08035bb20c8a7e8a52e1ca983996cd0085bfff0df4676cae284298d2cb
-
Filesize
720B
MD5748d26335b6178dc674c163f0fbe120d
SHA1b15d82b31afd72456bebe0440ba41e5c31d05b23
SHA2561228d6b8fcd3668f3051ae1a07d12bf7671f5ede96a61b52c7e206caf76f43ee
SHA5125e3c5eb62da58cf3cddf173b29820d28ec9557b0bfeca7aaa4a62dee9aa7d452fa9f261b882f54052b56ba1eaba5329ef2d158e5a7170a053d203bd2c813ba94
-
Filesize
2KB
MD539e22895b7adcc626ee7b91b60cdc783
SHA15c872d17d3e54f97dd94ebb857dfb95b72edb6f7
SHA2563140e878e4f802f8a094946985faa47c43aad324273705307bbc34a673915f7f
SHA512727d22c5ce448bea3e74bdc0ab814f2e7566c1ea8d6177bf452f130e7539f323a2f3d92b29a06f2e63e3ba81117804040ee786d1a0d8121b9676a591611a5e51
-
Filesize
6KB
MD581c85ba5243060f91a3e2e4b721cdc64
SHA11beba4376236b734d012b113d89ef5c37c38b2eb
SHA256dc0512447dea410a0d0a90f8b17604d0d5d86708f5b4d21fa110dd2fb9f3a023
SHA51227b8d2e659aebd18094dfb23174218fc9129096124742f88390c8890d8d917f67e8fc38bc39b33db0e8296ddd0c507ffb468461e7083c62225e3018b7217a19e
-
Filesize
5KB
MD5f027ab7b900cc786f981fdf25730158d
SHA1ef1f9a4995b96421baddd1bbef4783718f1700fe
SHA256f052978bd31aa36c5a38630da055a3e8013eff130aeded613039abc5b979ce40
SHA512d03fe6bca33c85aad08cb8084a0f77994fba0707e5fe8a5fe5db5ac2c12945e2bb2f25c1e5ed412febc5e38614da9aed98c003670b066f2754947cadea9785d1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5221321601e9880a8d72aff008908b1bc
SHA1c4d4028b89a1bb37751dab40436c2659737aec42
SHA2569acf62ec3b0edd3e17792c1b294bfd558c86b12489bf075e8b2bbca67a13b48e
SHA512e6f0adb09f1f68656f439c0f0f5a2f9f6512182fa6c5d2e607012637ac7c5e814aa76977f2dc614b0b74100ebb424e3fec8eee1f4c43172cd67c7be659508887
-
Filesize
12KB
MD59692187540af17ff2ad4f321c78733de
SHA1597c05960852a1e6b386980434ac1d1ea5649919
SHA256f41e5d109eb4131a6793176690e34b3a0a9318f3faafe188789376b419c3d2b9
SHA51223316ba91af90dde0779d44b72f5d556ca489d28501b4efb581834489985fb7a4f3f747cda74f613e00c5719d3ce72a52ce0e9296be54e48f720d13ba89175f9
-
Filesize
11KB
MD5b6b0c452d9b04be30ed2284095346405
SHA15fd270bb57c3dea5d85f85676b0c168aa1549e98
SHA256d1514a1918c16f22682926ffa49b43b4a2c9345b9588877e4014da52d8e48b73
SHA5127b34acffa88f7b2b80368911e4a1796104f290caf22d4b4e830583aded38da20ff16f7483fca61e5497278b11ddfd7df7d3052723af27806451bf4686735dfde
-
Filesize
11KB
MD58df732d23cba7b4cf29d7b6ca16e4afe
SHA11ca17bcd641d3e5646a836e12f614e994a0bb236
SHA256971148094458e3f586d0066a03a37ee2ff8b997f904df32fc1fe5b76e4cf9319
SHA51274d38b92c910095504278156c85862852753916782f4cf7550b3ccf595d01a90ff0f183c07a31f3b52a95b40ac029e9765b36810b17402f62df64cd519cc2731
-
Filesize
11KB
MD57fac982955d90a52e7ff0d53bb0c3792
SHA1b54fa05ef30e0bc5f547f4120d114161c2a3d954
SHA256fe98ff6ec95571c7c269ac1470c9c2a1dc1f063ad60250d59b8990ef2087f7d7
SHA5122366901b1b0c71fa07c4068f5a24abdbd0150f1bee61d53efb7def61d4e9362e797ee2cd6c12add7fcb39505a81afca5b81826cccd3245759805485c83f56a45
-
Filesize
10KB
MD51bf593deb380608a5b2e9d7342e78314
SHA1bdd332d927cb476e1138e2f1175d6f4284dccbbd
SHA25631a440e1b2cdc48b60c5b0ff2b7de3cb1565e77e4a6056abb468f0cca04dda65
SHA5125b7c246afa2fdbb60f99274b450c285a2cacea04ba11f439e07174f947e45f1178b842432ddbdc6e1a2aec39aeaeb2daad101b84f3cccf5484f4ad6e29bc92cf
-
Filesize
15KB
MD50c4ee74392bcb9c2651fb89da5d6ea38
SHA13b0c059f0763113bc1f02ff5dcbc7ab421b9bb30
SHA256271186f51c93e49b8e397d63570f77ed64355ad873c825457f56c4be696da869
SHA5120c69717b1882b08f112a904faf5b582497a6ba83dceeb00e15c8522c1557dc55e25ee27713984c27e49a24c9d84606c6cb4edd41168ee16587e07a3402257080
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD569bda1a8eeb23213d27ad4f288f9b3fe
SHA105c92a29015d311d0bb809558a44b0a2e476cde0
SHA256d2cd55647c902c7048b9894d249c0a48cfc51242542a8de3a8d622a55d7a5234
SHA512e59496556e10ade6c07d8b7090595268f06a3964af0cf1ee7cc2519a2dcfdd6c733ef720a1e42e5e8e89b91dfcace228d1943309a049f5a08b8e021d956dc5d1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57e5bc.TMP
Filesize48B
MD52c0d8636f84b81397bb9faf2db2640a4
SHA1c5e4e096ee3ab0c62ead122b2299577c1f097a5b
SHA2563287499acd0860bac6dffbf0b1f7a55e5a6a9a2b579fc0652352aaa9c4811a2e
SHA512f22071eabf181290d60f2b4b40edb26187305164d8c6c2e07b7ea05830be11c8cf227a5849b06f18cda455d654ea706b933a8fcc49be5bcc125e2dc323d24cda
-
Filesize
81KB
MD5f392e6d50a1c7866c31508602f775f53
SHA1dd99f04a5dc7eda5e781bfff82c32692f033f645
SHA256f00a2a8c0729d127b4aee11cc73755575cb89c0226f7e167532ad8e8fe6fb610
SHA5121ec269661e23293d83e1e97f76cd7d59ee413e5e76cb2deb7a97c42c4083beae3264438f4881ffa4e37228adf0bfcb8453e3ba99893262f50927b4a830c1fa90
-
Filesize
80KB
MD57e02bdc83dcd45a0bdd3d54a3309566e
SHA12974b2fcb0122f72fc0de73f41dde28d6f52533a
SHA2569bc41809ac9687f816e1fbefef1f2fc84d73c80af27430508e6afc95ff18a97e
SHA512be827a80094110ca344fcac55ab4355ed0fe8c03d7f865652c2fbb6085649861373a68e0a5fa0520143df176176939155408ee804ee693188452f76e3f8d620f
-
Filesize
2.4MB
MD58b0bc436cce3ca47dbfd3ed067ee16fd
SHA1fcf110792f5095d16b34ff1cb3ad70981ca4ed25
SHA2565be4d59fe82a0c086520c44adfb1e07dbe186a229373833bd382ab251a4294aa
SHA512dc33b7ff7c9b3fde7e29a8079dfb949f7d2a2ee32c865ae36e499e159fac1bbe62fc7cd91c9daba154bc8a25695ded2098d91cd132dc4437e3ed0504c41f5d50
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98