Resubmissions
25/03/2025, 04:35
250325-e717gsvkx9 1025/03/2025, 03:46
250325-ebx5ysz1b1 825/03/2025, 03:44
250325-eafvaazzh1 625/03/2025, 03:40
250325-d8ngcatps8 625/03/2025, 03:37
250325-d6g7jstnz8 625/03/2025, 03:34
250325-d44b1azzdx 825/03/2025, 03:29
250325-d2dzbstnv8 825/03/2025, 02:53
250325-ddd97atkw6 1025/03/2025, 02:47
250325-dadjgstkt3 1025/03/2025, 02:44
250325-c8f7lazwaw 10Analysis
-
max time kernel
126s -
max time network
127s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/03/2025, 03:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Google.com
Resource
win11-20250314-en
General
-
Target
http://Google.com
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Bromine.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bromine.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133873478633554391" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\BromineTrojan-main.zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5136 chrome.exe 5136 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe Token: SeShutdownPrivilege 5608 chrome.exe Token: SeCreatePagefilePrivilege 5608 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe 5608 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1524 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5608 wrote to memory of 5412 5608 chrome.exe 78 PID 5608 wrote to memory of 5412 5608 chrome.exe 78 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 3524 5608 chrome.exe 79 PID 5608 wrote to memory of 4560 5608 chrome.exe 80 PID 5608 wrote to memory of 4560 5608 chrome.exe 80 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81 PID 5608 wrote to memory of 4932 5608 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://Google.com1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1893dcf8,0x7ffa1893dd04,0x7ffa1893dd102⤵PID:5412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1932,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2024,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2132 /prefetch:112⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2260,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2184 /prefetch:132⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3044,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:6024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3028,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4156,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4132 /prefetch:92⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4136,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4572 /prefetch:12⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5124,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5140 /prefetch:142⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5388,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2300 /prefetch:12⤵PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=212,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5484 /prefetch:142⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5632,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5604 /prefetch:142⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5620,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5624 /prefetch:142⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4132,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5844,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5856 /prefetch:142⤵
- NTFS ADS
PID:6024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=5416,i,6820205349933679131,10402137629104924705,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5556 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:5136
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5588
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1524
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6104
-
C:\Users\Admin\Downloads\BromineTrojan-main\BromineTrojan-main\Bromine.exe"C:\Users\Admin\Downloads\BromineTrojan-main\BromineTrojan-main\Bromine.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:3488
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004E81⤵PID:5360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5be2dbdd202b484d3632e121c34c65d8c
SHA1526c2a7aef7c6be5ba344225cfbff0d2e3e63ce6
SHA256a65c61700fb785c2786774bcf3249a0394bed22c2dc51e9268f966dc265c4211
SHA5123c71cab11ab905bfc761201b68d35729de6478dc68dce5292fff7b554949373676d8ccd7d84e263cda599a191d7d2d9c6189d93e5e93679b4d2fefc1661f2ad9
-
Filesize
2KB
MD5dd88fdade6018b1f3ec58ba926761b50
SHA142713e564ae5a7187de068f279dbbb95a6525009
SHA256740f2e0d7040ceec0f5c42ef3f3912abd6d98a160364eed18045d0ee173d6a82
SHA5126dfd1026681e198f36b5fd548ae00183fc4e75c9e47abdfc9218f438508ccb7533faae626e6677a16b2056135529f4fae7876b3b7dd7a06ac915b8a18fc9771c
-
Filesize
9KB
MD58fdf81e3ee215ee269411067fcde9aff
SHA19f20d133adff5cc4094db93056ac9ecc6ee36823
SHA256688a4af611d4f6da0ed6d73d6f76d1a030bf495b7e92efbee84a853284986f36
SHA512b6d63ec9abdacafa89a283c8a097c3bc065eacdfef030daad0b0a41ad6b5ad4a49e3e700a14d255cbdfa52b4399a1e7562203fbe4592f002d86d51906f4f92f6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
11KB
MD50b8a3a35b81dc8f2a23885995d7f6f31
SHA162cdf054b1274cc744647630fc2e259748f41080
SHA256d0faedbf162a86759c3885e2ea282df07beca7377c59acb326d5e2ebd64aee12
SHA5125b5e68fcaaed645b7bc5e35368747ec0b4943241b16c93dcac382451ad0c21806b7a2cc51c8283bd5ca8d8f8cd46d4935347552948ef8fa9ea5331d2cd02374b
-
Filesize
11KB
MD59993c62fb013af915d4095e588c1bf98
SHA149eb126533974d0746bae0b2dd8c43bc205cfa4c
SHA25613f691df9c382eda09a71aaf410cdb570f544cc52f8341699a0c84648a46a604
SHA512ade34988754ee7e7d3f8f43ef70f778bf671281d2a66e27476bf816cf7b9347542ac5a2e8f762cccabf0f42c92b1dbfe1d1ec84b11d6e3d7976f74615392ecca
-
Filesize
10KB
MD57ba38c1cb61f12d7da1f5bf3181bb65a
SHA168c6703046a377650923a787680e6da3a917a376
SHA256633af3d304ccc421ee2996b8fe772a0f1f7d85c66348781e4351d2412330e3fb
SHA5126779ff9c29bfcee2628460a8e96187ad37673c50c602cbe9002d0f8b581cc386102c59f5ee65518c0edd560da74b58d1ef029a87a1a83396eda29648e28ac68e
-
Filesize
15KB
MD50c4ee74392bcb9c2651fb89da5d6ea38
SHA13b0c059f0763113bc1f02ff5dcbc7ab421b9bb30
SHA256271186f51c93e49b8e397d63570f77ed64355ad873c825457f56c4be696da869
SHA5120c69717b1882b08f112a904faf5b582497a6ba83dceeb00e15c8522c1557dc55e25ee27713984c27e49a24c9d84606c6cb4edd41168ee16587e07a3402257080
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD531387ffb7eb16c10671a5daad5470739
SHA1941f06ac95fb59936ef93f02b13616c0d1492660
SHA2566bfeceb685d052a3bb562a977391212c744e5c36f1946d7c9e52ce4505a80732
SHA512a325eb77db462048c157a5c87a2e6bf2e9097440591ccd86d295904f4a881410f9b550227ad09a4b52b9ec2750e0b08f2d62b8236b27f65c8da8573b39993772
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c63e.TMP
Filesize48B
MD5db3f3690cbb8b6dee7f94579391e2222
SHA1cb3be2f9291018283720cf8c0bc4382b28e4ae36
SHA256673a539d95b16bedbe4137cc287947ca590c836b1cabe1805b8442ae99ff43a7
SHA5126658c4a684b9a837b6377abb641a1c471cc45a15e4d73dbfd0527c217f633996937fcf7b09f79a01fceacf7857694cfd71ec62a31c129069461ae3c94165e696
-
Filesize
76B
MD5a7a2f6dbe4e14a9267f786d0d5e06097
SHA15513aebb0bda58551acacbfc338d903316851a7b
SHA256dd9045ea2f3beaf0282320db70fdf395854071bf212ad747e8765837ec390cbc
SHA512aa5d81e7ee3a646afec55aee5435dc84fe06d84d3e7e1c45c934f258292c0c4dc2f2853a13d2f2b37a98fe2f1dcc7639eacf51b09e7dcccb2e29c2cbd3ba1835
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe57bfe5.TMP
Filesize140B
MD55aa1a49050b5ab974015aaa7fdd12f19
SHA1ede894c8c54b58250fd53d579fda79f541743ccb
SHA25613f25b65a2233f8c76a066471312e94ef3f8da27567f22e35befcb2737313162
SHA5124fb92e0a5b7d7ff3e1042f044c9a4400c61e2ee99e752433c47c659d6de70f2fedbfa0d5abda239b9ac85c672883d2bd17d7afd4b639bb9d9c752049cb707f4a
-
Filesize
80KB
MD56f38787c23d01b066b7cd27ed8071591
SHA118661166415dc5017c53a098cf5751a26d39bd2d
SHA2564757932a722ca2303419366a61f537e754bb21bb7a6ab24f883f3f7860c678f8
SHA5123d6154d7d4ca3b7bbb118ab1ea1ac4a69d6c1fa6c48a813eb9286845802dc5317ca389c35135ed9e53184423b5053a63cd19e813049b6cd8d18e46d391c0f0f8
-
Filesize
81KB
MD529f1ec78fc42626abb63cacc295df422
SHA159d224fba1529430746b9850c2be08d5ed0ceb80
SHA2560143dce8250441d514daf2cbf0cc1cc2729885a40bed19715fc17e154f5c57ba
SHA51242bede6ff85e650c016acff62d787d43699f78782856ebc182b072f510489bfaab1a6c0147f29d6ea826f05b96127a8b6e491fb2bad80cefa6a6c7a5f182dee7
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize23KB
MD5e4502e12eddb65147ccb0c39021d5c54
SHA1e0c340c26168e569ed1b09955e386922b9c76fc0
SHA256ca1d08100dade9a95b1f93a37ac07587d9dca6866a8cb87436aadd5d29c86d6c
SHA5129619f8745eaa0f18f6372258d3e7e068c0347fb1effa578bff7d173d6ee49507610316036c712834f8e336a01e95ba8d6ba8270ae1a439481877cc37b51405fd
-
Filesize
2.4MB
MD58b0bc436cce3ca47dbfd3ed067ee16fd
SHA1fcf110792f5095d16b34ff1cb3ad70981ca4ed25
SHA2565be4d59fe82a0c086520c44adfb1e07dbe186a229373833bd382ab251a4294aa
SHA512dc33b7ff7c9b3fde7e29a8079dfb949f7d2a2ee32c865ae36e499e159fac1bbe62fc7cd91c9daba154bc8a25695ded2098d91cd132dc4437e3ed0504c41f5d50
-
Filesize
84B
MD508998f6ee6042925224d1696d1084568
SHA135b1b10578d0e4f010ae0033c0e6698cafaa5406
SHA2566b940dafc0cc416ac606dff7ed416102877c1e6c077de53b99f2fa8d8e5a238b
SHA5122f56636037c19fedd53a6e74ac0c9010206d7de8dac9d5f1d3a352dd848a2c9238e5889d95f2babaf6be4abd81d3965a914405960dda044ad3c8a42739a4511a