logo
HomeLearnPracticeChallenge
Pricing
  • For Individuals
  • For Students
  • For Teams
  • Live Chat
  • Help Center
  • Forum
  • Ask a Question
  • Edit Profile
  • My Rewards
  • Subscription
  • Public Profile
  • Logout
  • MonitoringLog ManagementCase ManagementEndpoint SecurityEmail SecurityThreat IntelSandbox
Score
100%
Playbook Success Rate
100%
Investigation Time
36 Minutes
SOC Alert Details
SEVERITYDATERULE NAMEEVENTIDTYPE
HighMay, 29, 2023, 01:01 PMSOC202 - FakeGPT Malicious Chrome Extension153Data Leakage
EventID :
153
Event Time :
May, 29, 2023, 01:01 PM
Rule :
SOC202 - FakeGPT Malicious Chrome Extension
Level :
Security Analyst
Hostname :
Samuel
IP Address :
172.16.17.173
File Name :
hacfaophiklaeolhnmckojjjjbnappen.crx
File Path :
C:\Users\LetsDefend\Download\hacfaophiklaeolhnmckojjjjbnappen.crx
File Hash :
7421f9abe5e618a0d517861f4709df53292a5f137053a227bfb4eb8e152a4669
Command Line :
chrome.exe --single-argument C:\Users\LetsDefend\Download\hacfaophiklaeolhnmckojjjjbnappen.crx
Trigger Reason :
Suspicious extension added to the browser.
Device Action :
Allowed
Show Hint
Playbook Answers
Question:Check If Someone Requested the C2
User answer:Accessed
Question:Analyze Malware
User answer:Malicious
Question:Check if the malware is quarantined/cleaned
User answer:Not Quarantined
Playbook Note
On May 29, 2023, at 01:01 PM, Letsdefend.io SIEM detected a potential security incident on the endpoint "Samuel" (IP: 172[g]16.17.173) involving a suspicious Chrome extension file named "hacfaophiklaeolhnmckojjjjbnappen.crx" (file hash: 7421f9abe5e618a0d517861f4709df53292a5f137053a227bfb4eb8e152a4669) located in the Downloads folder. The extension was executed via a single-argument command using chrome.exe, and its addition triggered alert SOC202 for a FakeGPT Malicious Chrome Extension, indicating that the extension may be designed to inject malicious behavior into the browser. Further investigation revealed connections to external domains version[g]chatgpt4google.workers.dev (IP addresses 104[g]21.63.166 and 172[g]67.147.243) and chatgptforgoogle.pro (IP addresses 52[g]76.101.124, 3.1.17.18, and 18[g]140.6.45) suggesting potential communication with malicious infrastructure.
Extracted Artifacts
ValueCommentType
version[g]chatgpt4google.workers.devServer URLE-mail Domain
chatgptforgoogle[g]proMalicious ExtensionE-mail Domain
52[g]76.101.124Malicious IP ExtensionIP Address
3[g]1.17.18Malicious IP ExtensionIP Address
18[g]140.6.45Malicious IP ExtensionIP Address
172[g]67.147.243Malicious IP ServerIP Address
104[g]21.63.166Malicious IP ServerIP Address
9cc6c26bd215549c39ba5b65e9eec9eaMalicious MD5 HASHMD5 Hash
172.16.17.173Victim IPIP Address
7421f9abe5e618a0d517861f4709df53292a5f137053a227bfb4eb8e152a4669File HashMD5 Hash
Alert Answers
Question:Is this alert True Positive or False Positive?
User answer:
Alert Note
On May 29, 2023, at 01:01 PM, Letsdefend.io SIEM detected a potential security incident on the endpoint "Samuel" (IP: 172[g]16.17.173) involving a suspicious Chrome extension file named "hacfaophiklaeolhnmckojjjjbnappen.crx" (file hash: 7421f9abe5e618a0d517861f4709df53292a5f137053a227bfb4eb8e152a4669) located in the Downloads folder. The extension was executed via a single-argument command using chrome.exe, and its addition triggered alert SOC202 for a FakeGPT Malicious Chrome Extension, indicating that the extension may be designed to inject malicious behavior into the browser. Further investigation revealed connections to external domains version[g]chatgpt4google.workers.dev (IP addresses 104[g]21.63.166 and 172[g]67.147.243) and chatgptforgoogle.pro (IP addresses 52[g]76.101.124, 3.1.17.18, and 18[g]140.6.45) suggesting potential communication with malicious infrastructure.
Lets Defend

Resources

  • Blog
  • MITRE ATT&CK Map
  • Dictionary
  • Use Cases

Community

  • Discord
  • Contribute

Roles

  • SOC Analyst
  • Incident Responder
  • Detection Engineer
  • DFIR
  • Cloud Security Engineer
  • Information Security Specialist

Support

  • Contact us
  • Help Center
  • Forum
  • Walkthroughs
  • Tour

Social

All Rights Reserved ©2025 | Privacy Policy | Terms of Service

footer sub image
Lets Defend

Resources

  • Blog
  • MITRE ATT&CK Map
  • Dictionary
  • Use Cases

Community

  • Discord
  • Contribute

Roles

  • SOC Analyst
  • Incident Responder
  • Detection Engineer
  • DFIR
  • Cloud Security Engineer
  • Information Security Specialist

Support

  • Contact us
  • Help Center
  • Forum
  • Walkthroughs
  • Tour

Social

All Rights Reserved ©2025

Privacy Policy | Terms of Service
footer sub image