This a weird post; it doesn’t give many answers and it pretty much focuses on describing results of a simple task of data hoarding…
When people think of a ‘browser’ they usually think of a software like Chrome, Safari, Firefox, Opera, Brave, Vivaldi, maybe Edge, and some older people maybe think of Internet Explorer (rip) and Netscape (totes rip). And if we ask malware authors, they will probably expand this list to include many chrome-based browsers that ‘appeared on the market’ in recent years. And if we look at some of the actual Microsoft code, we will find out that they consider many Web control hosting apps to be browsers as well.
For example, at the time of Internet Explorer dominance, many applications were utilizing IE’s web control (IWebBrowser) to deliver a flashy, HTML-based GUI. At some stage in early 2000s it was so ‘fad’ and prevalent that eventually every major software company was using it, and most of users… hated it. And here we are, in 2024, with web controls still all over the place – f.ex. including most of the Electron apps (ignored in this post).
I have outlined some of the process names associated with browsers in this old post, and today I will expand on it a bit.
How? By building a more robust list of processes that kinda meet the ‘is this a browser process?’ condition:
But… we know this is not everything…
Over last few years we have seen a number of randomly-named Chrome-based browser clones appearing ‘on the market’ and Threat Actors did take a notice.
Many infostealers actively look for user profiles associated with these browser paths:
I believe this is a very comprehensive list, but I bet I missed some entries. If you notice anything missing, please let me know and I will add it.
The bottom line: there are so many browsers or web control-hosting apps out there today that it makes sense to build a list of keywords that reference them, so we can detect info stealers’ quickly – in their code, data and/or in the telemetry they generate…