Chrome Extensions
Overview
Evidence: Chrome Extensions Description: Collect Chrome Extensions Category: Browser Platform: Linux Short Name: chrext Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Background
Chromium-based browser extensions extend functionality and can be abused for persistence, credential theft, tracking, or data exfiltration. Manifest metadata and permissions offer insight into capabilities and risk.
Data Collected
This collector gathers structured data about chrome extensions.
Chrome Extensions Data
ID
ID
1
UID
UID
Example value
BrowserType
Browser Type
Example value
LastChromeVersion
Last Chrome Version
1.0.0
Name
Name
Example Name
FromWebstore
From Webstore
true
Description
Description
Example value
Version
Version
1.0.0
CurrentLocale
Current Locale
Example value
DefaultLocale
Default Locale
Example value
UpdateURL
Update URL
2023-10-15 14:30:25
Author
Author
Example value
Persistent
Persistent
true
ExtensionPath
Extension Path
/path/to/file
Username
Username
Example Name
Profile
Profile
Example value
ProfilePath
Profile Path
/path/to/file
State
State
Example value
Key
Key
Example value
Permissions
Permissions
Example value
OptionalPermissions
Optional Permissions
Example value
ManifestHash
Manifest Hash
a1b2c3d4...
ManifestPath
Manifest Path
/path/to/file
Identifier
Identifier
com.example.app
InstallTime
Install Time
2023-10-15 14:30:25
InstallTimestamp
Install Timestamp
2023-10-15 14:30:25
Collection Method
This collector discovers profile Preference files, parses extension configuration, locates each extension's manifest.json, copies artifacts to case content, and normalizes extension metadata (permissions, version, author, install time).
Usage
Extension inventories help identify malicious or risky add-ons, correlate with browser activity, and detect persistence mechanisms. Permissions and update URLs aid threat hunting and attribution.
Notes
This data may contain sensitive information that should be handled according to data protection requirements. Ensure proper chain of custody is maintained during collection and analysis.
Last updated
Was this helpful?

