Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 07:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://proceedglad.com
Resource
win10v2004-20230915-en
General
-
Target
http://proceedglad.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133413087023741221" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 3552 chrome.exe 3552 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe Token: SeShutdownPrivilege 4824 chrome.exe Token: SeCreatePagefilePrivilege 4824 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 2084 4824 chrome.exe 27 PID 4824 wrote to memory of 2084 4824 chrome.exe 27 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 4988 4824 chrome.exe 89 PID 4824 wrote to memory of 3528 4824 chrome.exe 91 PID 4824 wrote to memory of 3528 4824 chrome.exe 91 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90 PID 4824 wrote to memory of 4252 4824 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://proceedglad.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd190d9758,0x7ffd190d9768,0x7ffd190d97782⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1880,i,10981322515094343899,15236318091926294009,131072 /prefetch:22⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1880,i,10981322515094343899,15236318091926294009,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1880,i,10981322515094343899,15236318091926294009,131072 /prefetch:82⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1880,i,10981322515094343899,15236318091926294009,131072 /prefetch:12⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1880,i,10981322515094343899,15236318091926294009,131072 /prefetch:12⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4536 --field-trial-handle=1880,i,10981322515094343899,15236318091926294009,131072 /prefetch:12⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 --field-trial-handle=1880,i,10981322515094343899,15236318091926294009,131072 /prefetch:82⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1880,i,10981322515094343899,15236318091926294009,131072 /prefetch:82⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2864 --field-trial-handle=1880,i,10981322515094343899,15236318091926294009,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD53d7e2ef7354bed69357308de311bb7c3
SHA1b89749074d67c1c13af1667d4c13a85062bab76b
SHA256a8a8cabb77da3aefce9ea3d8dd5f97eeb39164830cf6f85f52bf354d6a84d5e4
SHA512b7ba1c7f783fe5c994531df4dec00075e27914fb415124f0f52c27ae08f84a60b5467d0834e5c240e9721797f46593d9a4d894e9fa8484935c14df167aa2085b
-
Filesize
2KB
MD5102ca6f388e0c7f947f8b63345d32b0b
SHA1a63d3c728108527e6bf44ca51e90e8bd84385034
SHA25681066b82344d14896f12f55e99ace803385baf78455de81e08c6188e95f735e7
SHA5123cf238e10e7582cd233eed8d400f5fbf6c2d9b3c40af5239a40efe75188eb7167b0a341a0a10ff6b9af48da8712b63018e123555f31f327668707a20faafb98b
-
Filesize
369B
MD56542121f3ee67156d096502d1d4c78a4
SHA1feef0e78190e4be82a3ca79f3a53848b85bf3d3e
SHA256aec340113a74a0b7e39701329dd7c33e6c421a3a5d46a396c89fe74dec8132d1
SHA512b358f09570623e6c7efe77d83d3330a041f6696c3ad167cda15c9ffcf3bb7eeeca2dc1215167abad0224acfa5263a6129e6da5f5efe0b74b11b6e2432fc210d9
-
Filesize
6KB
MD51e5cdc56b0448ae6fcb72e0a7e0b4d1f
SHA1a79a0086881fb2da5f0f2d84463faa999d5545b0
SHA256ede90e69c393925508abe3ffd0da1f40cef680c136a9b1acd9bb4eba00fe564b
SHA512a6c468c33075f12dce0f14cc6e2fb2b7d1f2545256f4dd5218801708e7152e8ea4748695470b2897f3f8a12904d1fe8bb951c1cd90ca84c1ad0efc9eff697f6e
-
Filesize
101KB
MD574f1637049f290f9bf5faa6b71cb15fa
SHA199751d9e29a2493981bf1779eaeea5481e73295c
SHA25669a8796b33e7da892fad536e33b5a18a58d3ed3e7c7fcdc9554a0439e8fd7a59
SHA51203722a89ff79bc099504404e3ba93070a82ef094d189d8dd8b369c67ed3af42931a27de5d61d84fb10e85a042426b40c84d5ecc4f0d23d0eff9ca8855fa8c9a7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd