Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2023, 14:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.johndeere.de
Resource
win10v2004-20230703-en
General
-
Target
http://www.johndeere.de
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133372750834437062" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3240 chrome.exe 3240 chrome.exe 4396 chrome.exe 4396 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe Token: SeShutdownPrivilege 3240 chrome.exe Token: SeCreatePagefilePrivilege 3240 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe 3240 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3240 wrote to memory of 3696 3240 chrome.exe 67 PID 3240 wrote to memory of 3696 3240 chrome.exe 67 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1460 3240 chrome.exe 84 PID 3240 wrote to memory of 1928 3240 chrome.exe 85 PID 3240 wrote to memory of 1928 3240 chrome.exe 85 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86 PID 3240 wrote to memory of 2748 3240 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.johndeere.de1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff936bc9758,0x7ff936bc9768,0x7ff936bc97782⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1888,i,31450635931901769,15411598650305574224,131072 /prefetch:22⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1888,i,31450635931901769,15411598650305574224,131072 /prefetch:82⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1888,i,31450635931901769,15411598650305574224,131072 /prefetch:82⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1888,i,31450635931901769,15411598650305574224,131072 /prefetch:12⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1888,i,31450635931901769,15411598650305574224,131072 /prefetch:12⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4292 --field-trial-handle=1888,i,31450635931901769,15411598650305574224,131072 /prefetch:82⤵PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1888,i,31450635931901769,15411598650305574224,131072 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4288 --field-trial-handle=1888,i,31450635931901769,15411598650305574224,131072 /prefetch:12⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4408 --field-trial-handle=1888,i,31450635931901769,15411598650305574224,131072 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3828 --field-trial-handle=1888,i,31450635931901769,15411598650305574224,131072 /prefetch:12⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3100 --field-trial-handle=1888,i,31450635931901769,15411598650305574224,131072 /prefetch:12⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3132 --field-trial-handle=1888,i,31450635931901769,15411598650305574224,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4440
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5693c76e33831d0d0391ac3c757775459
SHA1ea7ba5fdbfe5757f2dd8f0766664cc76bfb8da7c
SHA256b96dbadbe09b7089053031e9ec774cd9ced63daf0d504c82782b7bb85d996c5c
SHA512716900d9a44e49e1df8ceecd0cf0b6290fe201b9a47077dfb9f092c062ab72bfa35e1f160cca1edc375b3f515c28d658a258eba827e2b50fc0f7b4e0ae1d68f2
-
Filesize
5KB
MD5c9c67aab497e09fefeb95d3a05e25e49
SHA17760414cab2146210202bbf99d8011daed682dcf
SHA2561a03072282b93c6101a1b9b73aa79678d3a1bbcb44a445e8ed3006562824308f
SHA512c5a638f1dab27a2d86436ba32fafc963b94b8cb5d9142e84b7c378ce33393323a007db7a47e57dc17ebce2fb7704f527f35fe3b9ae11a02dd09becea2e45c763
-
Filesize
5KB
MD5c27dab91a12bef4e80b218b929648046
SHA13dfaeeb17cf46e334ab2ac852e581e5d77b67a13
SHA2564c243aeed0aecf121e221ab6e6d95da7b9e8ae1b8be40c010fa66f83ad68467d
SHA5121b81c6012f8f7483db4090dae92f633658974e83783c8d3256fd5a48777d98b320aab73487f4f22f96570114e5d8c3d3c03fee0ce4f0cf10878b4ca6af32bf93
-
Filesize
87KB
MD5dfba99a099196adba29bdb5e32c4b282
SHA1c3e66dbf4981536e60ba0a9e3cfa03a19fc87b11
SHA2565caf54359f86a332c122a229752ebd2d93a870368bdacc591522005e328b8a50
SHA512dbfe2d1c45131e49fdb7afa47ac29349f173d31a4c6742803b3e99175ae01a17036c171dbab459b1a1ae346fa593efd0b97d28c9fd1ea33c181f59cc5bfc11a6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd