Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 09:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sec.deere.com/SECOR/DirectCompleteAcknowledgement
Resource
win10v2004-20230703-en
General
-
Target
https://sec.deere.com/SECOR/DirectCompleteAcknowledgement
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3092 4196 WerFault.exe 96 -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133376902359401167" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 2812 chrome.exe 2812 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe Token: SeShutdownPrivilege 1744 chrome.exe Token: SeCreatePagefilePrivilege 1744 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe 1744 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1664 1744 chrome.exe 83 PID 1744 wrote to memory of 1664 1744 chrome.exe 83 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 3468 1744 chrome.exe 85 PID 1744 wrote to memory of 4180 1744 chrome.exe 87 PID 1744 wrote to memory of 4180 1744 chrome.exe 87 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86 PID 1744 wrote to memory of 2216 1744 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://sec.deere.com/SECOR/DirectCompleteAcknowledgement1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4c799758,0x7ffa4c799768,0x7ffa4c7997782⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1888,i,4600809429543204568,1959887265182905901,131072 /prefetch:22⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1888,i,4600809429543204568,1959887265182905901,131072 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1888,i,4600809429543204568,1959887265182905901,131072 /prefetch:82⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2748 --field-trial-handle=1888,i,4600809429543204568,1959887265182905901,131072 /prefetch:12⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2756 --field-trial-handle=1888,i,4600809429543204568,1959887265182905901,131072 /prefetch:12⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3820 --field-trial-handle=1888,i,4600809429543204568,1959887265182905901,131072 /prefetch:82⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 --field-trial-handle=1888,i,4600809429543204568,1959887265182905901,131072 /prefetch:82⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4504 --field-trial-handle=1888,i,4600809429543204568,1959887265182905901,131072 /prefetch:12⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3364 --field-trial-handle=1888,i,4600809429543204568,1959887265182905901,131072 /prefetch:12⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3868 --field-trial-handle=1888,i,4600809429543204568,1959887265182905901,131072 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3048 --field-trial-handle=1888,i,4600809429543204568,1959887265182905901,131072 /prefetch:12⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3616 --field-trial-handle=1888,i,4600809429543204568,1959887265182905901,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4588 --field-trial-handle=1888,i,4600809429543204568,1959887265182905901,131072 /prefetch:12⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1580
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 424 -p 4196 -ip 41961⤵PID:1316
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4196 -s 8481⤵
- Program crash
PID:3092
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD595fa2b30b34fe5dd26485f5a37571e89
SHA17647f4221b7de2d8754db9a1ef7845f621341274
SHA2564c69ebf09e39b62cd4e71edfebd996e2536b48e377512b03cb53b96696c13282
SHA51286c41e7723f12fdcdcd7bd89c8b466fb16d70c6f3e893a2c14fd4ad33596eb5304815ff64308ade73e93a696cbb8ed18cf3cae61149b3bf97217e30ee992d010
-
Filesize
6KB
MD59b3ba1b0ce8246f7ecb8632e6d74e5cf
SHA11d31a667db91ff199b03f33336cd0b0126538cb9
SHA256423a84bfa8bde3ddc0468899e532f43c8a2b68f8cfc6a50fd5b308108f6a6e99
SHA51294b0d793f7fa761b6fdbc632389e0d3df458e1a20695d5d207f26e4e7cb32b1c47be350cf550f30c749294ec276426d264339af9e87ba4bd74b3212b8b5c024b
-
Filesize
87KB
MD514ef668270e0faaa11a87ad58006aaa6
SHA15c14e44e0c14584836cae7ecca39ac5f294a800b
SHA256b5f1154a546e7e4b479a12ceb5af9f5fca99679e2e61afede4cab3d4edf83a28
SHA512e0d381314293ca575793c60068076232e93d23059306a93f6f39e8150c38dd78ac26ccd3c2f3ea9ce78ea48bc3a389d4238d77ff9b47a83a7b612831f060aea9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd