Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2023 08:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://programs.johndeeredealerrewards.com/CFDealerRewardsRequestForm#
Resource
win10v2004-20231023-en
General
-
Target
https://programs.johndeeredealerrewards.com/CFDealerRewardsRequestForm#
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3472 chrome.exe 3472 chrome.exe 4288 chrome.exe 4288 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe Token: SeShutdownPrivilege 3472 chrome.exe Token: SeCreatePagefilePrivilege 3472 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe 3472 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3472 wrote to memory of 4804 3472 chrome.exe 83 PID 3472 wrote to memory of 4804 3472 chrome.exe 83 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 2904 3472 chrome.exe 86 PID 3472 wrote to memory of 4340 3472 chrome.exe 87 PID 3472 wrote to memory of 4340 3472 chrome.exe 87 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88 PID 3472 wrote to memory of 3944 3472 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://programs.johndeeredealerrewards.com/CFDealerRewardsRequestForm#1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9dd009758,0x7ff9dd009768,0x7ff9dd0097782⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1900,i,10651022167203613945,5348566675941278318,131072 /prefetch:22⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1900,i,10651022167203613945,5348566675941278318,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1900,i,10651022167203613945,5348566675941278318,131072 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3132 --field-trial-handle=1900,i,10651022167203613945,5348566675941278318,131072 /prefetch:12⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1900,i,10651022167203613945,5348566675941278318,131072 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4548 --field-trial-handle=1900,i,10651022167203613945,5348566675941278318,131072 /prefetch:12⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3320 --field-trial-handle=1900,i,10651022167203613945,5348566675941278318,131072 /prefetch:12⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1900,i,10651022167203613945,5348566675941278318,131072 /prefetch:82⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 --field-trial-handle=1900,i,10651022167203613945,5348566675941278318,131072 /prefetch:82⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1900,i,10651022167203613945,5348566675941278318,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5e0f41dbac5f13a60e7dba88f2da73113
SHA11c33838641ced5a236dad592ed8fb42b5cff1acc
SHA256d890b777583936247f57ab7cafed24987df4859d4c20089f725b7bc4c844d882
SHA512bce52d827cfd3c65fdce670a9307c8ae170ed542f771f56e718e327dfdcfe99a26b0e4d62e2929c8f1a376df421cfdf714c02853a8ed945e752694173aa9e599
-
Filesize
1KB
MD545bbac2e4afa2b94c5bc3cab66b8e6ff
SHA11514e9b810eca9795cb31dbd0057047a17e2693e
SHA2564ac401ab5c68efc430b504578027c308b4c7d7850efe0915b53bbcbfcfe35173
SHA512adcda13907136ace669aae5ed483ce2cc26d13d660d488cd812a2ee7aa06cf3c226c85c5c8cc8f4f7345360d59fea7af28bf5a06c8e42f28dc655fd47eb220c6
-
Filesize
1KB
MD583651c5e6b338f681f7c0b94a6f182e0
SHA1e977bec35ef58f88f6cd1ad7025e9d3a8dfd7306
SHA256e82d3f4e5254e95291eabcc39ffc4ef12344abb7e57a17e1fb28fc8fc30ff54d
SHA512393d7d55a5cb5a1dd4e05ae8dc3f30742ac92c78af55b6376b3576f80df1ac4b09d18abb79360a18c2c14476df9beead4fab576559026e637f03145af0805018
-
Filesize
1KB
MD5303a2863a3fc9eb6f16aa641f12ce32c
SHA1e39ea050e6ff158ab5711f94728ab21ef549bb4f
SHA256d24f16aa19932e70e960b687cf1844dfc21c3fd6b94e1d83466229e5ebdd82ea
SHA512a1f15468687867a5349bc16108ababe28c9c34df43ff4659f7f136a15c249d5549c7ac149f9e8f15071f612d46e6adb3681a05c70dc58431d86b6a7f273af0b2
-
Filesize
6KB
MD5f7a20f0336e57dffd3ac31dcf9e2314e
SHA115bd7c515e7a3e9c990c6265b1529dccc091554c
SHA256b0cc1439bcc08587fa84c1fc64b54266020a3174a7fed7c407d3db9ebfe4826f
SHA512f4d96fa19ecd893f7eee5483253abc41b0c38e7c3f4eecf5d58a8158886901e71b494960e178ac3c09dd22f6dbb406146ebd8c219cc3e0a516dd6d6b0ee13564
-
Filesize
6KB
MD5201872f880cc83c04fd80031ce239f9b
SHA111a24f525cb2eaa20becda56b2b08d62a3ae7802
SHA25622a5d91c3ba3aaba49ea71052f1cd7d72894f83fe511c537572393332d3df604
SHA5125d8b51d17e2e361ec87151dffba8e8828fb6eaa0d2f386f742f28e4fc2a725e7ff9586cef0d4a76923c4f6ee9b495d2fe74db1be758b17eca18ea299179a89c8
-
Filesize
6KB
MD5dc23ea8c87306e30792251650ce92e39
SHA1b07279949d4c8197ed82a6a79219299775198d42
SHA256f0c64198c7875c7f8702da6ffd0883a90c61dcf2748d74ee2a90f71cb99d1fc1
SHA512a100fcd32b8d4c279781be58d49d1395ad5763e2717777b671f3fa51339855f80e73131f240ffed2fffd9d9bb95db9912ba30cd10ae9fbf4587691b961a59af9
-
Filesize
109KB
MD58ba93eea54ba25332b84615579674b01
SHA10b03d4fb42baf71f30db0df5861925aea98a6384
SHA256b9b8c5174c02eb62dc5d02180f8991cfd09e34c523850cf99ea5507814a548d7
SHA512dcc48f782a92badca5259ffc4f6d4f8db01ea978bae6460b4141e8042db46c43deee5ff1f140a36c1e3b6ace3aad7a573f4a20a17c0e798d9063298d494c2c45
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd