Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 06:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://member.stellarplayer.com/material-game-popup?resId=nZwX5GnK6D0kk&res_btn=&res_w=439&res_h=269&redirect_url=http%3A%2F%2Fgame.stellarplayer.com%2Factivity%2Fquarter12023&res_url=https%3A%2F%2Fsta-ali-12.coldlake1.com%2Fplayer%2F20230526%2F89cbc9fc5106480d8594d4755d54c900_440x270x47.jpg&res_t=image" 7212 439 269 1685408317319000 40 "52ea16a075661d778639c45452efafd4" "20230509173047" 0 1 1
Resource
win10v2004-20230703-en
General
-
Target
https://member.stellarplayer.com/material-game-popup?resId=nZwX5GnK6D0kk&res_btn=&res_w=439&res_h=269&redirect_url=http%3A%2F%2Fgame.stellarplayer.com%2Factivity%2Fquarter12023&res_url=https%3A%2F%2Fsta-ali-12.coldlake1.com%2Fplayer%2F20230526%2F89cbc9fc5106480d8594d4755d54c900_440x270x47.jpg&res_t=image" 7212 439 269 1685408317319000 40 "52ea16a075661d778639c45452efafd4" "20230509173047" 0 1 1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133343945312379708" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3456 chrome.exe 3456 chrome.exe 856 chrome.exe 856 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe Token: SeShutdownPrivilege 3456 chrome.exe Token: SeCreatePagefilePrivilege 3456 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe 3456 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3456 wrote to memory of 4376 3456 chrome.exe 84 PID 3456 wrote to memory of 4376 3456 chrome.exe 84 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 2296 3456 chrome.exe 87 PID 3456 wrote to memory of 1788 3456 chrome.exe 88 PID 3456 wrote to memory of 1788 3456 chrome.exe 88 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89 PID 3456 wrote to memory of 5112 3456 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument "https://member.stellarplayer.com/material-game-popup?resId=nZwX5GnK6D0kk&res_btn=&res_w=439&res_h=269&redirect_url=http%3A%2F%2Fgame.stellarplayer.com%2Factivity%2Fquarter12023&res_url=https%3A%2F%2Fsta-ali-12.coldlake1.com%2Fplayer%2F20230526%2F89cbc9fc5106480d8594d4755d54c900_440x270x47.jpg&res_t=image" 7212 439 269 1685408317319000 40 "52ea16a075661d778639c45452efafd4" "20230509173047" 0 1 1"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff936a59758,0x7ff936a59768,0x7ff936a597782⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1896,i,17546295441900318303,1242827838558404238,131072 /prefetch:22⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1896,i,17546295441900318303,1242827838558404238,131072 /prefetch:82⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1896,i,17546295441900318303,1242827838558404238,131072 /prefetch:82⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1896,i,17546295441900318303,1242827838558404238,131072 /prefetch:12⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1896,i,17546295441900318303,1242827838558404238,131072 /prefetch:12⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3884 --field-trial-handle=1896,i,17546295441900318303,1242827838558404238,131072 /prefetch:12⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4076 --field-trial-handle=1896,i,17546295441900318303,1242827838558404238,131072 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 --field-trial-handle=1896,i,17546295441900318303,1242827838558404238,131072 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4344 --field-trial-handle=1896,i,17546295441900318303,1242827838558404238,131072 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4468 --field-trial-handle=1896,i,17546295441900318303,1242827838558404238,131072 /prefetch:12⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3400 --field-trial-handle=1896,i,17546295441900318303,1242827838558404238,131072 /prefetch:12⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1620 --field-trial-handle=1896,i,17546295441900318303,1242827838558404238,131072 /prefetch:12⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4644 --field-trial-handle=1896,i,17546295441900318303,1242827838558404238,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD53982c8fd167d1a7c19c26f365a9ad886
SHA1bd8635619ca4ccbbe4bd37e4e627a31cea484a16
SHA25632917326d9696afb48e0560cdca30aa6c08ee130492f8a9c2fc2f69c8fa4a871
SHA51233023b36de14312a1f97694c52ff887dc065b9f74136983eea9eb52b7c1bbe7514ca802cef09ded9a17499222eeff2e72bafc249454a7c4006d0a3724e0f3cb5
-
Filesize
5KB
MD5e3421c8f208ccfb6148039f0bc4df1a1
SHA11d7fd014c894d60384d4e2c7f4fdef25d06c953b
SHA256303837828dc0761cc80365f89c0c1ee4312daff53901d7197492cedd27a6cd4c
SHA5121189142fad529b6c0cdca4c515e437cc77d6054f96ddecd6c0155f09ab61bdc4ab3a6e9cc39d771a0792d4a868e2f282f9b3164483645853a2964d9d27458383
-
Filesize
5KB
MD505bdbdc5d15c8f0168dbc4faa8188f12
SHA144851f310faf752c48c0155a66ea2fd8d59edbb9
SHA2560be8a7f03a0576c6b7863a4909831cb2175245d9d6bb660276f877d70af06fb8
SHA51267f59a0e8f37d3137afe52b87af744ea468a72a76cdb3e2bbc50084b73c557fbe09fbd3bf6a0a7c11fa544d9e2a90f91ada9670a6086bd5c0d98682cd2d3ca6d
-
Filesize
87KB
MD5fd6fb6ecdd2b18d978b044506dc54a5a
SHA109fb4df20cecdc77d32adf4877aa1d1b734d9ed3
SHA256881e9e66a157776f87e2efa3fe92049a3e1af07f33c5f15c368231963c21954f
SHA51251150256f65caf539a2df55d375d0332c934389c41937c65f6589a51f7d1dcca95b854e13229f1cd48a8135a91d2a941782c3c166af0b0080b99fffe815ac47e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd