Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 07:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://atilimshoes.com/Homestar.html
Resource
win10v2004-20231020-en
General
-
Target
https://atilimshoes.com/Homestar.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133444209893743777" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4516 chrome.exe 4516 chrome.exe 5888 chrome.exe 5888 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe Token: SeShutdownPrivilege 4516 chrome.exe Token: SeCreatePagefilePrivilege 4516 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe 4516 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4516 wrote to memory of 3360 4516 chrome.exe 43 PID 4516 wrote to memory of 3360 4516 chrome.exe 43 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 2380 4516 chrome.exe 88 PID 4516 wrote to memory of 4192 4516 chrome.exe 89 PID 4516 wrote to memory of 4192 4516 chrome.exe 89 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90 PID 4516 wrote to memory of 4328 4516 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://atilimshoes.com/Homestar.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad5589758,0x7ffad5589768,0x7ffad55897782⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1844,i,9397330229022842444,2781600727712391549,131072 /prefetch:22⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1628 --field-trial-handle=1844,i,9397330229022842444,2781600727712391549,131072 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1844,i,9397330229022842444,2781600727712391549,131072 /prefetch:82⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1844,i,9397330229022842444,2781600727712391549,131072 /prefetch:12⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1844,i,9397330229022842444,2781600727712391549,131072 /prefetch:12⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1844,i,9397330229022842444,2781600727712391549,131072 /prefetch:82⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 --field-trial-handle=1844,i,9397330229022842444,2781600727712391549,131072 /prefetch:82⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5224 --field-trial-handle=1844,i,9397330229022842444,2781600727712391549,131072 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4796 --field-trial-handle=1844,i,9397330229022842444,2781600727712391549,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5888
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3040
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4224
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504B
MD58b5eec10485150d80b7faeae2d4e3103
SHA13c08343dbe0f1564a23e7d231fc95ff1aa1f53c8
SHA256c1cce95d3bfdbd70c0d2afb13b380a9752e548d289613187a8b3842103bf3bc8
SHA512eaea224a7a1525108f7d663bc7eae10446eb172e830ba4541099127b9143785064962ed4a533e5b96a6b0149c87e2493df376dc0a743addb1d9a9c74e6718fd1
-
Filesize
648B
MD533f7a319e739010b01ac9751d40d2541
SHA1ecc2b927a55f24a8bd7777398aa84d68ead6fef8
SHA25618b1c47374359cddb444a3dff2f60838b1662e560ef2094c815080925d647df9
SHA512831ad5bca016fba4d8c139560983d624f750df897b5fe67e50e65b3f86cff4691319d51189bf85ddd0897ab9dd884a5d80c62307019fc48c150c3c448d790152
-
Filesize
3KB
MD5b107e239d25436f36d2b0e5196392207
SHA1ccd8c631f2231b548ea9a034cd7552ae4f1758fb
SHA2560c3caf2aea02afb931c3d598632d4616cadf731a909f92fd04af92e56843f760
SHA51202764e2e442f210a77be3bf6f6db9f8776d39f1c1839f8ca961c1e2a783b62c6d220bd5e7fea56fa57bc5f0bc0b58bb3c5268f892e4eea97ff2698de2d57e545
-
Filesize
1KB
MD5ec87b277f7b4d645071e4e42b801e8fe
SHA17023070c102bb1d961e9d665a8da869de4031092
SHA256cf0af4cfdd89ef604639d0a1cc6b33b43f3f3a2326f3dcc430387a2828d5df1e
SHA5121ec4a7e256412ab17b5408818160dc738da0bad796894a517098ba3368ccecc3bfd368882c71cabb1f768575ad24b43123c202839e02dbac8045c865f1970877
-
Filesize
1KB
MD579c7e088167a25eeef928a264a0f3b8c
SHA18e4ed1f904a90bf2888fb1f5b86cd833c6f341ff
SHA256981a60786f3d3c69e75f34220ed4cd02cd9d2ad78bb4aebfbe136ce5361bb0e9
SHA512a994fb0697a04de6a1ba7b13655763022ac0a9c63ce5a85ec51be5458e0729b61f201cad46b2de32e8c34ce4c5264692b1d2f58d1eb1597319b32dac243506cc
-
Filesize
6KB
MD59b783d4461032b105814dd90528dce83
SHA1b3c500b4a2741930a6fa2d652c16fd9c5e0378a1
SHA25615c5761ed0ae5e337c438ad7bc0a4aebcaa598baf8b5c18dc54588f370fdabb3
SHA5126f0f52783d81c07ae08519e209d468a80092aa6fc2e7044323d4f373ab41d86af416a6a926f6b34cff50e614104e1945257e0b917865bf3042f6791a5970130c
-
Filesize
109KB
MD58b9f3f1219f04a00ccfb0c6a5e03381b
SHA1d27708d6b4ea6d1a838ca0fb40e5b2a18066cd11
SHA2568f7b52196a5899db87b4739354d1c490ac3cec7ad4cfd5cbaab6f6a35cc40682
SHA512fb19db5fcde7de4e6b2919c1d8a31a1f552f5e31648fff71ee1b5b18eaf9d7f2e6539afa2ab6bf4f95f13ec43c6b2a6c6fe18a6b9cfc193275de8b189817698b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd