Analysis
-
max time kernel
61s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 10:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://music.fbstar.net/static/mju5odi5oa\=\=.html
Resource
win10v2004-20240226-en
General
-
Target
https://music.fbstar.net/static/mju5odi5oa\=\=.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133548867800634836" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1268 chrome.exe 1268 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1268 chrome.exe 1268 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe Token: SeShutdownPrivilege 1268 chrome.exe Token: SeCreatePagefilePrivilege 1268 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe 1268 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2016 1268 chrome.exe 88 PID 1268 wrote to memory of 2016 1268 chrome.exe 88 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 464 1268 chrome.exe 90 PID 1268 wrote to memory of 3120 1268 chrome.exe 91 PID 1268 wrote to memory of 3120 1268 chrome.exe 91 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92 PID 1268 wrote to memory of 4044 1268 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://music.fbstar.net/static/mju5odi5oa\=\=.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd39659758,0x7ffd39659768,0x7ffd396597782⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1700,i,11566312331908884344,11201106775021331831,131072 /prefetch:22⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1700,i,11566312331908884344,11201106775021331831,131072 /prefetch:82⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1700,i,11566312331908884344,11201106775021331831,131072 /prefetch:82⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1700,i,11566312331908884344,11201106775021331831,131072 /prefetch:12⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1700,i,11566312331908884344,11201106775021331831,131072 /prefetch:12⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1700,i,11566312331908884344,11201106775021331831,131072 /prefetch:82⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1700,i,11566312331908884344,11201106775021331831,131072 /prefetch:82⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53ccb154cca009ce86757b187ffbc4da2
SHA11cdbc95398b2ac27c3399ec4589d6dc97db14162
SHA256de513fd42b15c58e62f9617759660ea99a5617649480117e9ee1edde60af8663
SHA5121ddff8a2f6a9c9bac55ea616edcf8a02453d319fb653a559b70fc7f9cbf363f6b5f21e854f01b6375cdcb79b08844127d76196234687291fa5db72e44904967f
-
Filesize
1KB
MD535d1b2627fd669780dc92a430fdec074
SHA1881f9f438c98767363cb33a1e603ecb4b9327b95
SHA2564b5e873027c4778da0705c1ef83011c4d24d119c65c72ccff8c9f4af18d09480
SHA512d6b1c660fc8a2e3273eb3ab9c3953c12823379740ddf9b978ccb67cee364c6d4e8140666a5b67cc65ba818f33809799b65cade91008ce0db49c2a780f7608136
-
Filesize
6KB
MD54690fe4ef29314e6d1eaf612ed638dfb
SHA1046e87dfc1b12baa31ca0cfd56cdff5d9c4b8f39
SHA2568f621365ddf404b7b8a5dfc1792c462bffff2b8402f2dd6b7d73819ccb3d4398
SHA51290a5e6023ee9be83bf210ae4fdb4fc2e84c25a7b649352730c34d6f35a2d81dd025e113465760c16fec21dbc2fde5abae3e7b213acca6ac094f116439cf842a4
-
Filesize
6KB
MD53f16de81534b4041c708f95f4f94e79f
SHA1ab5f28f6ca388fcc27c825b1a895d8efba021347
SHA2561054a06d7dffabda70f909eb3aec308871bc18d78dbba9814836c2aaf12f452f
SHA51275b8cbc32d8eca679e3957f0b523742e5a23e80675763d3844b0dd88cbffcf394836efdd46b3071b9010117b7e2913da9e36b4a3c70c50788c399e2a99165523
-
Filesize
6KB
MD5f34ac854358ea6f106dd891faae329d4
SHA1ec83437fb026750ec979fc9393a5bc3759d21f1a
SHA2568b843d65cf2a0768bcf507f95adbd37e07b7ead9e148b9daf581778be8a13402
SHA5120cf84bcaacf50ba01fa1249a1e9d42c657c8d366c081b8ac70feb81d3aba686288dede075425f4af8a76885f0b0443861f1f410326cd39cb2f63648e1143b15e
-
Filesize
6KB
MD5e47f6c3ce3ec8bccbf40a915bbc00b8b
SHA1e211d96df7522b02552b91212317b0d76c7a728b
SHA25655d13fca3b21b7fe1737dc89c626d6532662781a75c83a4248d8defab795a7b2
SHA512e73b239e1065452c27556031579a7f06772fd34242bfb2f3ad7e29c1bf3cdafe08000fd9e42a38526fe28ed69b71686383ea6ca54495b7ed8b084e435cb6eda1
-
Filesize
128KB
MD5fe91f2d37e783d001f7f061185f2f1b2
SHA1f8252e7d2606304b31d7c6800a1adefcdf498b43
SHA256f9cfda1e17fdba3383fb8c4e1e6152a8e9a47e68405ffa561b1240b9ac568afb
SHA5129ffae6cc792f63badae6a54d2cf2b0a20100ef9cf7a3eb2fba1fc56e0dfd8423bb8cce3e445d81f4edf6a74475e770eab1c4d296a4ba4c60032e65d5750dd026
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd