Analysis
-
max time kernel
40s -
max time network
13s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/05/2024, 13:04
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AstralUI.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AstralUI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AstralUI.exe -
resource yara_rule behavioral1/memory/1448-264-0x0000000000FA0000-0x0000000001868000-memory.dmp themida behavioral1/memory/1448-265-0x0000000000FA0000-0x0000000001868000-memory.dmp themida behavioral1/memory/1448-274-0x0000000000FA0000-0x0000000001868000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1448 AstralUI.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1444 1448 WerFault.exe 92 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\AstralUI.exe = "11001" AstralUI.exe Key created \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Internet Explorer\Main AstralUI.exe Set value (int) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" AstralUI.exe Key created \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch AstralUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" AstralUI.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133615478752361396" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Astral.zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 1448 AstralUI.exe 1448 AstralUI.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe Token: SeShutdownPrivilege 3908 chrome.exe Token: SeCreatePagefilePrivilege 3908 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe 3908 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1448 AstralUI.exe 1448 AstralUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3908 wrote to memory of 1152 3908 chrome.exe 78 PID 3908 wrote to memory of 1152 3908 chrome.exe 78 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 676 3908 chrome.exe 79 PID 3908 wrote to memory of 4592 3908 chrome.exe 80 PID 3908 wrote to memory of 4592 3908 chrome.exe 80 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81 PID 3908 wrote to memory of 4060 3908 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/httpspy/njnunuib76544678/releases/tag/%23hello1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb8209cc40,0x7ffb8209cc4c,0x7ffb8209cc582⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1732,i,11036338867293428537,10074533617829460218,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1728 /prefetch:22⤵PID:676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2068,i,11036338867293428537,10074533617829460218,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2076 /prefetch:32⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2160,i,11036338867293428537,10074533617829460218,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2356 /prefetch:82⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,11036338867293428537,10074533617829460218,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,11036338867293428537,10074533617829460218,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4540,i,11036338867293428537,10074533617829460218,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4552 /prefetch:82⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4888,i,11036338867293428537,10074533617829460218,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4320 /prefetch:82⤵
- NTFS ADS
PID:4272
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:2316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4988
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2144
-
C:\Users\Admin\Desktop\Astral\AstralUI.exe"C:\Users\Admin\Desktop\Astral\AstralUI.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 20882⤵
- Program crash
PID:1444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1448 -ip 14481⤵PID:1724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD59d8eca8e52605cf133948b690942a992
SHA1d895192e4860dbb375a0c2121905dda124583d34
SHA25694505459494126f40795a82b00f1297952f87f17043386a4e4ace93f658f60cd
SHA5124d9a04c61d35734b2c2b9d0f9ab813e5770d7910cd0744ccb93b9677a4c39261ea56ff41f85790e74453a0dc328594e06a317bfc2d2331037cdfa72218b9d975
-
Filesize
1KB
MD5aef8aa8e872972f494601d935b5100d2
SHA1fbf1af8aa5a69e6904987033a5057b4c365e2270
SHA256ad306ba75a507c9bddc60a469b832f00376b9bd9262f9de582e9e0233ac616be
SHA5129a2964ebb8d89e4e88f5f6b241e214b1ad142978525201fef0bdd5567d383349c944f32fac779b075686de91dbff7b41371e3349f82fe357d3fd3741a3d0afa5
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD5147db787f6335cd62548367db8eec906
SHA164da4d19b42f2027d9fa51686dd13553624cb3a8
SHA2563850611f021e49f23a7b86a3fcf37ce441a6ee7da83c8748aaa398b8f83899dc
SHA5121bc3a157b2bc59e3e4021f464cc46a8a9fb41b0153599cc7fe4fb48e44f1b6a9638163c072a2d2f21430d4b9f401fab32dbd9acd103ed571858f003943831dbf
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5f8e1f0101cab1e966e5a00a61a0e0cec
SHA1c2a200c9a98b39f84043adf73a63aab571a839d9
SHA2563c93fd7aa0b522c9d2eafcf2e0b0f4e1e57e5461c2b822a42fe0f18696d7cad9
SHA512e7e6664bb4bc298c4339979453ca96e21567a8ce218ab6c674abce7d00c68e2ef603182977bd4f16a515e53566799b3c7a02adfb0eddd99f1b9bbf70619c5e81
-
Filesize
9KB
MD5be035ceba0dddf7168266f90f9c66113
SHA113c2d68c12592061905c9b13f778e25c72fd349f
SHA256e28617d5a8ea98ba1a51846f208147f78f028a543946321c3f233eb3d7dac754
SHA5123288b2b171f8e204a36b57aca167e422e0765f61d143888ef57dfde9ec182933d839126b135b7de4ee9182a420a8a0e036d41ca8c5f2df34ead8d5d0bb6c9670
-
Filesize
77KB
MD5d9a4bdba5e2c294a0f3c3eefe3ac27f1
SHA152d685b389c0d8d251a2623e210c95b6222a27c3
SHA25684afc4103228c0ae6337cfa788b3fd4ef49f200d5ab61fdf4cf76db35063943a
SHA512ed9adcfa9cb5dcb3a8679e0be82333d1ddc5f0603856967716ff2230f9551539b2f9d5b557b20ad69537cd78eccc8cbaaceb4c98b655c85abe1c2ef93eaf1a9d
-
Filesize
77KB
MD50462ab917e14e22b13d62516d9ab9071
SHA1134d038df19eb1b12981f6c7de7c41550ede1dfb
SHA25631978b210428b9a0ba07c37c2e79d1dbd28322b57c4af5e5d812bae98edf1db6
SHA5127459bc441911fe60a1825c8a25a369b78c7221c6b9ef2167e7f8601249fdda2dffa87aafaa12a21e74cba88e6b8387f37b0c05229026f5efa45e8bce3fc650b1
-
Filesize
9.1MB
MD562966363e48dc9caba6a39c4d8518098
SHA1f95c9546dc801737ec3157198be9332531321cf0
SHA25637749c07193368d4ba2f23f068aaa756fc9ce94e65afd9bb5f95d24d7af4137d
SHA512a4a57a38ce9b18fd9de9af6b7d3fa6a0e4e4261f10a0715f59d89c537103ba4ab5cdbb3df3f296086ccf2dc90015d735e5eb2f5dc4eb48dadefd2f6ef78f40f4
-
Filesize
105B
MD5cb6838993a5568a8d5eeb6acedf9e309
SHA17bd7300d5eb66d6eb1b57572801cc0030aab694a
SHA256ba12e238341c4a6d14ee53b2d3d90c3fd4c29440541b92da6e295274bc55fd1f
SHA5126685e5a93bc50a963960fdee447d8295a6571ad67bef9d9ab1f2ab1fcc5f374dc4849dd39a13485daa4769158c3349c412952a91cc88b3848c3afa09065acf57