Overview
overview
10Static
static
3stellar ma...DME.js
windows11-21h2-x64
stellar ma...lit.py
windows11-21h2-x64
3stellar ma...est.js
windows11-21h2-x64
3stellar ma...x.html
windows11-21h2-x64
3stellar ma...t.html
windows11-21h2-x64
3stellar ma...x.html
windows11-21h2-x64
3stellar ma...t.html
windows11-21h2-x64
3stellar ma...x.html
windows11-21h2-x64
3stellar ma...t.html
windows11-21h2-x64
3stellar ma...ar.exe
windows11-21h2-x64
1stellar ma...ads.js
windows11-21h2-x64
3Analysis
-
max time kernel
112s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-09-2024 21:49
Static task
static1
Behavioral task
behavioral1
Sample
stellar main/include/httplib/README.js
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
stellar main/include/httplib/split.py
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
stellar main/include/httplib/test/test.js
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
stellar main/include/httplib/test/www/dir/index.html
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
stellar main/include/httplib/test/www/dir/test.html
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
stellar main/include/httplib/test/www2/dir/index.html
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
stellar main/include/httplib/test/www2/dir/test.html
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
stellar main/include/httplib/test/www3/dir/index.html
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
stellar main/include/httplib/test/www3/dir/test.html
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
stellar main/output/build/stellar.exe
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
stellar main/roblox/Threads/threads.js
Resource
win11-20240802-en
General
-
Target
stellar main/include/httplib/test/www3/dir/index.html
-
Size
104B
-
MD5
aef30cf746db10a8fd09ab6bf6b701ce
-
SHA1
208361e1686e97df83bd2a47eddb6339e6c2d0f2
-
SHA256
c1744dc371ffe1aa631aa917e0e43a7ec53fb6097975778b43dabfe0f2d05bde
-
SHA512
6dd3469e78d6000e20fc21c158984770fcb134ecb4c47bf0c24b5a54dda138bc8fb54ccec01d16f8eab7d653ab8bc45b7919c8258058e26948c96c2c28712f23
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 4420 msedge.exe 4420 msedge.exe 3264 identity_helper.exe 3264 identity_helper.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 2328 4420 msedge.exe 79 PID 4420 wrote to memory of 2328 4420 msedge.exe 79 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 1800 4420 msedge.exe 80 PID 4420 wrote to memory of 3572 4420 msedge.exe 81 PID 4420 wrote to memory of 3572 4420 msedge.exe 81 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82 PID 4420 wrote to memory of 3912 4420 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\stellar main\include\httplib\test\www3\dir\index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff835d83cb8,0x7ff835d83cc8,0x7ff835d83cd82⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,5966950787341703263,12585812466395315771,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,5966950787341703263,12585812466395315771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,5966950787341703263,12585812466395315771,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5966950787341703263,12585812466395315771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5966950787341703263,12585812466395315771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5966950787341703263,12585812466395315771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5966950787341703263,12585812466395315771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2416 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5966950787341703263,12585812466395315771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5966950787341703263,12585812466395315771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,5966950787341703263,12585812466395315771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,5966950787341703263,12585812466395315771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52ee16858e751901224340cabb25e5704
SHA124e0d2d301f282fb8e492e9df0b36603b28477b2
SHA256e9784fcff01f83f4925f23e3a24bce63314ea503c2091f7309c014895fead33c
SHA512bd9994c2fb4bf097ce7ffea412a2bed97e3af386108ab6aab0df9472a92d4bd94489bb9c36750a92f9818fa3ea6d1756497f5364611e6ebd36de4cd14e9a0fba
-
Filesize
152B
MD5ea667b2dedf919487c556b97119cf88a
SHA10ee7b1da90be47cc31406f4dba755fd083a29762
SHA2569e7e47ebf490ba409eab3be0314fa695bf28f4764f4875c7568a54337f2df70f
SHA512832391afcac34fc6c949dee8120f2a5f83ca68c159ff707751d844b085c7496930f0c8fd8313fd8f10a5f5725138be651953934aa79b087ba3c6dd22eaa49c72
-
Filesize
5KB
MD52c2bdd089bf603a012367a7f53bc7b6e
SHA1123b1f196d8b746880771d8400524c40e7e9d3f3
SHA256fa2e53a3846fbf65c5b66faa8097c2ac431000da101a99cfe408945adb29007a
SHA51225326c0a5db05872145756f4b35cfcfd75e715289c6e24a8a92c60fdf6ee57c7225d2dc62f76e842032a435f29dd3c46351a25c20c8287ad0928a7a8b482f71b
-
Filesize
5KB
MD584b568e31f524f8ef7b37b8996412b9d
SHA13ee0f4bf0555023d5b33abb9fc5e75f9c2368185
SHA2566004a672050a997687a72574b9e22a93ca7e6b3438a221d484ee8ef513d4116e
SHA512a7538258699a77df1f646bea28371ebd48225312e942a58dd9e74034918f3ece5f30427471ebc86cd7c9ece035e5c3c9edee50bd68a7a1eea6e007c4d986b9ef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD596c1b685afad75b446ba7f4f828a79a4
SHA155de92018e8f1a3c7218c37649d5861e09f5744f
SHA256406a14c8c99c1a754f179b17c360346a5659d1815470adb886bf198befec8dad
SHA512f0773f44e17d28911ff2a9c85db3097461ae5df5d8eeecd9f51766f2afaed5f75b85a286b8723c13adda61b470165a2856847f6202564ed9371ceb42a1f70830