Analysis

  • max time kernel
    97s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 03:59

General

  • Target

    http://Roblox.com

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://Roblox.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5032 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1012

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          c5f20d91cc08608a86cdf45c1e06e8b5

          SHA1

          c0fce1c4a306dc0bf372ed0907cf8b7f4a2d4d37

          SHA256

          48506ee2253275198c9205a541e4fc2a20a31c359ad3206550a678d1cc267a95

          SHA512

          3f2a0dff529fab989e0afaf3c4c43f9d1f847f8569006f5afa3ea50245e364b363fd2d8b6c9dfa8837d8cf59c1a56ec41f03f0ff6acb82e5df9980c0be3e3da6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          fcf4d0c66dc844d3fc20606ef993ff80

          SHA1

          b0d10fe8a7948c0cc2de9ac42affde99fb40a19c

          SHA256

          cdec5298522e880af05d0ff6b00389904b2c044ab47bdaca9dda782a25c380a6

          SHA512

          f906237ea3548c32c812bca202150fed6cc5fe2e5eaab26168d66987e587e2f1845a6d8de8774e72321752f88ba38e03518428de16f2922cfbac5bccd068085c

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\osplltc\imagestore.dat

          Filesize

          4KB

          MD5

          bff79df574e10026b5913df3c43ee0bd

          SHA1

          ef12729d7c6afdc09703ced7180ac032ddc64c94

          SHA256

          e725cf0ff5c44e3f3a48c76d7affd2a307c50b0372efd848ac6b6544826ecc53

          SHA512

          39842c6d8c6dd7db359d303aadab8b8260a44261ad64df4758a6d9a7273e3e890705eaaebcd43870967507bd1439ba5fb50bc368ce57753563e1527657112ccd

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1IYUAPIF\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\S1Q31HZS\7bba321f4d8328683d6e59487ce514eb[1].ico

          Filesize

          4KB

          MD5

          7bba321f4d8328683d6e59487ce514eb

          SHA1

          ae0edd3d76e39c564740b30e4fe605b4cd50ad48

          SHA256

          68984ffee2a03c1cdb6296fd383d64cc2c75e13471221a4bcb4d93fcfa8dab54

          SHA512

          ed6a932f8818d5340e2e2c09dcc61693e9f9032c7201e05a0ce21c6c521b4ac7dd9204affbbfffd3bcebbebe88337fbd32091eaa1e35469b861834f2523c800d