Analysis
-
max time kernel
54s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05-05-2023 19:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://roblox.com
Resource
win10-20230220-en
General
-
Target
http://roblox.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133277870943141398" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe Token: SeShutdownPrivilege 3168 chrome.exe Token: SeCreatePagefilePrivilege 3168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe 3168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3168 wrote to memory of 4684 3168 chrome.exe 34 PID 3168 wrote to memory of 4684 3168 chrome.exe 34 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4792 3168 chrome.exe 68 PID 3168 wrote to memory of 4832 3168 chrome.exe 69 PID 3168 wrote to memory of 4832 3168 chrome.exe 69 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70 PID 3168 wrote to memory of 4060 3168 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://roblox.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffec73e9758,0x7ffec73e9768,0x7ffec73e97782⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1680,i,7773826707463373224,9477395662190307145,131072 /prefetch:22⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1988 --field-trial-handle=1680,i,7773826707463373224,9477395662190307145,131072 /prefetch:82⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1680,i,7773826707463373224,9477395662190307145,131072 /prefetch:82⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2720 --field-trial-handle=1680,i,7773826707463373224,9477395662190307145,131072 /prefetch:12⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2712 --field-trial-handle=1680,i,7773826707463373224,9477395662190307145,131072 /prefetch:12⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4384 --field-trial-handle=1680,i,7773826707463373224,9477395662190307145,131072 /prefetch:12⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1680,i,7773826707463373224,9477395662190307145,131072 /prefetch:82⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1680,i,7773826707463373224,9477395662190307145,131072 /prefetch:82⤵PID:96
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5835eda7da50998dfe421211eef6b55d1
SHA1e998ae67511c3d9690a24e9e73b9f05d5ff27f49
SHA256b4c48a8b3563e8b8181baaf36ef0e75c265cf128f21113e35ccba9a0f564623e
SHA5122407a5c7df3378a2479926be89a9a81838d37f6399de692ddc410fcb1567dd5a036d02b58f228ec6268c819b409f67991e52ee33f32ab23b3eb5bc9810dc16e6
-
Filesize
1KB
MD59fc2294c8b497e15660873863f2a238d
SHA169c637c6be400cde75fe45cc6d499528ec5fc93c
SHA256c56b77ebaef4e149b4c03010655a47cd7e2ad1b3e04b09763c4d31cc7a1e8590
SHA512e7da019b29a3bbee8827d797c5293f2e6abc6675c8dfc5f7c2f60d7352a58930a20296b4c7cb324b7ffeee97faab985d9acbc97bc1e459d49d9557656325f393
-
Filesize
1KB
MD534c59c5a8d6740435ca0f0d4d2afc6ba
SHA18676cf34387533a4cff6b5abe33f60f4d0702452
SHA256bea61ef0b3fd31c85a581dcf9b572e10911437c3353fc43a17d2439d012f730a
SHA512460a292b2bda33d70777691681157e0ab84b81f58d31a6b2442848662afe1cf8cd38cf48126d6f60eddd92d2d4e251f88dffc1567090897bc32e5c4aa9587c7f
-
Filesize
1KB
MD5e4185887586f5bf96deac71b43cc1bd3
SHA19332d1b25006197bcef4c5f21b520111d3c0657c
SHA2569abefc9bccca31e0055311f1ad4f5e2d0f4070eb07c3a1495539b6eebc2be165
SHA51277b1a10d4de73c84949b804d3d2199bea1b8d7eafb73bd72b9f2875074e8ce316f7bc6254c97289847286ffca1f50a301780516bff7e56e6c4c86941171ccc0e
-
Filesize
5KB
MD5bea0cbae4578ef0f0ad03771ffe3b15d
SHA15f07d73d9447d2b6f0bd00c9bf8c6ffc8ea7f676
SHA25670d648d7de9102790caf0abc7ce599cbd58a20a865709f7743f9933ad9e9b598
SHA5127f675cfdcdaf7630c5990611008c3e700537da35ce31a666e0790115252e9b06dce45f2188b255f33dd36d14ed922efada50af204204541e4bdd0f813a021dca
-
Filesize
5KB
MD52c26e5253b3f9a169136a36cb14a2cd4
SHA12c6aab677259ea7e6e4694a1aee64024c52fc953
SHA25617dca8efbd40203b568ac8a9744e302e96a650d13e29a5cc9ed95b1d2bb368bd
SHA512fad2545537fa05e76fd8a21e3c35bf68d88d1cc1f45d4d40552e74aabaa2e61971948e3f2630d2e0e4d03c005c15ae95d4e8b703b0f3ed4dbeeff9431bb07384
-
Filesize
148KB
MD57dacda47edec74f3ec289ca4877b21a9
SHA17202529c1ae6c1cb894973af174778d4195f1051
SHA256a4641c79ab0a7a9cbb81edad1a52c4cb4e461f5563bd4e8f66c5653d958e0573
SHA512556e0b6ab3af6b76b765d76c58b7148efdcfcc2f2465b43d6423a6a6deaf3fc14ae9860b037dccaefa52a4003d6ea48569dce46dc8e675bf96e9b4c71320b42e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd