Analysis
-
max time kernel
1799s -
max time network
1692s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
07-11-2023 17:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://roblox.com
Resource
win10-20231020-en
General
-
Target
http://roblox.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133438525515726820" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe 2844 chrome.exe 2844 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 1648 2656 chrome.exe 71 PID 2656 wrote to memory of 1648 2656 chrome.exe 71 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3428 2656 chrome.exe 75 PID 2656 wrote to memory of 3244 2656 chrome.exe 73 PID 2656 wrote to memory of 3244 2656 chrome.exe 73 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74 PID 2656 wrote to memory of 1476 2656 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://roblox.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb1cdc9758,0x7ffb1cdc9768,0x7ffb1cdc97782⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1756,i,6838215046789449727,2427765707991693826,131072 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1636 --field-trial-handle=1756,i,6838215046789449727,2427765707991693826,131072 /prefetch:82⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1756,i,6838215046789449727,2427765707991693826,131072 /prefetch:22⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2812 --field-trial-handle=1756,i,6838215046789449727,2427765707991693826,131072 /prefetch:12⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2676 --field-trial-handle=1756,i,6838215046789449727,2427765707991693826,131072 /prefetch:12⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4644 --field-trial-handle=1756,i,6838215046789449727,2427765707991693826,131072 /prefetch:12⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 --field-trial-handle=1756,i,6838215046789449727,2427765707991693826,131072 /prefetch:82⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1756,i,6838215046789449727,2427765707991693826,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4444 --field-trial-handle=1756,i,6838215046789449727,2427765707991693826,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56dc7ab3447ad8494d0ccc41f211d8656
SHA1a00991badb5ef39f4a223c52617c796eed88a650
SHA2562086cefafc1ee10d272c0a20c542da2b1ca0e63cbdd944c609fc64a5ba628793
SHA51275dce8464e2db30893aa6fc59787dd7291e425de3ad81007b7dadd9ceb56ec0f424c56475a53106b4f80338e1aeb2c25380a282056c47a1c435d3e3a9a681bb7
-
Filesize
2KB
MD5616d3d79d217af21074da9e996001c6e
SHA134f20c2bd407cd5a93ac06dc0d62979ced4f8008
SHA2568c81bc59d18ab705f378f505f88f80621f8e7e1cb804625ef8ae18337325f8cf
SHA5126fe4554afee3e39564614bba23f81eada27bf867134e6c8234892e252d38bf083bdd75647b404ba33644a208216aa49c7af5506f31dbc8fab801483541b0f9ef
-
Filesize
2KB
MD522616076736c0b1f47d24f8cc2cafe0e
SHA1febbb4101e2294dd6a699b37396473be9cb78274
SHA256480453aa0ac855e8fcea1db9f91541f969e88afe32aaf8a14507363fbcf0aee9
SHA512bcabcbbe59499e1dd4a79eb9f6506686b81842f53cdbff7bac1ca74866963738c56956ba77bb9976b1dd7100e5f5b6fef1fd7c0b2611abbe2da7f87f1cf44480
-
Filesize
1KB
MD58c88e2c59df077c5076cd36b8bfb5fe2
SHA1e1be61fca40ceb630862ec163202c06c9e798a3f
SHA2562310d9ff9564be99e12f0dd61931597d8238dae8616f686ac1314213c4713781
SHA51296c06b5a5eae7fdbf8248229fa630c8f897a2fda02612097abf848662e0ea5bddad614544c5f9a17777ef5b36c9f2a00547adb1e9d4cf7741a96180446e48bc6
-
Filesize
1KB
MD5e9cd10df9fa5eb114783802a3bd3cac7
SHA149664ea20a868c2184ac2a1c20b0f4cfe972a01a
SHA2564bebcc646ab567d7c6e18db057cdb3679ff975e1090a73258ab032e2d8b4dfb7
SHA51247b01d753a7d913656be9a6679ab8d733d14bb89056829fc67f8e6668be485f96c4f022ed5367db16301e017db5da4e5f90b4471770c7cd3dfcf274213404ead
-
Filesize
1KB
MD58bf9908b59c0cb5426d582f24246a86f
SHA108d4617aa96c34806dd4028226b650d6abe7fd22
SHA2562e19e93399b34fd192d13fe26cbe57140003eb8c6087a374f81fc5bf77aa4bad
SHA5124c54473cd031b842ca05c5c019687d2e2e0eaa4e4864f883e4111af58377378897c99b4ec62401bcabc92be049f8b21625e3b5a01362f4d7d462751e7a2356d1
-
Filesize
1KB
MD5925ef2f4faac90539343c93b03290184
SHA179e594455010f564b3fb980338f25a87fdb2032f
SHA2561c2b99d5c822657281fd4926c57878fe130b8d5a6e96ae06a559e3552c05deea
SHA51220970cd6310ab562133762acf43921b770a23910d4179787e2df146fb1fef77da5041e64aaa3470d25df20fcee173535a379295bfcf022823d05166a966034ca
-
Filesize
5KB
MD5a0afbc3570793bf38ff34672bcf3f312
SHA13c4e427371b772716f875bc0315bf6c693e99adb
SHA256586657ffff06d71ff2ed9995450f37e5506521647f5efaba22fa94a3aee53fea
SHA512b627aa1087a49e8e94c2a8a1e735cfaa99c9376c9fe659bd462dd941bf58b533dbe46d061fd338f2b5a70b0d94bc33259797a31efca119b33629102115bc5178
-
Filesize
5KB
MD5ab5e2fbbcf01cea33c1e1725c9f48587
SHA1048d39c13e0a4721649ade67db2a93060dc47e96
SHA2561bd06822ef80823977b5dffe5633b12faead42ebec98f01d0ca940c46be66819
SHA512f1fc9cc2d3491fb46b06094f00b6a23dfa41732ad505e441ef8bd0feec0dec0dbd59405d91f70002d9d7bee77e6ded95b4c90dc2ff8d12e68474e3e2bc8c28f3
-
Filesize
6KB
MD5299ca70b663ea8392b357fd3e26a4b24
SHA1bd41e39d09d74ad2be8058833e0f415b1e797ca1
SHA256af396056a6f8986e6c6222c039125e1fec2fa7d0bb2b11395d49f2a8c206e7d3
SHA51252790186eb5e191f7c67edbd7ae68d5d36ebc76e7b3de8aefa0144e0d362458abab85a3add98c3a3355c301b2cf44425e9b6217faa202af0c4c47cc0a1d348ec
-
Filesize
209KB
MD599cdd3625cbb0e475159de737224da38
SHA183fb8c7862415379c543528767728c38e521c3c0
SHA2569acdcc9e45ce0e506f2e842d5cb1326db6d0250290987dce2eae9dd004da2db9
SHA5126e479a953f6220fa9e63bb42371aff078aa048482b7db0de668076644f46eabdec12b43eaa3cbdf417367e2681c1ca1c5130ad22cbf37b26a70336ac233acd36
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd