Analysis
-
max time kernel
1799s -
max time network
1689s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 20:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://roblox
Resource
win10v2004-20231020-en
General
-
Target
http://roblox
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133445536436180106" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 3440 chrome.exe 3440 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe Token: SeShutdownPrivilege 2980 chrome.exe Token: SeCreatePagefilePrivilege 2980 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe 2980 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1396 2980 chrome.exe 54 PID 2980 wrote to memory of 1396 2980 chrome.exe 54 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 4024 2980 chrome.exe 88 PID 2980 wrote to memory of 2312 2980 chrome.exe 90 PID 2980 wrote to memory of 2312 2980 chrome.exe 90 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89 PID 2980 wrote to memory of 3416 2980 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://roblox1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbac0a9758,0x7ffbac0a9768,0x7ffbac0a97782⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:22⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:82⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:82⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2968 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:12⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3760 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:12⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3244 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:12⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3936 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:82⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3992 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:82⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4568 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5060 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:12⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5140 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:12⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3924 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:12⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5904 --field-trial-handle=1872,i,3478926143127491062,15833306686951155648,131072 /prefetch:12⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55222b95c287a1bddbf7953e9abe47a92
SHA11bc6084352219c0e9e688239456b1446d5ea1b57
SHA25624646a43a3c8715e68bede847163860bfd09f68b7dd6470b28ee38e2803948b3
SHA512262b450d388bffae60068bdb5fff82e6df8788d3ead0c457bca407d5c26657731f5f1cd10d246d9f9590d6475d882deb644c37df97847b767ecbe768297a3adb
-
Filesize
6KB
MD5e31d0ae24386f888fdb2f0d662a8e722
SHA15d6767253662dd6af34d0c5d0299e1ba0281dc69
SHA256c39e10b4e0cb64b80cfbe0b4e2ead534ad841884f2f1e42deea177ef92cd0c61
SHA51279b51e2f431c742fbb10635a86652e17f7a4a0c76429d858f5e89866a7585131bd843f93c65bc50f3de0b0201c588350d4261baa5d9cf568f52e9dc14de434d3
-
Filesize
6KB
MD5444f382867c984efb8b70bb419c98622
SHA169e75ceb23c02f3ecf44b0f06b9bf97c73510305
SHA2568dda3fa733d5a0113c3e90f743d7e14f029929ed84961a27612e209385321d32
SHA512f73e63b9219322a49c52d705d08a211653f1c64387d2d46616330f4b45d6d4706e6e44b6f91ef7f8f3e868b48f8d09473b69dad86bffe5154d2738c8751d2513
-
Filesize
109KB
MD5bea380a62548a16288d2762bb4dcdfec
SHA1ad5afdfc51e465ffa90e220adbea5c050fa59b53
SHA256a0dc503ba8a37f7b7ba6c4cdd39a52ab615ef2e3d78b547c325c25bfdbfaeb18
SHA512bb1f59ae62cc74b90c78718d60b6c31e8ce84278d56e5ca8186f3b8762b201ac0c7b98238a3ce9faf803ce71f5caa4dfdc32473488c7e6b03113602876079d2e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd