Analysis
-
max time kernel
84s -
max time network
125s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/02/2024, 18:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://roblox.com
Resource
win11-20240214-en
General
-
Target
http://roblox.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2932 msedge.exe 2932 msedge.exe 1988 msedge.exe 1988 msedge.exe 1384 identity_helper.exe 1384 identity_helper.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 3052 1988 msedge.exe 37 PID 1988 wrote to memory of 3052 1988 msedge.exe 37 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 3692 1988 msedge.exe 79 PID 1988 wrote to memory of 2932 1988 msedge.exe 80 PID 1988 wrote to memory of 2932 1988 msedge.exe 80 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81 PID 1988 wrote to memory of 760 1988 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://roblox.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8fc1f3cb8,0x7ff8fc1f3cc8,0x7ff8fc1f3cd82⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,9463225385737648275,11964750287428645728,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,9463225385737648275,11964750287428645728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,9463225385737648275,11964750287428645728,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,9463225385737648275,11964750287428645728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,9463225385737648275,11964750287428645728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,9463225385737648275,11964750287428645728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,9463225385737648275,11964750287428645728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,9463225385737648275,11964750287428645728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57d4bdd41d7150644a9fecac756bd5298
SHA1cc6bd77ecef146f18a526ab6a1167649b2bf526d
SHA256ae1f95fd0cac26454941f0578d73b695849ce52ab2ef95eccbb63853cf9103ce
SHA512ba873b94e850c6fa0de096961380265ec833778854612e938ace2c4c1772423793d0d22a585533180328478cc23aef6971be56eee2256405636f80076ed2c796
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5d99b8739bfe228a2fc989787c6561d7a
SHA172b099b177a85536fcd85c4740f1aa5f65ee9339
SHA256968d60dbc03670745e6d4033e2da7443e18d5b8b4a96a3250115d70e1cdbe9d3
SHA512a19776ce78acf34be9c3b2594d1ece9e8be1220e9392041ba7b1f1da869a39110f9098bbb85d0fba6f320913bbc959c0e4972634e21d896a7800812f94c23288
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
916B
MD5c8233fde7509da1da7f3f198c89a7cd4
SHA1dceeff3e8efc28493dd07379796c32251cc06222
SHA2560d4585703e3b5a84a091e1e8521b8fb9b1961ef26beb5f017b642f33ead3df19
SHA5123aa8473b73a046c179e44709839cb3a17e9b9df969631a6d9568115eff41a2ae5a30d5c6b207148a4b443400e7116d8de66ff17ffff1090bbd5d9198ddd39a5a
-
Filesize
5KB
MD5d09e8333676d253ce544bcc9289c1f57
SHA18f8da1f3c6ee4a1d700c8939e56804dc4872cffb
SHA25642060e91fefa2cdb0f384c1baa0c16fabdf8cc93e15d37c23453b5f03380c082
SHA512afce99fdc25eabef4524b367a87184f6ea484c701e4f06dba6a30ec632e798f51d26cef744969fe3a42dfb49190726cc0ee6d0ab15810d16b20abbd54cdba101
-
Filesize
5KB
MD51730f2fdb83fcfb18b32fee671a5f539
SHA1728499c371fddb32ea51286bffa5faf9e3e3b00d
SHA25637f94530eaf06271613ab16dcdf9758727421f1488d919805abb0bf3dcc69bd7
SHA512d0870bb1d3b64b0e761d53aca693ae6667917592084a0088c279b02c8ff50ff43c5178e708c0f10b3124fcdbc7a3919407f656212f3ff394ce1102ff5f392c1c
-
Filesize
6KB
MD5fe2a3c092db45fb850551b65f356bb9c
SHA1a3e0c57af957632cd3e0b14ce7681654dd4cb478
SHA256f094dd5d953dcf8975113802f127a5de4c402b7f9dd96755b4b2941b55f9b2bc
SHA512250870a02871dd8aaef7ab60e7053bdfeb41ab16b3d504a7b5cc03fc2e7d03adbc8030c8186ba6063de848b741b0ccb8ef94cf2e5ac49eedc07e7f34105a859b
-
Filesize
25KB
MD500042df6368289238bc60caef1baa46d
SHA1981c49ac7b10bd2a9d159daf00844110629837a9
SHA2563ca68414527ece019ac110954726207b8a46bebe6180c2615158f7aebf6e6b1b
SHA5128f549ecc6a1ac0cc153fe39759b8fe093af520dd94e37b8c32e7fc7e87263cc5b2bf404bff31a5960ad9fcf82dabb5a534fa07cc441ce646de2a8b532c28ff51
-
Filesize
1KB
MD54e1cd28f316864c7017284b64430472f
SHA1086145d0ce326b507c44787246e72f3f56a1fa5a
SHA2567adb1ddc31a578b37d474aa5dbabc0681209f488c7ffb9a6e2b804b4c96ab270
SHA5126fb9be84f4497e2c4947450ea70014f6cbe25b4374e2f422029fd4c62725cd0d9252b14892b80a24e9e92c6e55d364406b14b74ca87d1c1a0c894b4e3cf098e9
-
Filesize
1KB
MD52564250553708c755b9c5f7dab6cb12f
SHA130b888a4ed815defbdb4e9c03967da7e5cee5d30
SHA25675a28238484bb15a41649c0d7bd41fbe71a86c492582431cd3830f2cb40c3d62
SHA5129b39ebd5a5236c317aff89362b1970960692055e03f3c5113c8ee336e52f25efcc080c014f625c0ca34e10f463708eb3bee5e069dd764b31c68b6620ddb8989c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53281c7f16ff9f00caaabb38e09efb957
SHA1615d1f24bfa250248a7f4198b27144aae2920e1d
SHA256b962cb4d4ca49e13ba7415400d6c10f18bcb0628fed7ff3493fdc349e5155129
SHA512f032f53fa088a4b1374b1a8aa11ad7800e8b3a9483bcc57512bf79aa6ea44ed66e3837dfd0cb420c4e0c20bcf293ab8b6deb2abfd7008206e94ccfb7a1aca6fe
-
Filesize
10KB
MD544d90d539f7c671fd5e2391e5f5e13f2
SHA1728dc194b45cd6b5c64898036185d60aa0e24ee7
SHA256adca9a4866c67bc123b5fa4406372f2d2720948d3756551a2858fccda8161d45
SHA512a2703ba509853c1936f9e65d4e5850647fe278c637999736c76b7b0b566143ad828218cd3739a87896e04904b5536086e9c39976f003685caeb36342cd9a2e8a