Analysis
-
max time kernel
1681s -
max time network
1691s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-02-2024 20:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://roblox.com
Resource
win11-20240214-en
General
-
Target
http://roblox.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5496 msedge.exe 5496 msedge.exe 1552 msedge.exe 1552 msedge.exe 5288 msedge.exe 5288 msedge.exe 4720 identity_helper.exe 4720 identity_helper.exe 5248 msedge.exe 5248 msedge.exe 5248 msedge.exe 5248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 3356 1552 msedge.exe 24 PID 1552 wrote to memory of 3356 1552 msedge.exe 24 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5264 1552 msedge.exe 80 PID 1552 wrote to memory of 5496 1552 msedge.exe 82 PID 1552 wrote to memory of 5496 1552 msedge.exe 82 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81 PID 1552 wrote to memory of 1008 1552 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://roblox.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdeff23cb8,0x7ffdeff23cc8,0x7ffdeff23cd82⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1748,8120151608988639179,2389631838678164291,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1768 /prefetch:22⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1748,8120151608988639179,2389631838678164291,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1748,8120151608988639179,2389631838678164291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1748,8120151608988639179,2389631838678164291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1748,8120151608988639179,2389631838678164291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1748,8120151608988639179,2389631838678164291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1748,8120151608988639179,2389631838678164291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1748,8120151608988639179,2389631838678164291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1748,8120151608988639179,2389631838678164291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1748,8120151608988639179,2389631838678164291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1748,8120151608988639179,2389631838678164291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1748,8120151608988639179,2389631838678164291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1748,8120151608988639179,2389631838678164291,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3580 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fc9ad6481dbd849d589d50f5988c7fcb
SHA187cebc5ed3afcfda307b9a4972d2eadbaf0fa854
SHA2567eb4a4ffb8ad7997365e51b970221549031ac53f87816263fedc1a594cf22556
SHA51279ec0e21d8bb64c9ff746e93a7a16e37b20c7aae47416697c967306393b738ef27a3ed9dd11881cb191289046e49df3c714fbce697e5023cff67eb8ba17a23ce
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5e86ee348790021edc9f8fda9d0db8b5f
SHA1356979c256eabde58f2fad61f3b32671218730b8
SHA2562b67deb49de96427ebd0ee379653f7dc3270d627b76c2dd27cb304e5adcc6ede
SHA51292192388e8270ffe1c4f1be9cc840ffe2b06334df763908bfb3f51dcdad90bfec784983fbc8b219941ef7bf2b84e7e26171eeb530107e2c567d51056185c0bb4
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
846B
MD57d9e92a8e83a3b42790db524d325cbbb
SHA10e899c00ff93ee8d2d7ef1c2ebf8882920331bd6
SHA256980b39222b47fc84834e50c6ad8a131aa8f4cc2867bf22527414ede6f91ff4ae
SHA512e1f47ea7e2428f0de3419267a0f503ea140f53b05a85b784637441ed2408b105c7d7a76eec6dbc260ad30c7a043761aaf271da9007804a46089f9188afd1e9af
-
Filesize
5KB
MD5e631dc629f4579aaf9b51dfd11f2a340
SHA178ea3a548cb3f21103cf5fee4ba3f3c4b656b5f3
SHA25643612db340fa6f3a357e664c556c4f1bd4b6592b4f818ad6c1caf48e10d87bc4
SHA51231dea7bc3ca69ecc47fba950ae5b9f86c01d02cf2fc497c325a2f151c24dcf99c10baeae32e8e13757a192f628cb5b4058799d6c33ee586fcab7099e2659779e
-
Filesize
5KB
MD5e7947ab163dad857f461ef28a63cc280
SHA1f8a7fef382dd8fb8b4e66dca9aa446f073e87622
SHA256506cab816ee337c0ccb46941713ce20f65c23f293e6a062e67b61cdbfaa1095a
SHA51244e0b698aa7adf67c2e8babd200d8cc4f2907367dc2cdc2699c878a122a8abc9242f81a82011dbb8c84ed77c2a0907f7f5061c62c54956135f785dc5f2774c9c
-
Filesize
25KB
MD56eebeb9a797a13b043f5b62db4f35dfd
SHA178509b1bf703579a1df798428e88727e802446d5
SHA256e27034dcf63239ae5f57bff6dfed2c4c139c9a5c5183526b1b82e65e20c442aa
SHA51219fbfd65018b2fe66e8867b676be2e90efa9b48b4bd4d98ff0e6c12f9cee6129dcd3344eca50097cc1879bed4c5c680a792ab219d7ad00da4a4d0d62d02d8cac
-
Filesize
1KB
MD581de46d54ad9a9d65a2a18303ec5b33a
SHA11a9f30919115ef375112903479a4e216cd5ba6b1
SHA2564d74766649e6b3c395997f00e2a07ff455a5613176bd65a1d056a813c1aa4acb
SHA512b6557e4bfd4b7c0ad0dd9872c460318e36b3a01cef409a8016b33d6e138ee1952ad7a9ac29be55f6763e676b9da623916fac3c608494920c235c7a577c016652
-
Filesize
1KB
MD5db3132f2ebcf763f4bba010f1006d018
SHA1922d3dd1667d20797c42aebc8e8baa6404a63a72
SHA2564d2813c36e3ca516414162ea8a2a10c86a1bae17982e125ad16ef0445c5879a6
SHA5124230db9ce59bcb8ad524b6c975b49783e52ff29d75a9f644a5d1c202c7bc2c151ee3dab17551c73b740d97827b2b38ffbc343d4691cf407bf1b6b20ade770299
-
Filesize
1KB
MD587bb6c8784e4ebe2f07d757274de0377
SHA1a625d84611f04750677cbfad098f7c8f9eb719a7
SHA256764b9943dd47c06eeeea4665728e18d4a6634a7ea0e0adc63e05a0122fcf9c00
SHA5129a23a29bbe32771db0dbd266879c37a0643fabd0b33b63ff2cbf3acd8527911f0f07b3fb77a0bd86dff207e46ea922220f6902cbb51c45f117d0702ec42c2d81
-
Filesize
1KB
MD565430dad4625923e0d2b4a92d98f1b08
SHA16c16004555e34fef9940d14322647677bac8a9ee
SHA256bf55b66b71713ec15136a69fc60b3d2c17c157b2d24819b794df1959abdb710c
SHA51278caebff3667980c0f7ea5629342d77b48682ad3599dbf8ad7d8461f238591d42ccb4c3299ce35f75f507763c473b74a0b84159a4f76587f4273228b019c9ab1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD574e3deecef355588090ef53a3e4cfbfc
SHA18172e513c2e548f44c0716273b9085ed117b30d1
SHA256794a159f78940956771c71c358f22971d1fd2d5d60e5b4ae353e2f26e0dc0e5e
SHA5126540fed444b43230a19ca29d2156bb06b7f554b4ac7cb4c1577b7e3dd3e51a2443d5a5e5a25977182abd27a455997d33a8424d31d1b265ab71149c7244a496bd
-
Filesize
10KB
MD54427139a21e53dca70422837528740d3
SHA1154adb92adb2a6843a059cd7f24aef0df1c99647
SHA25619e93c7a0c85c25e45766d6eaf7541ae772042d0452565109720424bedbda696
SHA512508c91f627e5d987f720ee6922efe0ee20599213714f1a9a2443d1a7517abcaf1bec6a02062f38fd7491712811b13a4410893bf20a401fad87a672d42d536827