Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/02/2024, 19:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.roblox.com
Resource
win11-20240221-en
General
-
Target
https://www.roblox.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 3632 msedge.exe 3632 msedge.exe 444 msedge.exe 444 msedge.exe 4568 identity_helper.exe 4568 identity_helper.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3632 wrote to memory of 3004 3632 msedge.exe 80 PID 3632 wrote to memory of 3004 3632 msedge.exe 80 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 5084 3632 msedge.exe 81 PID 3632 wrote to memory of 1496 3632 msedge.exe 82 PID 3632 wrote to memory of 1496 3632 msedge.exe 82 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83 PID 3632 wrote to memory of 1588 3632 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.roblox.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8c5c33cb8,0x7ff8c5c33cc8,0x7ff8c5c33cd82⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1824,9208058531056821128,447151035707107782,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1824,9208058531056821128,447151035707107782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1824,9208058531056821128,447151035707107782,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,9208058531056821128,447151035707107782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,9208058531056821128,447151035707107782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,9208058531056821128,447151035707107782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,9208058531056821128,447151035707107782,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4408 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,9208058531056821128,447151035707107782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,9208058531056821128,447151035707107782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,9208058531056821128,447151035707107782,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1824,9208058531056821128,447151035707107782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1824,9208058531056821128,447151035707107782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1824,9208058531056821128,447151035707107782,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4520 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55c48e8b68231fb5b2d7f1188b930bc0e
SHA11822aef5da8fdd47626fb91afcf79a2be175a325
SHA256c3b287c29eaa57166b2ab1ba9bd0aaced13cc2f946a04b8d708ac429187fe944
SHA5122bd09b83e44e0104fbe080a8573690217dc9fbf7fd59ff25a1a9e9ebd2d87ac533f9b99350773d081a7e748b39657115a13e94538b153bceb13ecdfc4672a0f8
-
Filesize
152B
MD5f2dc80f5403feb8461b7ffa09890d6a0
SHA1d5b61e6d672e7e71571e0132e21cead181da8805
SHA256eadeadba37eed18e5acba408d7e076270b00403fed372b77164577232232428a
SHA5125e2119529b99b76be105c43714e4b9977ee2147172c1c44e92bd9b41fa7a66f55d4073c864aac668a912aff2898bd216fb38f2fe34ef65de69ad12965218caf5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD58b6db4ea65b98c1b0514a86b38ae68ef
SHA128334fee47689e8d32a31ba9d8ca9da632913358
SHA256ca651b8aebafce8007fb0fffac04f9aaf9504f4e69460566711bddc510ab286b
SHA512f87ef662351a1ba92f4ed30ae317b1caf3c4a0c294f09a78ebacfbafac66c43fe1583b5fd5c266155cb2124e179acde481d9cebe413f10e75c6c0535f8a50876
-
Filesize
846B
MD57d9e92a8e83a3b42790db524d325cbbb
SHA10e899c00ff93ee8d2d7ef1c2ebf8882920331bd6
SHA256980b39222b47fc84834e50c6ad8a131aa8f4cc2867bf22527414ede6f91ff4ae
SHA512e1f47ea7e2428f0de3419267a0f503ea140f53b05a85b784637441ed2408b105c7d7a76eec6dbc260ad30c7a043761aaf271da9007804a46089f9188afd1e9af
-
Filesize
6KB
MD597c375f40bc68cddf1a12d59caa85677
SHA155a9a9ac78c8b03f544c72968c3e415fa3e64ece
SHA256144549a014101cee391b9b3524df67aa4caf823b878af7c67f159e7a43e81e8a
SHA51280395a714ce818295e925a423a2683bbfca8db98fa6c7aaeea0cbc9de7fe14522b26bab63d7ae5fe2806076e8a8e5b0cff02cf190c06e10eb639feb128a14b3f
-
Filesize
6KB
MD5caa79a82f6c6f0883a3e4ec3d2a2d1be
SHA19e725d10291deace5951d7a61636633bbe44e4a5
SHA256a5d049704aa27d98079fe671c6992fd7cdb760a038442a63e05eef0360e2c160
SHA51289a37f1fce693645be3d08b92c7f7ba5a14d1c7a3d29f94cf71d1d9b1f1135af490bdedd64d40527124620bc2cb4c8eebfd0a625d76bdf052ec3baf3b1eeb1fb
-
Filesize
1KB
MD5b732d6cbd7707a0b559f3aa2016d264b
SHA1d9ebaf105349963fddbb3738eed42b255809b34b
SHA256af8a9c6242aa45d47fef8ac3ee477091ce6e16854568e1ccd9753a0ac0dcbf8f
SHA5126f638ce5a19507bbe97df98dcb7743488c5dce0bfc2e336760b2c24227d4b7fbfa11ad936146c13790a2091f4c3b6b12136329e53ddfccd15a5ac0798d0ddaf2
-
Filesize
1KB
MD55a00367d21d50ebfa0451628c704bd31
SHA1eae9980eb74588e3c947d6fb9d38ee5905e748f6
SHA256af64b47c5c73a2c2f8d101004e38df9b74df2c600a3e86e76d4cb2ebf701c53c
SHA512a57fb0b633cd027b3219589ce749b3b3d44b094f3d63200216d073b732fe3e3fee7d5fc36b0fdbd2f3e2de69dbf2ee4f817515dc62f87df5b8988709f63a67e3
-
Filesize
1KB
MD5706e23417ec1b3e5e2ea4836ffddf536
SHA119d06ddd7a835942897b9459c627c8178bf57133
SHA256541ce48381724ed9377b89e0c51554db65bec30ebdbe6d9acbeb05f32c13a2f4
SHA512c901a5d6593e20b50f45a4114382a152cff5fc41a03df92611c5eedf780b57483164897cb8c1887c57fbf2d7be71a5a7eb2b9b283a3a11b84afa554df1098bef
-
Filesize
1KB
MD5773dac58f00309015c551c7eab0e6c82
SHA18183198a77ce03f715c41bdbfd4a2d7f67a547c6
SHA2565c1c1de56b98f115d8ee64d4c1a60a5a3b11c155a9b825e6ed1ef4cfad9230e3
SHA512aaee23de1de9d1bfea88239a438c373f113d64ec1e03251230b6d95e8f88ae4b1f93a19ccdd5e03e42f5df8a9641a9b24d0de9835065de0191f9f35a350d9fe5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cb079c55d062dc92deaa9863d74a186a
SHA12da79ca2ba4197472e229b619fd660b41bf819c0
SHA256caba3a6964a8fb18a7a11190b67839943c6cdcfe8536223a1f75dee68677fa10
SHA51265e125fb13d85efd3e4701ea1d02af673872ecb67a6b82530ef380639b21cd0915f4b4c7f51de4cc8b0685ec5536fcd650929830dc6195ac4bf53fbe99dd4624