Resubmissions
08/03/2024, 13:39
240308-qx8z5ahc2w 1Analysis
-
max time kernel
25s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 13:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.roblox.com/games/6284583030?privateServerLinkCode=51218887096318695628878444169932
Resource
win10v2004-20240226-en
General
-
Target
https://www.roblox.com/games/6284583030?privateServerLinkCode=51218887096318695628878444169932
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 4864 msedge.exe 4864 msedge.exe 4276 identity_helper.exe 4276 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 2496 4864 msedge.exe 89 PID 4864 wrote to memory of 2496 4864 msedge.exe 89 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 3244 4864 msedge.exe 90 PID 4864 wrote to memory of 1956 4864 msedge.exe 91 PID 4864 wrote to memory of 1956 4864 msedge.exe 91 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92 PID 4864 wrote to memory of 3604 4864 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.roblox.com/games/6284583030?privateServerLinkCode=512188870963186956288784441699321⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3ba746f8,0x7ffd3ba74708,0x7ffd3ba747182⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 /prefetch:82⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3158384011939398469,3860225484443124332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:5428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5f96848eae13d37767deede95d0159fc9
SHA13b94849a385bde686f69b6a66a9e8e57b5bb20d7
SHA2562aec654e64e44fe39c59100610db9e142d372ba05bdffc26946e15c12dc96f18
SHA512e32fd01fc5a5a583e1527c7d68e422e93e469aa3f58405d5b86cf9a720cbde5f61aabfc729815b3f42028d3af24e9e8909b35353f4c6ab419c55b57de0b7fea1
-
Filesize
6KB
MD57b96d4b81ac865d1177273b4bbec29f7
SHA1473df70a7ca2321ae8d6e9684f798af2ed57bb4e
SHA256e35c9b6f9b4efb12b889fa3e0ef94e5e5d6b3ed3813c5b16a8e0d0100f0d7f34
SHA512b5b6f5a4aa948cb2df84ede7e3527dc0b8676881c6b0b286b25dcdd8875aa14ac4eff564a7d239e7bb24e1a882efadfee805efb2fcc7b8ae491a94625b69a2ce
-
Filesize
2KB
MD5f0ffd8b6ed5388d1fae0440263103891
SHA1e4fdfa57c96a5ff6de6b6a1dce78162895a52235
SHA256c73271b63b676ed81c3c53ee4a3c2acb025950b178ca30be65b324e6cebf2795
SHA5126099aa98e3a0f2fc11053da7702f8015338b206e097932b318fd7a6d1aa03d3be8fce47b27b67d248633804b215b0b1bb56e6c9f79ed5c9863f1675c69ab57a0
-
Filesize
2KB
MD5712932baa5c377affbc8bf37f489b01c
SHA19590e7acfd2f4396d985ad22defc3ae288b4aceb
SHA2565720fcaa0665efb72959e6854e3a4acba52aa3e93713d2eeeab74cb581cb3b72
SHA5127ed7064b2e607e61212bab4af5d2547fcf6418ff86e5d73bcf2a1214b553de907040f57ebb472aea78451f706e43d1d191d13b89986f1c1b2e247f79137756c4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD529e38db87a402ca23dcf88e53c7b431e
SHA170ae075e599692fe2a802df74ca8bede7acd6a00
SHA256b0aa903082aa49ef255e88ca34024c908bac7f1b650123d46fcab2b3e21b3594
SHA512444f65f5ba87763ea7801ea5c18525757dc83ffc9963b752fd560af53a1da60392d830b0a0c21c754e423f15be54fa9e01f5261f1162d707a80fb6780bc137bf