Analysis
-
max time kernel
1800s -
max time network
1686s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-de -
resource tags
arch:x64arch:x86image:win10v2004-20240226-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
13/03/2024, 15:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://roblox.com
Resource
win10v2004-20240226-de
General
-
Target
http://roblox.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133548191750168154" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1896 chrome.exe 1896 chrome.exe 828 chrome.exe 828 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1896 wrote to memory of 4672 1896 chrome.exe 89 PID 1896 wrote to memory of 4672 1896 chrome.exe 89 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3428 1896 chrome.exe 91 PID 1896 wrote to memory of 3236 1896 chrome.exe 92 PID 1896 wrote to memory of 3236 1896 chrome.exe 92 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93 PID 1896 wrote to memory of 2284 1896 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://roblox.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb9379758,0x7ffdb9379768,0x7ffdb93797782⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1884,i,8608094370264574470,2085249185192419300,131072 /prefetch:22⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1884,i,8608094370264574470,2085249185192419300,131072 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1884,i,8608094370264574470,2085249185192419300,131072 /prefetch:82⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1884,i,8608094370264574470,2085249185192419300,131072 /prefetch:12⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1884,i,8608094370264574470,2085249185192419300,131072 /prefetch:12⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4172 --field-trial-handle=1884,i,8608094370264574470,2085249185192419300,131072 /prefetch:82⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1884,i,8608094370264574470,2085249185192419300,131072 /prefetch:82⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5288 --field-trial-handle=1884,i,8608094370264574470,2085249185192419300,131072 /prefetch:12⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 --field-trial-handle=1884,i,8608094370264574470,2085249185192419300,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:828
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD588e0bccdb1454cfb5421fb8dca4a818b
SHA1eccb90e084e6ba374fb404f9eaa51279bc9c42d4
SHA256119038b86fef272b1d7f28cdb9f72a1fbcb1aff7dfa0ae3aca99c2e19f242987
SHA512bdb2ee70deebc7e9153c0c9e21ec30e96a024ca256aeb651eef3885996259322861126f5dd0e3deb0c229e3d5a66051ff29cc861b40087f35c3b8b91ee11420a
-
Filesize
2KB
MD5d97ecd0a5a3040d6f65d2c5213a3fc44
SHA1ba3c60d32ac7072ef58fdcf650a6b6094ec6cd60
SHA25626bb1e6e77012ec67a4d3ea288b8347d947ac1ea5d01648b29c47136669c2b27
SHA51272b809f2613471ade5649b9cd28c02c3f863a1502bce3d4dc2aa1f2755972802f56380b6415e3b7b3328e68ebcf7bdbaa68baedc5e5131807de1756f6d9ffe3c
-
Filesize
1KB
MD5694ee36bd92e89680df4a1f620ddce0a
SHA16b23ee61106d834cef8f65bfe085beb0284395c8
SHA256b675558c50d2c31fe9cfff6feb82464d4baee1e58555a5abcd0ab3e8e02f2f27
SHA512e3d118ac0a25a7c84708dcc7518ac211e4a50d1ed1a76ae043b326917c5aad6047225966854fdd8204f448b4d104f2fe270f99f95707b537d4c1d0818b60cbbd
-
Filesize
1KB
MD5f723c227305743e9b901d6a0f800f9d5
SHA1b59af255a45f845da347dd6b625c106dc7fa2dd7
SHA256e5c151542d460ee746d8a2182c44b37ae2e36a742f87c23d666f84fa478f54c3
SHA5121bfe36fd056e4b0ffe3b2d2bd3cd86c28b9e15d5c2e5445f35c9cdd1d45173a0894f67c438726b5b90d302ecb07eed75673e72759d8f891a2d63c7aec514e1a2
-
Filesize
2KB
MD5cad0a2302285e2dbd3656c81124503fd
SHA121d164e6abf0d2090e754d407755ce26811bd1c3
SHA256e84b5315e2808697dadbfe642c3915a50624445429616333455598b633e78ed7
SHA512ecb83677dcefc39976c5efa935afcca77488bd6e79e52a8ae64f9fa65e0ee565ca46cdd553583b6ebb56a1c59dc759c0cd80e5e06e773e7e7fc8238f8bc9041a
-
Filesize
1KB
MD59215d3ed3cb2adcb833e8aa3b53f879e
SHA15d3d298270df4390dee631369a7dc9836e3f3c52
SHA256c0401b173fe3e0dddb8b5d65745a2bad1b420c9be39a5dd4a4b6457e8940042b
SHA51268c535d8644ba3e9eb6fccdfece25e31c84853b32063af9ebec69b840df4272addc94993dd35442fb373698b5782807434fcd939eab5a55d406f425e14f32304
-
Filesize
1KB
MD513b0fad20eb568f8ecaf1322b4cd1d6d
SHA127b40b4a895b82bf18d762d2fc574889c45b86e4
SHA256b7fabf46b7e0fdf01007a784060f291f2dd0fb438c942f8a2e5dedc6b1e82628
SHA512186950560f7beb34d1df08ca885d274835d5a5b63190db06243c394704bd65e6565f37637a9f8316f66b3c03bd3b646aa9afe1e253fd00748441dd252a216b76
-
Filesize
1KB
MD5f76d417a080d27e5efb92c66ee922fad
SHA1c0d9be7cdf4fc298fb6048461255bc8c88476329
SHA256bb8be08d3dce96a2e7e0ceb8dbeda8d45173fc7ee8db88d277a95d608fe7f6c4
SHA51282e9fb5c86a41e146a5634df927300d4bb212b338964d71a985dbe43d86c48f9d41a5dd59064ea3bc91bab4ad158044063b528462cd4a5a8cad2f1038592cfa5
-
Filesize
1KB
MD5e1aedb4ca1eb9a24924a3a76aba28ed3
SHA13f41eaf1cfda84c665f7a09bd2cc5491de1c8b1b
SHA2568c4bb3a782c5daded33e7e4b0be15cb53facccdcb56f968b30d122dbc9fca5f0
SHA5123d3bd2a8c3b07653a225734a38d3a21ea96382e4e4ce54f32b1c39215e770891232cc5f851a4af599189bd834d4050f9d4852990e3b08cec948abc936825d195
-
Filesize
6KB
MD50c7ea3646d3e1d4a1ef361563f58546a
SHA106f7cba7082007468252cc4d77fd947b226ba8ba
SHA256b94a22caf1558def4716a3a3115c6d3bac2767cebd4ec1cc326f162f5c23dd5c
SHA5122607ce45c3c1ef3e479c1eb274f35a258e5b6adb7a346d15ea0c4a288f0c1292e18908bf15741e81acc659f913f6d689d300eaf1e13bcd37aab66b95d9eca89a
-
Filesize
128KB
MD5bef92150ec12bc144fbfbb74d38141ed
SHA1b3b77a451503ea911f078073466a145fcd62401e
SHA2566551c00fbc853680dcb81e2139c68ddcdfb05d41e90481aa23f25bf1915e9967
SHA512bf0c03d0578234bce31b0e5f9f116cd347ba239a6a2bd742b586f2a7bf1d629c6b8ae91a017c1aac40f81a89c5404da533d747e5a3c94113cc05d7c347da7701
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd