Analysis
-
max time kernel
600s -
max time network
489s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 18:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Roblox.com
Resource
win10v2004-20240412-en
General
-
Target
http://Roblox.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133576807313098192" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1492 chrome.exe 1492 chrome.exe 3872 chrome.exe 3872 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe Token: SeShutdownPrivilege 1492 chrome.exe Token: SeCreatePagefilePrivilege 1492 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe 1492 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 3296 1492 chrome.exe 87 PID 1492 wrote to memory of 3296 1492 chrome.exe 87 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 2400 1492 chrome.exe 88 PID 1492 wrote to memory of 5112 1492 chrome.exe 89 PID 1492 wrote to memory of 5112 1492 chrome.exe 89 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90 PID 1492 wrote to memory of 2196 1492 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://Roblox.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecdd9ab58,0x7ffecdd9ab68,0x7ffecdd9ab782⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1864,i,2122227405775435288,11520293290754737735,131072 /prefetch:22⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1864,i,2122227405775435288,11520293290754737735,131072 /prefetch:82⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2264 --field-trial-handle=1864,i,2122227405775435288,11520293290754737735,131072 /prefetch:82⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2720 --field-trial-handle=1864,i,2122227405775435288,11520293290754737735,131072 /prefetch:12⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2728 --field-trial-handle=1864,i,2122227405775435288,11520293290754737735,131072 /prefetch:12⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4228 --field-trial-handle=1864,i,2122227405775435288,11520293290754737735,131072 /prefetch:12⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 --field-trial-handle=1864,i,2122227405775435288,11520293290754737735,131072 /prefetch:82⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4408 --field-trial-handle=1864,i,2122227405775435288,11520293290754737735,131072 /prefetch:82⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1864,i,2122227405775435288,11520293290754737735,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD54e2f3c1aed82e24786df288340fdd86e
SHA1be16d6195a838ce51862622416f153330a38c0ea
SHA25613976eb57819e59f469cd8d9498f895a93c2e2016123013a5a9515c39ef99a0f
SHA512542902fbacd6c471547737d2bca0378930a36501fa9db944c40bd7d4c3b9e615de19a8a19d116efab886eb99247c730cacfa124a225022b07395417bfc3711cc
-
Filesize
2KB
MD59d26e9ab0eb1040d145096536dff7480
SHA1e7ff79a5a696c65c4f628f8af2361e98720f07e7
SHA25652a7bdbcff0685b219e7eb9d99a1fa8754f6031ff82af40d0a970a5ada70369e
SHA5129cab4469cb177fbc278b9fa7be405b2d1cef9a8a1681e7d581ef755d4705ef4eac61624556031fdc309e86ac8d9bf880a8f0993cc1c7ec8424dba51f9aa0251b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5cf3e1c4b66e18d97394c273222aa4de8
SHA1aae71aeb76388a41801e174f12c5112d76078843
SHA2567ff05cac90fe572e4500a80e48d33274391537bc571df55719ca91cf8ad3efd7
SHA5123dff4a6e113a6276384ca485d1078d1312fb2efc7296ab89386e9ff4e25469c54c51345ab866ebbd20c816aec266671762c2dd7222c7c8df139265ecd327dffd
-
Filesize
1KB
MD5d2b2608fd7a67ee1ce5027cac1f63919
SHA1a7a97ba7cf86ebee6bb11660f602cae78b160bd8
SHA25670c62c808a77802cf8ae595bddd562b6c0b57614dd96d7601482ef8593b245f1
SHA51206a33f59e76aa38c56cdc706b701035806b0d822f7757599987a1f86f3a66dccb913489fb0adc9b1cfe00b4b45c9d68cb89cea89966b276315ec0730513004ee
-
Filesize
1KB
MD55691763acc2ee09bc6b801cdf8f0a591
SHA18db1a90b3f407bb72912e93d6e54a8187b0ce747
SHA256458522bd47741f1b954a411ef2f9e7d5b09ce39f944569b6656e30528a007a06
SHA5125e1d88201ae9d4872833dc6e0f1fbe3b249443cf9389430474117d8f57cba43c424f2da4b7c8bfdcd8bceff9554a36aebea8a58d8db6fcbfb73ac021c699dc2f
-
Filesize
1KB
MD5530b4d29950a9ea934080fa2ecad3829
SHA165fe5945fdef5a099f893cee5240b9545f5fbd12
SHA25691191411815a27bd8120ae53d7b381fa92cc7be5d16aecc12ec419504a052a95
SHA51248c1386007a93fa3f530d24cd14a0d84c25833112db5728927249b87f106a21d128e6a0b660180c9156779445e23f82ae05665d0bd477f85fde3de87fc9fa564
-
Filesize
7KB
MD5e614392e92b30fa9a3c5a12d4e91d62c
SHA18e74ae4a6e3627ba310a4b4e834fdf35d25fac93
SHA25625b36dc4764ebfe54a5aa9989032f0eca8b080657daf036b9c9ec0e6c19c1cb5
SHA512ddc80965a1546c010eeb7b47e1e01eab538c00de56a447191fa071fbcdb1f950e9902c4a1ff3b3ae564a977500f1428b78fa1e25f2f1537b81c8deaaee655f1b
-
Filesize
250KB
MD5e946c5bb7fceb742c67740ce95ac7fc7
SHA1e56b64ef03dfcfdb363333d3af98ed0e23aef6ae
SHA256c5a641a8341c61cd2e2052fd65cde83892e5896df7fd6e265f6d792dd3fc111f
SHA512d7dc552c85a48a05ae9eda426c78459cf99c500701ba55b4a101812d32438eff971e4cab22c283df1b4ff56aa6e7b1713797b72884471dd4a87440ba72457357