Resubmissions
17/04/2024, 14:40
240417-r1t6tadh61 717/04/2024, 14:39
240417-r1smzsdh6x 717/04/2024, 14:39
240417-r1r2fscd93 717/04/2024, 14:39
240417-r1rqpadh6s 717/04/2024, 14:39
240417-r1fy7acd67 717/04/2024, 06:10
240417-gw2d8aff43 7Analysis
-
max time kernel
1798s -
max time network
1806s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe
Resource
win11-20240412-en
General
-
Target
2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe
-
Size
121KB
-
MD5
963882fd8e183b937bf5f3352acb82f1
-
SHA1
3ed03c2fd2dee0903bf254773ec9a444cd8990a4
-
SHA256
2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161
-
SHA512
23e4dc2b289bdeab55c6f9794d3801e66bb182850949c31f61a174e60b7d2a50230fd494fb4a53be7ddd9200bd01f082a57f53acc6e9e5d728f8ee8356f79280
-
SSDEEP
1536:dWRhi+kHYYBuPIXtbNN08g+vB59bFmki3zMEFUVEQqFtelOYWNO3bpSWKLkP:2k4CuQe0D9bFmkyeOE38WKLkP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe -
Executes dropped EXE 32 IoCs
pid Process 1964 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 2044 tor-real.exe 3080 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 3552 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 4280 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 4664 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 456 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 3620 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 1936 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 2796 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 3612 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 3460 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 4100 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 4368 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 3736 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 3932 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 4292 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 3360 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 4656 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 4036 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 840 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 4312 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 2896 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 3492 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 4748 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 2800 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 1100 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 1488 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 3892 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 4916 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 4680 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 1260 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe -
Loads dropped DLL 8 IoCs
pid Process 2044 tor-real.exe 2044 tor-real.exe 2044 tor-real.exe 2044 tor-real.exe 2044 tor-real.exe 2044 tor-real.exe 2044 tor-real.exe 2044 tor-real.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1860 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3136 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1964 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 1964 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 1964 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 1964 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeDebugPrivilege 3528 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 1964 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 3080 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 3552 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 4280 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 4664 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 456 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 3620 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 1936 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 2796 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 3612 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 3460 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 4100 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 4368 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 3736 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 3932 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 4292 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 3360 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 4656 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 4036 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 840 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 4312 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 2896 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 3492 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 4748 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 2800 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 1100 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 1488 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 3892 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 4916 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 4680 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe Token: SeDebugPrivilege 1260 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3528 wrote to memory of 3904 3528 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 90 PID 3528 wrote to memory of 3904 3528 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 90 PID 3904 wrote to memory of 2592 3904 cmd.exe 92 PID 3904 wrote to memory of 2592 3904 cmd.exe 92 PID 3904 wrote to memory of 3136 3904 cmd.exe 93 PID 3904 wrote to memory of 3136 3904 cmd.exe 93 PID 3904 wrote to memory of 1860 3904 cmd.exe 94 PID 3904 wrote to memory of 1860 3904 cmd.exe 94 PID 3904 wrote to memory of 1964 3904 cmd.exe 95 PID 3904 wrote to memory of 1964 3904 cmd.exe 95 PID 1964 wrote to memory of 2044 1964 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 96 PID 1964 wrote to memory of 2044 1964 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 96 PID 1964 wrote to memory of 2044 1964 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 96 PID 1964 wrote to memory of 4960 1964 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 100 PID 1964 wrote to memory of 4960 1964 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 100 PID 4960 wrote to memory of 4220 4960 cmd.exe 102 PID 4960 wrote to memory of 4220 4960 cmd.exe 102 PID 4960 wrote to memory of 4260 4960 cmd.exe 103 PID 4960 wrote to memory of 4260 4960 cmd.exe 103 PID 4960 wrote to memory of 2548 4960 cmd.exe 104 PID 4960 wrote to memory of 2548 4960 cmd.exe 104 PID 1964 wrote to memory of 2408 1964 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 106 PID 1964 wrote to memory of 2408 1964 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe 106 PID 2408 wrote to memory of 4516 2408 cmd.exe 108 PID 2408 wrote to memory of 4516 2408 cmd.exe 108 PID 2408 wrote to memory of 1080 2408 cmd.exe 109 PID 2408 wrote to memory of 1080 2408 cmd.exe 109 PID 2408 wrote to memory of 4164 2408 cmd.exe 110 PID 2408 wrote to memory of 4164 2408 cmd.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe"C:\Users\Admin\AppData\Local\Temp\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && schtasks /create /tn "2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe" &&START "" "C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2592
-
-
C:\Windows\system32\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:3136
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1860
-
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe"C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1964 -
C:\Users\Admin\AppData\Local\1ajaqqvdrt\tor\tor-real.exe"C:\Users\Admin\AppData\Local\1ajaqqvdrt\tor\tor-real.exe" -f "C:\Users\Admin\AppData\Local\1ajaqqvdrt\tor\torrc.txt"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2044
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"4⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:4220
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:4260
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"5⤵PID:2548
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"4⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:4516
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid5⤵PID:1080
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"5⤵PID:4164
-
-
-
-
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1312 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:412
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:456
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3736 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:4916
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:840
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exeC:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD51517c8664be296f0d87d9e5fc54fdd60
SHA1c06bda2f5288f410e1afc05cdfd4046616eae8fc
SHA25680082211411078acc456c746c2ca7b2325c7d2bf37fe8b725d5b2b20aab4856f
SHA5129fdc1068d4e2345e560652c3e82a588d0d936601b0e72f7d57232fa5a2fbbb20b1c8bbae6d38af5d3c65764d9c7ca84333a0df661a3f4dbede75fd7e78fee19f
-
Filesize
2.6MB
MD5e7634067c1219da664e2c13a622988bf
SHA1b354b3912ec59fefecdaa660af50c679b136b6ca
SHA256e1f51b61149b811c5029caaa39ddf54faa18fcd18bbcf432155ad324fbc0fdb7
SHA512b61ea1448ec13e88c66e043c0f99d95a2626e631841bec0b0e2e1dd6cbbcb8f8587d414f3ad32794ccdadf7c763910ed844220684f3edc71109f47fe4353c944
-
Filesize
11.0MB
MD5f46db23bdec56c0b900ba3f29c3e7581
SHA119a38f634ee3f03dafe1c70016cde42d0c8c87cc
SHA256a5f272dfcbd49a484b5397fe356968343936de71b83d0e04cdbdbc053f679f31
SHA5120c5721012bc549d1e7aaca2ef7500bdcbf432b3a1f9d95cdceae92e5f4b3a08b6129f3a321f3c8984ba456bafdd35f7f0fa27ba86597cb0f2965f7b8c8bc9912
-
Filesize
64B
MD57c116b3b4ae8b1efe02e2e6f8c826bfc
SHA1a90b815b51cb6091a2795a66ecca5ce6b2d0f52a
SHA25663e726f07657548667aeb3b5306e9b2fc83e699a072ed9a21eed2ca1a1300352
SHA51220961672d5c009a3e68ed179f298dd5ea46c81679beebbaf2380bc0d7a094b19d981b22b273f47d21b194466d122f64fad84ffed86a03d4c1d8e158afe92eebe
-
Filesize
3.5MB
MD56d48d76a4d1c9b0ff49680349c4d28ae
SHA11bb3666c16e11eff8f9c3213b20629f02d6a66cb
SHA2563f08728c7a67e4998fbdc7a7cb556d8158efdcdaf0acf75b7789dccace55662d
SHA51209a4fd7b37cf52f6a0c3bb0a7517e2d2439f4af8e03130aed3296d7448585ea5e3c0892e1e1202f658ef2d083ce13c436779e202c39620a70a17b026705c65c9
-
Filesize
1.1MB
MD5a3bf8e33948d94d490d4613441685eee
SHA175ed7f6e2855a497f45b15270c3ad4aed6ad02e2
SHA25691c812a33871e40b264761f1418e37ebfeb750fe61ca00cbcbe9f3769a8bf585
SHA512c20ef2efcacb5f8c7e2464de7fde68bf610ab2e0608ff4daed9bf676996375db99bee7e3f26c5bd6cca63f9b2d889ed5460ec25004130887cd1a90b892be2b28
-
Filesize
1.0MB
MD5bd40ff3d0ce8d338a1fe4501cd8e9a09
SHA13aae8c33bf0ec9adf5fbf8a361445969de409b49
SHA256ebda776a2a353f8f0690b1c7706b0cdaff3d23e1618515d45e451fc19440501c
SHA512404fb3c107006b832b8e900f6e27873324cd0a7946cdccf4ffeea365a725892d929e8b160379af9782bcd6cfeb4c3c805740e21280b42bb2ce8f39f26792e5a1
-
Filesize
1.1MB
MD5945d225539becc01fbca32e9ff6464f0
SHA1a614eb470defeab01317a73380f44db669100406
SHA256c697434857a039bf27238c105be0487a0c6c611dd36cb1587c3c6b3bf582718a
SHA512409f8f1e6d683a3cbe7954bce37013316dee086cdbd7ecda88acb5d94031cff6166a93b641875116327151823cce747bcf254c0185e0770e2b74b7c5e067bc4a
-
Filesize
246KB
MD5b77328da7cead5f4623748a70727860d
SHA113b33722c55cca14025b90060e3227db57bf5327
SHA25646541d9e28c18bc11267630920b97c42f104c258b55e2f62e4a02bcd5f03e0e7
SHA5122f1bd13357078454203092ed5ddc23a8baa5e64202fba1e4f98eacf1c3c184616e527468a96ff36d98b9324426dddfa20b62b38cf95c6f5c0dc32513ebace9e2
-
Filesize
512KB
MD519d7cc4377f3c09d97c6da06fbabc7dc
SHA13a3ba8f397fb95ed5df22896b2c53a326662fcc9
SHA256228fcfe9ed0574b8da32dd26eaf2f5dbaef0e1bd2535cb9b1635212ccdcbf84d
SHA51223711285352cdec6815b5dd6e295ec50568fab7614706bc8d5328a4a0b62991c54b16126ed9e522471d2367b6f32fa35feb41bfa77b3402680d9a69f53962a4a
-
Filesize
4.0MB
MD507244a2c002ffdf1986b454429eace0b
SHA1d7cd121caac2f5989aa68a052f638f82d4566328
SHA256e9522e6912a0124c0a8c9ff9bb3712b474971376a4eb4ca614bb1664a2b4abcf
SHA5124a09db85202723a73703c5926921fef60c3dddae21528a01936987306c5e7937463f94a2f4a922811de1f76621def2a8a597a8b38a719dd24e6ff3d4e07492ca
-
Filesize
226B
MD59865f5ae63ee711213e7c04793e0ead3
SHA19fe64b524310d43e06953bbb6692b2573a9c9053
SHA25653507e8408802113ac812d7a36cc68ec627abd42753a99b2d1a2785547f79c8e
SHA51239f7c8937ccffce1f755ab0616fd0e387e7c07f9ee34bcb588200c64d53a5bebc5695b8df492d465eed816448b7c717f76161d7d15880cb31c1f5f63048f1d09
-
Filesize
121KB
MD56f98da9e33cd6f3dd60950413d3638ac
SHA1e630bdf8cebc165aa81464ff20c1d55272d05675
SHA256219d9d5bf0de4c2251439c89dd5f2959ee582e7f9f7d5ff66a29c88753a3a773
SHA5122983faaf7f47a8f79a38122aa617e65e7deddd19ba9a98b62acf17b48e5308099b852f21aaf8ca6fe11e2cc76c36eed7ffa3307877d4e67b1659fe6e4475205c
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe.log
Filesize847B
MD53308a84a40841fab7dfec198b3c31af7
SHA14e7ab6336c0538be5dd7da529c0265b3b6523083
SHA256169bc31a8d1666535977ca170d246a463e6531bb21faab6c48cb4269d9d60b2e
SHA51297521d5fb94efdc836ea2723098a1f26a7589a76af51358eee17292d29c9325baf53ad6b4496c5ca3e208d1c9b9ad6797a370e2ae378072fc68f5d6e8b73b198
-
C:\Users\Admin\AppData\Local\RobloxSecurity\2e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161.exe
Filesize121KB
MD5963882fd8e183b937bf5f3352acb82f1
SHA13ed03c2fd2dee0903bf254773ec9a444cd8990a4
SHA2562e49688556ab4509a057fef58003b9faa39fea201c5c18e248faba4b4f5a9161
SHA51223e4dc2b289bdeab55c6f9794d3801e66bb182850949c31f61a174e60b7d2a50230fd494fb4a53be7ddd9200bd01f082a57f53acc6e9e5d728f8ee8356f79280