Analysis
-
max time kernel
57s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 05:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/LordExploitx/Roblox-Exploit
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://github.com/LordExploitx/Roblox-Exploit
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://github.com/LordExploitx/Roblox-Exploit
Resource
win10v2004-20240419-en
General
-
Target
https://github.com/LordExploitx/Roblox-Exploit
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2952 chrome.exe 2952 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe Token: SeShutdownPrivilege 2952 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe 2952 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2988 2952 chrome.exe 28 PID 2952 wrote to memory of 2988 2952 chrome.exe 28 PID 2952 wrote to memory of 2988 2952 chrome.exe 28 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2600 2952 chrome.exe 30 PID 2952 wrote to memory of 2792 2952 chrome.exe 31 PID 2952 wrote to memory of 2792 2952 chrome.exe 31 PID 2952 wrote to memory of 2792 2952 chrome.exe 31 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32 PID 2952 wrote to memory of 2976 2952 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/LordExploitx/Roblox-Exploit1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6bb9758,0x7fef6bb9768,0x7fef6bb97782⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1216,i,16781820026721667342,18108453440394470817,131072 /prefetch:22⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1216,i,16781820026721667342,18108453440394470817,131072 /prefetch:82⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1216,i,16781820026721667342,18108453440394470817,131072 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2288 --field-trial-handle=1216,i,16781820026721667342,18108453440394470817,131072 /prefetch:12⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1216,i,16781820026721667342,18108453440394470817,131072 /prefetch:12⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1156 --field-trial-handle=1216,i,16781820026721667342,18108453440394470817,131072 /prefetch:22⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3644 --field-trial-handle=1216,i,16781820026721667342,18108453440394470817,131072 /prefetch:82⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD532381495d3c6dad6ad977599b73847ba
SHA1bc4ac238d07e7e984f8f95d52afe855c3ba6edd6
SHA256b1b51dea52c8cb513b686a42a04effe81ffd4acfa10d5cdd62bff4a175ad33fa
SHA512ca270a5c39890c38b178b5c320e777e10e3e2a8e5e4f902b08150aa9c0791d6187713eb07517f3bf12a1c65b0bef464842896e4afe59720d5edfe05aec5cc5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e31645c6a2e5b1e3965a608644e26ee
SHA134aff7016dca1b45e7f13d3942b9c4d635eaa013
SHA25687ddd0c176878c5b94153d7579339999f20c3e147adfb549e487f245e315a032
SHA512ba105a1cd11fb2a697040ee246a8039a8cde4809a617c8abd53b0db0be412c20ddd245578e00286674c16682da462f78b5fe7adfb169dd216ced94f284aea518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e0b63e99f4f39562470ad4783c98a67a
SHA1b2c15f1dfcb80e6bd54148ed0ff9c1546ef49895
SHA2561db52b65fa90a4613e70fabc52614b660be8372468a349d0eab55b55d0d0f01d
SHA5122524dee2106b8370ee21d9b3e353528eef976f90b3f87edfeac6a6b41b024f17a10ec97342787a56950f798a7e7778a48b67fea3a4aa002a387a5cb23d6227c6
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
986B
MD599e79cd79a163e14c149540cb0ffdb2c
SHA1f97095153d306f383a884b0809ac4a8659bcaf1e
SHA256e80f6bfa696cca0b503ec901ffd7dd2c8c81407db7ed28655422f5a7211edf3d
SHA512a5ade43da3e1b8f176d8ac36c15a627389f61be86f2470a10ed2647c5d5f7d535d44a2041a2a03b2ef9f49dd679caa0ed6fe3539c9141bade2c2c90a5881f65f
-
Filesize
524B
MD5d0421894eca809cd39c19125416bab06
SHA1f8c7539823f2c488828412c7024fc139329362db
SHA256ef48395d6b5bc6dd28a27621155cb48351461f223df487908a1b3e6d24a08ae2
SHA512b74b4ce9a6dbde57de73579968f4aa49d9fa50bcf231eb10d3b7e345d38fa3daa24b8c750cb95097e431847240640c56b697b4e6630e4b650e51a23dea09e07b
-
Filesize
5KB
MD5cc8a4c2d113167c86fdc8c98eb930432
SHA1c1af707cfb769321f57d400f53e05bdbbb36dcee
SHA25647923c0ff659ed7dbc4adb211d215265fc3d4b2dfb6b9ee4f24e2d3078217658
SHA512b35773d37ff8b8112be03b12829d7417d4d069a187f4ef351ceb8487b742fa28deae91b8c7de09aa16a473d551cd4ec8fca2c6b83ff3667bfa84c5ffe697efae
-
Filesize
6KB
MD5fda7bbd49b37aea8b3238a323a153417
SHA13cd2296ecb37a42bd7ae6728f22fcf8999d08b97
SHA256a30ca44f993d64349427279ff794d8d3badc69ea970b1ef659043eb2bbc34ca3
SHA512617fd324712d4453b51fbe272eab27de979db6e9b1a83015ca1867ff1c799f770596e0aef6cc5844ff32809bdc65255470f829f35339b85b5a0ec13ff1212d6a
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a