Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-05-2024 18:51
Static task
static1
Behavioral task
behavioral1
Sample
Anti-AFKforRoblox.exe
Resource
win10-20240404-en
General
-
Target
Anti-AFKforRoblox.exe
-
Size
1.6MB
-
MD5
da52b8940345fab461050501ea9cd1c8
-
SHA1
c663de3dbfcf11f754c0c32ce6ae9a3782cae4ac
-
SHA256
3e6d8273c67fac733200a771f708887ec88fa51a8aaaf58fbb3e44c77e8395c4
-
SHA512
f43a624a8f02b8119a86500f6c36e1fec30224a9b4812e2f693bb10b2646beee08a3d38be40073626c7294626314c9d50af094bf4adddd5e8ebca8deec9fc401
-
SSDEEP
24576:p6T8Ujl6vO01C1GCTsYoQZtlsZdc40QDrUYuGG1ihTGTTi0C1bUCALmSkSCkxZWY:7TUwTGTT2ArPkSpxs6/Zb3yBtq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Control Panel\International\Geo\Nation horizonpublishlauncher.exe -
Executes dropped EXE 3 IoCs
pid Process 3696 horizonpublishlauncher.exe 3780 Information.exe 3808 wait-till-open.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 31 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\anti-afk.exe Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\favicon10.ico Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\Opened.exe Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\anti-afk.exe Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\Opened.exe Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Remove Anti-AFK From Your Computer_lang.ifl Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\favicon10.ico Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\horizonpublishlauncher.exe Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Remove Anti-AFK From Your Computer.dat Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Remove Anti-AFK From Your Computer.exe Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\horizonpublishlauncher.exe Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\favicon10.ico Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\Information.exe Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\wait-till-open.exe Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Remove Anti-AFK From Your Computer_lang.ifl Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\horizonpublishlauncher.exe Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\favicon10.ico Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\Opened.exe Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\horizonpublishlauncher.exe Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\wait-till-open.exe Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Remove Anti-AFK From Your Computer_lang.ifl Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\anti-afk.exe Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\wait-till-open.exe Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\Information.exe Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\Opened.exe Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\Information.exe Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\anti-afk.exe Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Remove Anti-AFK From Your Computer.dat Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Remove Anti-AFK From Your Computer.exe Anti-AFKforRoblox.exe File opened for modification C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\wait-till-open.exe Anti-AFKforRoblox.exe File created C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\Information.exe Anti-AFKforRoblox.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 557ebd9242adda01 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000c1d8c2d08158b4d95b950b64faaa72a7d10527804521bdeef64a91d4da5941fb2989db774ae77d84e508f49940bd0d4ae937e6e6db9f32f32c07 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = b0a4e39242adda01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3780 Information.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2528 MicrosoftEdgeCP.exe 2528 MicrosoftEdgeCP.exe 2528 MicrosoftEdgeCP.exe 2528 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2228 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2228 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2228 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2228 MicrosoftEdgeCP.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4384 Anti-AFKforRoblox.exe 4384 Anti-AFKforRoblox.exe 4728 Anti-AFKforRoblox.exe 3696 horizonpublishlauncher.exe 3780 Information.exe 3808 wait-till-open.exe 3696 horizonpublishlauncher.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe 3780 Information.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3696 horizonpublishlauncher.exe 3780 Information.exe 3808 wait-till-open.exe 3696 horizonpublishlauncher.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4728 Anti-AFKforRoblox.exe 3696 horizonpublishlauncher.exe 2820 MicrosoftEdge.exe 2528 MicrosoftEdgeCP.exe 2228 MicrosoftEdgeCP.exe 2528 MicrosoftEdgeCP.exe 3780 Information.exe 3808 wait-till-open.exe 3780 Information.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4728 wrote to memory of 3696 4728 Anti-AFKforRoblox.exe 83 PID 4728 wrote to memory of 3696 4728 Anti-AFKforRoblox.exe 83 PID 2528 wrote to memory of 1728 2528 MicrosoftEdgeCP.exe 88 PID 2528 wrote to memory of 1728 2528 MicrosoftEdgeCP.exe 88 PID 2528 wrote to memory of 1728 2528 MicrosoftEdgeCP.exe 88 PID 2528 wrote to memory of 1728 2528 MicrosoftEdgeCP.exe 88 PID 2528 wrote to memory of 1728 2528 MicrosoftEdgeCP.exe 88 PID 3696 wrote to memory of 3780 3696 horizonpublishlauncher.exe 89 PID 3696 wrote to memory of 3780 3696 horizonpublishlauncher.exe 89 PID 3696 wrote to memory of 3808 3696 horizonpublishlauncher.exe 90 PID 3696 wrote to memory of 3808 3696 horizonpublishlauncher.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Anti-AFKforRoblox.exe"C:\Users\Admin\AppData\Local\Temp\Anti-AFKforRoblox.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:4384
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\Anti-AFKforRoblox.exe"C:\Users\Admin\AppData\Local\Temp\Anti-AFKforRoblox.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\horizonpublishlauncher.exe"C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\horizonpublishlauncher.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\Information.exe"C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\Information.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3780
-
-
C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\wait-till-open.exe"C:\Program Files (x86)\HorizonPublish\Roblox\Anti-AFK\first-download\wait-till-open.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3808
-
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2820
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4560
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2228
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:1728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56e71f504316de1b26a8bb0c49141e6d7
SHA1de0fef894baec107feb1153df44287a80b995414
SHA256d9989750e1ae77bd722103421d3aadbe0706d4040e57149b0a142329571095c7
SHA51288e5c3c1d1445f56d23cc2d2029faa3cdeba68a16a9f88e9884bab338113fced9de18f2e0aa82b1268fce6e9d64e1717c39e07118290599de0333cbb9ef6ecff
-
Filesize
1.2MB
MD5148d7fa9b7e8abbcad1986606579e94f
SHA194ac4b7eb545f489523c93c720123924ea4d4e42
SHA25618e12b2eff723bf5f848d664e1e53e3e0579a77b750cc5fd3fd25198223820cb
SHA512c767daafacdd790df3ead7f5344ec7c695eba01b7e402d1e6878446b79a93ac7e0d17cc4b2fb3c34a2c56824d2d90ce3db08de30a695e32fa3531a894d7382a6
-
Filesize
14KB
MD581358ffc87fe352a00dbf9ebb75469c3
SHA1944e65ebd5c374651edeac8450420b6909461286
SHA2564e64b6092198df7990013cff342da6003a56468ed74f87282d3bf81e7b33f29e
SHA512d3e48ef80a618fc0895d9ce085e72f9a6a101e089f7943138c5e023d1597c1593f09016d0b3e795334aa340b4f772bb53522a0d7e337930fed47d1a2cdcbbae7
-
Filesize
1.2MB
MD5de6328aa6ffe30ff5d395437f4a9ec69
SHA178352668c7a571036873fc7a92dec3ed4f517034
SHA256c671b412fcec433e96ec1474f02a806fcdda28d7a555ef9b48070e5db22aaff3
SHA51239273c96f985d645757a68b994951043f24ba666606c9271858f8e5b23b060ba149c7bd1302302499473150c186ee1a05e09cc799926ee3d120c2aa9968ddca5
-
Filesize
1.2MB
MD5a2cec08e4e539ff21ca72065ad43a190
SHA19e4ff4f0b0230e2053931efd1334613d1c694421
SHA256cd922bc80d6096b588805fde60fd575ec656533f7da49654f4624efe2a38a4e4
SHA5125a5a0dafff4d9379622df322e1896510ccd8e0ad3c5dc87b57fc844a2cb162c23ad245d3e287bce7b2fb4d6e6ea748f7dd28f1098ded135f8dfdcf800799bd6f
-
Filesize
1.2MB
MD545ef3f3d63b0dc1f691f3bd14e207a19
SHA1e13940578da413a656e357d3191654e81636b4ae
SHA2562a99c31d99114254ede031b1150642e990210f4a33180e930c0794caed0c767e
SHA512367fd1444853a364b4fcb634e00fc66b711cf1b5d7212499e16b46237443839ff9f8e1ce017963e07d2726fe0619692f005abf34d0f6ffcba79ec5f087cb33ed
-
Filesize
4KB
MD587cfeb7644f6da16baf20e486776932d
SHA11486830da17719de2416f4a0851b0716c3e1a219
SHA256901af07bcf6b1a5bf308232388666ef4533e32bc4e1acad5ca1c10261141c612
SHA512a398b45dcdea6ab30dfe52e4b6e4a4ec063c85db5459964103b5b698a6e27c699ffee45792b2b59989eb73a83b8ee670f6fd94fd7c5c6e7dbb1ffbd67a82cc92
-
Filesize
2KB
MD52922d0c758d9c3c10cbdc59f91979d0c
SHA1feb69bdf58d06cca776db63036811af0764ca013
SHA25620f6d12eac29bd6ddc6a99dd276c5e200fac25c976ab4293195b58ec164c253f
SHA512d15e888bae4e23ce5d61becc3c47d9b5f61fbbe4612cf90677314570fe1df1f4fde6c519b789ad46cc50d19c2b3701bc9bd968e85bb618fb7127950d4ae92695
-
Filesize
1KB
MD5f45cacc71668dccf4e80609f0d38516b
SHA1d629c815082b619dd4dc9bbaf5ca8b72c8198609
SHA2560005786b7522cba7698da0ea24c5ec511f80666b87c43a4becd087b2667e955a
SHA51212bddff03f108bfa3caebc0aa7fb0a959f78b68829dba989d3e59da07bad6b14fb686509841b92251f91ca2bcacdbf4efba3fb2d3ced934c81dc13ab38ae486e
-
Filesize
68B
MD518c2c547522bab9a39665a083bbc1f9f
SHA13a731fe3948c564fedfbfac3816b3e15a529683d
SHA256818e30095e1e3ae3568b16e7e11df6f477a362911698525b2846a9514592fe89
SHA512df77412342b44f5bc187ab42be8def4e769dac3c75d8967d39d46d7c0c50784f99f29d9117908bb337f1e0e781aba6b7e4f269d93ca48c13fb6d9a4b7c96f56b
-
Filesize
194B
MD56720b01a0ad716bd2f8f7c67a0429029
SHA195558d9c17f4b41d1b76f7b9f4893ea803b75b76
SHA256c195a140f6e79b1791e126a3a27561d74971b035987262eec9204ea265335c96
SHA512d0612675ccb00e5c0f910589e1f1e5e1dfd4ed3f4016f5755c6b3a95a32a8c59d28c103bfd0c0b3174696729f1699b44be2e47021114f5d21d8456e2e21d4d9b
-
Filesize
976B
MD5c2b7dcfce7128d2334c1894ba17b1370
SHA1675b03702d9db7372318a67261452f7f500edd20
SHA256eb8eb536fd2f21f97289f4cb039b22d1090f6d28dc1789d79f27f5fe69aea607
SHA512e838b4d01199e505a1420919a7d5cd690b5b11ebfa81130d93c44c4015ba517684da34a5543e04fa8f3de64de892e1b7db36ba83c92cba7432d7a816c7b1ddfa
-
Filesize
79B
MD5abb414c3df1357f1f7b594ba88fb3b7e
SHA10246c5ae788d399cb26b904e09b2ef217f0990bc
SHA2566f60657dd5e30b69df37e92c613efa640b7e8eb076f1dafc0d6891a42cf206e7
SHA512db45f53d83258a8e87e5ef7b6902452e411079aa0d3511bab2f11e7afaba587ae24419e5b1bfe4071882291b86188cb71d175caebe0ab773209a2f19ef5cce42
-
Filesize
14KB
MD55c6627e49902fd9698d4c4c3a39e7979
SHA13c4a51826326791ceed18dca56821385fc9d9ab0
SHA2565a60e44ac5a1eb2cd8a3927d34329fef1c941d58de4c99c538f9f8ec4cc82a58
SHA512c2f7b2719291166acb56c1b81bcb94517b168c2b697b4a9b4f010e8e27f34e92ec97d60ed61a661291c00e6cac14f33fb462096d491b497233e3e3cbd8521c30
-
Filesize
28B
MD50759f965f825e7bd9de00ebbf55c9c59
SHA11e7544ac7df2592cb81fa51ecc6a35c8f850b1f1
SHA25620cfc5eaddb2ee414017cd8451e7496fb556dd5e49c160d7bbe2b34ac994b6e1
SHA51206104675d0d6181a22ee8fe17f0c28f2beca628272d1d76f938b7d552a4a89d0564388c3b1d4ca9df29b115d50f5c64e63f7795bf33ec3bef5a483828feacd61
-
Filesize
443B
MD5422f86d9d01dec81190ecba8a0af276a
SHA1012c8f98a9c41ed415c8e54d5e0ce3bc33a2a815
SHA256e4b4459fdf8e0f8b726123d288a9ce836386e6f53565e3e5f3ea3daa73ea5ea7
SHA512109fc417576ab07e01a0155de537df274ba9d0121247d8ec563fa1784d8f63376274a9d87952ebe3b2e6a0d7a715033fb4ee7f914988c1d20e1bfbc106f6fa56
-
Filesize
785KB
MD58e0746bfc71c4ac8e9ce238b664b3fe0
SHA113d559b8a2e6b06f5fd54aa20b863b5e58fb1128
SHA2564d032c3bb8ec41a65a0ff211db345b42f625d4bfb636145780d98be55407a891
SHA51255aaf45ebe55130d09765205f7db744d3886ede7b6455bde16f66514b2876d6038d2575478a8a4afeb740750726d9bedcf0d7d40c86ba7bf4b4e42100fe50895
-
C:\Users\Admin\AppData\Local\Temp\IF{DD6A5E8F-9759-45D4-895F-19FAB659D18D}\setupConfiguration.archive
Filesize37KB
MD5d4c5b1bbcbfc63a051a3570079f8bcfa
SHA1f9b52ea996659a8d22b6214662690dbfc6ee74e6
SHA256f32b554a608f96b11ad70da8699a1eb7f575ea5843987b7b89140cd9e456c4e2
SHA5127d7646b7d5b633c79b02a52208be3dc4a1ddef6f112d9d99bc9f68d9497a798b5d45803613766cd5fc220fcab1f56e9b3aa0d6c57c8ed8373c701070fc231501
-
Filesize
28KB
MD54113672c304403c261c91f10599a49fc
SHA1dfeda57d7b7d6b46efa95608412e3c5d2ef8b27e
SHA2560fee387af68d64a4c7bce5218ba94542c682050b171ccecb45767c1c061e9423
SHA512b554c9c94071346167115bc3c975bc22dd2e64d7b10ff9972e62fb264d4e25d5550eec7c3946a18af7a865024ae83c4aa0d824c0937c765be75344f5cd260284
-
Filesize
1KB
MD51ad388bd33870206142e23ca46ed73b9
SHA13b171f6512306e8c9e5e946775c009ef8966104c
SHA25688e9209346d4125fc1e7455a8e7afe21e4af6add40ceaf983872143dfe47d552
SHA512e5991932e4403b9cc1f64d9a76537f130609b385fe8ae763d28f2cd887a6e72f60925cd1fa0bff19e07e0a74e1d9407b56e640711892b96fbc90dbd827d0edae