Analysis
-
max time kernel
77s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 12:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://roblox.com
Resource
win10v2004-20240508-en
General
-
Target
http://roblox.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133624954999297252" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1444 msedge.exe 1444 msedge.exe 1384 msedge.exe 1384 msedge.exe 5000 identity_helper.exe 5000 identity_helper.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
pid Process 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe Token: SeShutdownPrivilege 1312 chrome.exe Token: SeCreatePagefilePrivilege 1312 chrome.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
pid Process 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of SendNotifyMessage 56 IoCs
pid Process 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe 1312 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 2904 1384 msedge.exe 82 PID 1384 wrote to memory of 2904 1384 msedge.exe 82 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1712 1384 msedge.exe 83 PID 1384 wrote to memory of 1444 1384 msedge.exe 84 PID 1384 wrote to memory of 1444 1384 msedge.exe 84 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85 PID 1384 wrote to memory of 2020 1384 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://roblox.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef99446f8,0x7ffef9944708,0x7ffef99447182⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1484 /prefetch:82⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 /prefetch:82⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6580093382016879168,16134611109409151689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:12⤵PID:2924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3684
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1312 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffeea2bab58,0x7ffeea2bab68,0x7ffeea2bab782⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=2392,i,482456243149531164,4908829328460076166,131072 /prefetch:22⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1704 --field-trial-handle=2392,i,482456243149531164,4908829328460076166,131072 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2064 --field-trial-handle=2392,i,482456243149531164,4908829328460076166,131072 /prefetch:82⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3120 --field-trial-handle=2392,i,482456243149531164,4908829328460076166,131072 /prefetch:12⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3128 --field-trial-handle=2392,i,482456243149531164,4908829328460076166,131072 /prefetch:12⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3840 --field-trial-handle=2392,i,482456243149531164,4908829328460076166,131072 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 --field-trial-handle=2392,i,482456243149531164,4908829328460076166,131072 /prefetch:82⤵PID:704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4840 --field-trial-handle=2392,i,482456243149531164,4908829328460076166,131072 /prefetch:82⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4576 --field-trial-handle=2392,i,482456243149531164,4908829328460076166,131072 /prefetch:12⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4828 --field-trial-handle=2392,i,482456243149531164,4908829328460076166,131072 /prefetch:12⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5044 --field-trial-handle=2392,i,482456243149531164,4908829328460076166,131072 /prefetch:12⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3480 --field-trial-handle=2392,i,482456243149531164,4908829328460076166,131072 /prefetch:12⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
811B
MD5945c96a4bb1a68fc15b6ac1204a8a6b1
SHA13387d08844bd04584d0ad8d8d4f1fdef4222aafc
SHA256ee7b8926e857a0e5c6f284fa24ceec7228a4b7e4c4b26c86ad839f9a4db43854
SHA5122c5a43e3d9f35002f8076e5551cdf6d0828ef2f8376d51a3154ce5e478a7a10c818cd5d2650555c0cb68cbb146f9100b5813fd806de42a8057f7494f53d8b7e7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD52a47c166176ab2c7ef8520280a055a56
SHA1c65975c817c1ef1df36753bbe3d0507c26ee4b5e
SHA256c6fd437a5cab78224c839b010d11b95a4e148b5bffba8409aa369e6a254b8443
SHA512fb679f5c47efa6a22e842b596c56c99b099665c336233b80bd3d9528f0c5d40ffcf25e920e171403f98156b6ec61115cea9ef30564ec128e63e35e10f8ec997d
-
Filesize
257KB
MD532595c61104c07fbe3572f9f855e56e5
SHA185e0ef8a62a3b631990b3caecb87d0fc15f9f7e0
SHA256fb6e113f275c582566b7784aa672a1f72687b5e801561ec581fa9735b7104935
SHA51291e691876418a728732919667af4bb1062e394c145c8d2a1b39074dbe5691332e70c7fcd8e818c2f64b506d5d0e9182a18cc6dbce5289459c5d6bd7bcd12e7c1
-
Filesize
257KB
MD5240f08ee70b261a60830e52236d4cf73
SHA1a1d234cf1b243411d82045aa49cc7416f386627e
SHA256aea805f2b350478e6b879a31baac810f38cff71c45adaf328e3f77a246b18608
SHA512da1713be87614f097112ac14f492256df3eef263366c35a3349d67d4d72cc0317cc7e22188db812278a80fc6935341c536945dffc2c971a5cc0aa126b1bf48c7
-
Filesize
257KB
MD5e6f43f93b2274c6cf25aa7bdae20e38b
SHA17c23c07ff8930560ff3f2835be92e27d1cf31e7f
SHA256e8700b232c43bae1a994ce3affff8df3ff028f8dc9e55e1a59ec2c405c176cb3
SHA5124e8a23043ca05eea5c4c494ed41a0e47421574e3ed6b09a6238dd4a200b1d39069a2abe1c99503282b022bdbbc80f99be407984ceaa352b43a78084678d3e3c6
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD583a953ae8eab30e1466ca12ac1cab9bb
SHA12659e71696dee747bbadc7de779653bcc5ae4146
SHA25668efe0c44585ecdf1ac8f8262c879267ab0185fbe6310d43fbeb6fed5bb8da27
SHA512bb172db68c71f7cf9720f4b076f514c311e2875dddde7281255a5589c4bba9730bbc9c11f31c78504dc16e9f96b8c638659ac63105016a6500c474b502bf19be
-
Filesize
6KB
MD5b11da448c52ceeb24af1b1dfc5b9aa9d
SHA19cb5b5f45083c1152e0a1e1375afc52b321dec19
SHA2569a3f5dc186bfdfea324c1f68dd443126f2f5593abeabdf06562951a7d0e03f82
SHA512e5967e2ac9d2e7bef7aad1d98b216c2417b69d7fc9f5c932b74c47b0f09b68df7484b60667453a71fec014c61a5e465dbe4ce5fec6188b74ab0ff64074c78a6c
-
Filesize
6KB
MD5fe98483c43a334e43cdfc023c6853d39
SHA1c08ad419ce9436c78e62a8417143bf4bb83ac406
SHA256bca16139c0dd13fd81c90ea651f0c852376563677acb1605a495a93589182ac9
SHA51287625f7002372ef3645a3e7dfaf8410244ecb4afb9287e0413736f63f840fc07a048abb949a72e703dc3cdb298908b9ef3275c6516e597b44bc720fd617ec059
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5d28a2403ed9670e1088a81b79a57c7c4
SHA1397cfbc2ff6f2f28dbaeeb5a68acde5a9d21724b
SHA256610628f39038698d46a8107302c291e23751ce336357d9df46e0f82ad3f9bf7e
SHA512f7b13b7b30dda5c790e6767ee41e5b375b964b67320a1c06ab296e5b633133f49a9d5cc614f6b40597761fb3d6cb66562ce52152013d11ce44094fc48a971d83
-
Filesize
8KB
MD5bb31e86f353b01f3f39d7543f6da8622
SHA12ed0128787be252601a394ed00f3b606a7a17ad6
SHA2563bc61061f8bc8e1900fb2f82913805f2f6a146c88987aa234aad2ef723bef0f8
SHA512cd347f574ca8a4e0b1cd8ab8a426e510b016827c54f86b3f1c8851a59f23ddef4d4ebb8a9d8e07553380f8c1d8ccb747a407b3b398496e4e0e63d664db3d2a48
-
Filesize
264KB
MD5f0605401e61f27691099549f63caf1a9
SHA1a76a9b01d78831e5072b0e91318bc95c139bc7a9
SHA256cbf308bae294e18995cf93ef440463aa20358631b1b0986292a16129b2654e15
SHA512ec2c2d48a4f570947287f96826486686dd056dae6fe80959c235f971c3feca693f80551ddfccce77256342b43767155b16cf41ae3994b1bd72ce3fade05932f7