Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 19:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.roblox.com
Resource
win10v2004-20240426-en
General
-
Target
https://www.roblox.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4000 msedge.exe 4000 msedge.exe 4860 identity_helper.exe 4860 identity_helper.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 4840 4000 msedge.exe 83 PID 4000 wrote to memory of 4840 4000 msedge.exe 83 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 1664 4000 msedge.exe 84 PID 4000 wrote to memory of 4696 4000 msedge.exe 85 PID 4000 wrote to memory of 4696 4000 msedge.exe 85 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86 PID 4000 wrote to memory of 4700 4000 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.roblox.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd329346f8,0x7ffd32934708,0x7ffd329347182⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10124506638430585758,6416904163517286942,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,10124506638430585758,6416904163517286942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,10124506638430585758,6416904163517286942,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10124506638430585758,6416904163517286942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10124506638430585758,6416904163517286942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10124506638430585758,6416904163517286942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10124506638430585758,6416904163517286942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10124506638430585758,6416904163517286942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10124506638430585758,6416904163517286942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10124506638430585758,6416904163517286942,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10124506638430585758,6416904163517286942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10124506638430585758,6416904163517286942,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10124506638430585758,6416904163517286942,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5602920fb428a4f0e5297a948198db14f
SHA1daf80718c0ddf39b5b5c2fab5ef6bb0dc8acd620
SHA25685e4690f8f36e60d862713606cf33caa196ce426793155864f687438f63316eb
SHA51299d0226b1ddab906ce13999761ee994286d814e546df9c9a1f8c837ada73202d2d74625f15723054a2cbde7b90e2184f2c585224ad76f8d16ab310255f78a54b
-
Filesize
2KB
MD5b0508bceaac6c3dd2e3905de1fa7f92b
SHA191d0b68e04b2b5609da0dd481abb58b243d12eee
SHA256b2fd12892a7ff7d50d76db1d9ab967fe5b4dc06bf4905404200676385820e07a
SHA512b9d81e4bfb78999e23a2f1759c6068e809126c3fa0af5e44c2a9b6850e23597d0a99746907f951cdc9520af97f8e7632a4e1b9010961e895855dd05cbe2c240d
-
Filesize
6KB
MD5f174d5c9fc3aba20f23d0459d5152571
SHA1d7c1d549866d3e4c4ae2089141b7c3e9fcd90389
SHA256a9818266eb7afc5075b94aacb11a49cb6c597576a29e23624c7dcb996199e1fc
SHA512893df91018fb678f782d1e3354c7b250fc779865f74fb60dbbbd9c72add3a96b53a71103589349e142f9168cff433c12199c1e1d3e53259d22dc371e05a4e572
-
Filesize
5KB
MD53e414ea2397006e00dafd16ce0208d7f
SHA188a94667a9f230b772cbc1c708ff5b436f6e5a50
SHA256143bff70b2a9feb369512b5b75dcaeb0594fa584dc85c2082c21e1a72b5cf204
SHA512aadad49cfd9ecf28e1e9300232ec341d010ce901f3995eb314a446431aab34b35e56fc23ca7ff93e9b6e6c60603d163421582dfb39d0add16bd749b01d817eb1
-
Filesize
1KB
MD5ce5e3a46530692bc34e9145b00c2846e
SHA177d8927eff231fbea747d17d5a82eb845d9d0564
SHA256c18e6227e43af0956cc803a8538bdb8dc04f31bc2f63f21a96abd7d83abfef45
SHA5121e9c6baeba4c7a2e0e1f1d0986893f733e85b2fce2d1c1c3022e9c27eba78b06b35fe485be46be03aaa8cb5519feccf6bb54185c9c0a6757813080e842f766cb
-
Filesize
1KB
MD54243b2980b0c83add07ed153d9e1bced
SHA1f6429325046468cd4395b1397ffd34f4a7994840
SHA256e69444560b3d1693ed3aa03d5522ff42812f7c97f36b8f76909f912385efbe6f
SHA512da57de1596828db93c86cd64ce91e78a3536030d4cc5abad7366a52a632cfd1d7a338b4988d76525efa57dabedd06e4fa54861c0eba7dd54bf51a38a35bb1270
-
Filesize
1KB
MD559dcde6f530cb911b22e820f743f5fbd
SHA183c9f962fbca84e67bed60c7a6ae48cf62be9d93
SHA2565f06eec7b9cea91621b775d9c0bbd513e6162c7e5b50beafd3df2ff20bbc4bf2
SHA5124b9f78d2ad8339f9fb257ae1d1843c2b716ce8aadc1032144e29371cdf32438757338c2c3400c0944ebe6b05ac53be2b28fa0ce1bf9015a006f8e71dd3cd84c9
-
Filesize
1KB
MD58901b987d080153926bf33e25368cd4a
SHA1f776c75a47955ef57b44e5243076b27b10ee0654
SHA256fd6f08e83b82b81e617701321772bff4bd64710a789a204ae1202621e7f3b0fb
SHA512577c19991211ed42928fe34166eff699d3b7277b8b5ea160e10db3d7458a8451bd2283c836d67fd86ce79204ac961dbf1ccb815b1c6af1adbcee38ed8a21baef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d5de17aa76237cf53fb77644b039fd80
SHA1e85b8007c516d7f2ba3371d22f955a08b097a131
SHA256d35c7a8db041673588ed2a66cdcd4b6c3c32ad9abc71cf1a7709eb6bb1acc936
SHA512fc4b2151c52250658334755bd2d615879759a150c69af325b0bbe52d3a9f549667e8a5a411efaa8b3ebd44b3d3fc77d47889caa23f3e2e8223dc9567f5236c0f