Analysis
-
max time kernel
20s -
max time network
22s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/06/2024, 18:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ROBLOX.COM
Resource
win11-20240611-en
General
-
Target
http://ROBLOX.COM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 4836 msedge.exe 4836 msedge.exe 4840 msedge.exe 4840 msedge.exe 2680 identity_helper.exe 2680 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4836 wrote to memory of 3552 4836 msedge.exe 78 PID 4836 wrote to memory of 3552 4836 msedge.exe 78 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 4372 4836 msedge.exe 79 PID 4836 wrote to memory of 3668 4836 msedge.exe 80 PID 4836 wrote to memory of 3668 4836 msedge.exe 80 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81 PID 4836 wrote to memory of 1336 4836 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ROBLOX.COM1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc6c4b3cb8,0x7ffc6c4b3cc8,0x7ffc6c4b3cd82⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,12112331603068284092,4691127995360418153,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1952,12112331603068284092,4691127995360418153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1952,12112331603068284092,4691127995360418153,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,12112331603068284092,4691127995360418153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,12112331603068284092,4691127995360418153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,12112331603068284092,4691127995360418153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1952,12112331603068284092,4691127995360418153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,12112331603068284092,4691127995360418153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,12112331603068284092,4691127995360418153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,12112331603068284092,4691127995360418153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,12112331603068284092,4691127995360418153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53066a8b5ee69aa68f709bdfbb468b242
SHA1a591d71a96bf512bd2cfe17233f368e48790a401
SHA25676f6f3fcef4b1d989542e7c742ff73810c24158ac4e086cbd54f13b430cc4434
SHA512ad4d30c7be9466a797943230cb9f2ca98f76bf0f907728a0fa5526de1ed23cd5cf81b130ee402f7b3bb5de1e303b049d2867d98cf2039b5d8cb177d7a410b257
-
Filesize
152B
MD55c4605aed5013f25a162a5054965829c
SHA14cec67cbc5ec1139df172dbc7a51fe38943360cf
SHA2565c16c584cda1f348a7030e9cab6e9db9e8e47a283dd19879f8bb6d75e170827f
SHA512bf2a5602fde0de143f9df334249fef2e36af7abeda389376a20d7613e9ccad59f2ca0447576ac1ed60ecf6ab1526c37e68c4614d79ae15c53e1774d325b4036f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5fcd21e9d915ac844ec0190a86f61ab46
SHA12bc9b1a27e605dc7cb652a16567c628b16bf9444
SHA2560a30f1de2799aaf493aa3867a079bb0ce566860963756fd44c663dc86b8f9293
SHA512d269016510f60a6d38b6bca37249c4832e8838dbb48573c14cd8ba6eb0e68451fbd8eaa9c2a473435e7bb2fad05a02587f0441be00aa79c49c9e0864c5d753aa
-
Filesize
2KB
MD536b82a1595c64b85a0fb91d577228614
SHA1fc08452f6ef13b8bf2531042e549f9d0fb26cafd
SHA256f7c7a1d5fab6118e18a9190d22bb4445abb28d3988271dccb615867ad8c33da7
SHA51253f2de7371bb688b07a58bf783f08278df1dc44b1d4532a00da392fd18b4b62e1b75a88c0fa337bccc7018c551efa6e0792af8ab058de3194583f1ebe0ee09fd
-
Filesize
5KB
MD5e71c99bfe1430e78589ef5cbd998c764
SHA1b9eb6ff97e5f993ba45b39284ca92aa526ecce51
SHA2566636fe2032436106f4f837577c12ad3fb49f468a26c6d7ca7f404c89822c12e1
SHA5129840b71a63ec457c2587c749f7a0e1989b2d24c7a3bb6b174fd810b3a466a2117a137a32042186838ef089ddf160a6660e877255ea00303c60690c48f293d696
-
Filesize
6KB
MD58dd3ef61d7f41769d2bff4d06d8d0ba9
SHA1fc9239b973805e3bdc3938bd0d0399fa3fdd17f0
SHA2565128e3b1cbcc2b733ec084203a34d38970ecef30f31c64b891ba5deffd4c63c7
SHA51215a06e06c3fb587e2788248d9150d7f297b676c59099493b349a6ce9eeb8067ec3d3e990743aa837ab82c6e04c991a6ef4df61fb8f49e0561929e1c1c64bb110
-
Filesize
6KB
MD56e4cf827ea555b6bcad071f7ce0fd880
SHA10b5ccf2708fff9659201b0b5b3218f685227108c
SHA25691ecd5fdb0454b50753c5094b07f923655edda7fdcd664137ba503de41eb7020
SHA51257c2a9839d7a48156139b860e882f4f6ef40f8b592204fcea2aa543ae9732912b6479251b8951340be3b8e60f855157d00423b093260bc4d021a6790167acdaf
-
Filesize
1KB
MD5954ddf9ef3a6a3f92986114c9198761d
SHA103c916052315df9c122fde509442866bc4bda516
SHA256bbff6ed40eb916b8909916cb2525496b1428a8bb6a3e3e9f4e5a5a49aa259a19
SHA512dabba8b861b1d9ebcbeb85b2b11812242c31cebd66a3912b617d7b0853281f3a6918c3f975e23841260497d1118d82b3dc5dfd2cf264f3a858adab33fb65465e
-
Filesize
1KB
MD51aaf60b48577aceff2c95811646339cd
SHA1b91a43559d7737c63da658ae6569eacfd621152c
SHA2565f2f6f1d83f2ca81596c6353f95e8a11d5d31001a4f60fd5c937ba856edc2cd9
SHA512d422070f1de9b3be61eec8df0b4b1120e1661acb7c19766eede3c0598c8584e18eac7c8d925166068bae2a5f065c4a4ec91c852254729412352cfa608cc6899a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d9503a573b30503ed59190b46dbdbbe0
SHA17b94c2b2d38001632f235a70d176e652c6928d08
SHA2569f9d3fc400d138c13407aa460e938d6f7a3b104a2a960b5bc804ca00218ea2a2
SHA512c0f4ac861ef0475df1ed7446c03680d336c443412c53d91a114157ea49452ee4a16e8de602ae064bf1cf38b544490f98db3fad9585d9868b011c4675b4b29728
-
Filesize
11KB
MD57f48a2a006b86e3d6859595e8ba0646d
SHA11333d511d1d091f6b29d56aa1204dc2d6b9ab8f7
SHA256528a7a3c3d8b9b6be7b4e1971de3e6e8eed177a31edebffa0c2f729f12d0904b
SHA512fc22b0686cec685a8336f0e49d5b7ed92e01f0d3648d545b057f1bedb17a6a7800532e3cabb3ef5ecea37c85aef1a791ab20bcb1b91ae758a029ed1da018e518