Resubmissions
17/06/2024, 09:05
240617-k2en7axfqp 817/06/2024, 09:04
240617-k1trqaxfpk 417/06/2024, 08:56
240617-kwer1atclg 817/06/2024, 08:54
240617-kvc7satbrf 1Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/06/2024, 08:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://getmyfilenow.com/?id=Win%20Roblox%20External_61446473
Resource
win11-20240508-en
General
-
Target
https://getmyfilenow.com/?id=Win%20Roblox%20External_61446473
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133630881128964111" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 4920 5064 chrome.exe 78 PID 5064 wrote to memory of 4920 5064 chrome.exe 78 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 1192 5064 chrome.exe 79 PID 5064 wrote to memory of 4828 5064 chrome.exe 80 PID 5064 wrote to memory of 4828 5064 chrome.exe 80 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81 PID 5064 wrote to memory of 3136 5064 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://getmyfilenow.com/?id=Win%20Roblox%20External_614464731⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffaec22ab58,0x7ffaec22ab68,0x7ffaec22ab782⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:22⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:82⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1684 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:82⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:12⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3824 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:82⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4352 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:82⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4744 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3920 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:12⤵PID:328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4796 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:12⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2988 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:12⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3932 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:82⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1476 --field-trial-handle=1840,i,7585039270469617130,7758197917414154601,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5906a6e4ad651704a3ba9ab62f1b515f2
SHA18d6a306b670eb0d0aab896a69cb47db9f43b49ee
SHA256309ec84520f7d068f338bac52488381cbca0c9c66b68f10a78cbb22319658629
SHA5120c02abcac13e4ac8530ca83cbe277947714fdcfa1d97989162abde0c77c8d4019d3431ff603984fe2bcd687cee7153dec4b6e4264ad9a1150799af576b45d2c9
-
Filesize
7KB
MD5a82915112c974167a8a176de2de9902a
SHA1d4c5646fffad73773bf037e4e111d9856887d9c4
SHA25666b135441d8d55fbbdb482dafc4331475d85db7fb536940a14cc032d08808acb
SHA512b951f89c4be805ae14b207f9edd530e9409c4da47d0886216c2f870169c22d5d67abf73a61009872997da0fd74c576592556ac1c36ef91f173bade0c5750255a
-
Filesize
131KB
MD5f7a1baa472404cf8ff65a346d7a51f70
SHA19948cf4f3661e2611de11e3561b43d083a93d83b
SHA256d41494957675150d4e291c998d41753e66d9d3fd9aef0e64b16ff3d9d5b2dc53
SHA5120726d02c1af4924f26d6500dc95dda7cf653240e1d2aba2b3e5215cb82e4844c2058ea657e857aea97030eae952723180d87264847ff88164b6e2fee8cdf2c66
-
Filesize
131KB
MD56a914bbbd40e2ee3035572d981153c9a
SHA19ba3192948e0120efe4904953418202f6c221bba
SHA256172a7a3cf181e474a2389a16f362004d81710e81c5cecc160cfbeb334acc675f
SHA512bc3a1d232a756ac6727a3c70d47f443259b142418a93b3b393efb996efabdefd9415c45f85d486bd33201e285ca84ad382f0e9e80f4733a4b44ec8fc5238ff3d
-
Filesize
131KB
MD5abef7221171aa18635b595ee2a664b36
SHA1c62ebf56b30316c0608ea4b9a8bc13b31ca36991
SHA2569e288cbdffb6a24b08b01bb1f0fa4c292184b44c7cef8b43139c3484496f0de7
SHA512ce523548cc05e9a7b6ce03352b746f082a5b0d87c316c54a4453fe006cf2b1ac322e61ecf9ecf3a8f4e32d789bacee46366389e07534e40ff3c694987b738b2e
-
Filesize
86KB
MD5bc13ac745aa7135f4abb977af132a844
SHA17453ba31ab1cf5a7a78032699f771ee9ac7bec08
SHA256f41affdbaf61c30024f177096171a5f32e1f9c4426b0c43a5536632e5bc4f3d6
SHA512c78a99defc13ed4e028aed528db74a5bf984d0dd312b1055f2a7188af29128801370214e3012e30498c25dc16bc7f37fd14ec98de442887f38e77479b651b6ab
-
Filesize
83KB
MD57cda080e6164239182c9c316b83fc2af
SHA116697a911d6c98e33f58d41b0ce5e390f9a73b29
SHA256bb1e0c6fc315e423afc42b75833f830b89441f275c11adb7637b2b662f7243d6
SHA512f7ff3ca0eb5e5ae57c3d679f1db38a450018a72a45db16ebe8235ee9a2a954a1bccd3419b5f2dcc898a5714e8341a4b7af11f5c1cf6671d49ec99b8fa7b06b75