Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 19:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.roblox.com.lk/users/4983248068/profile
Resource
win10v2004-20240508-en
General
-
Target
https://www.roblox.com.lk/users/4983248068/profile
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133636445038680176" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2148 chrome.exe 2148 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2148 wrote to memory of 2496 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 2496 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 3376 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 336 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 336 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe PID 2148 wrote to memory of 1320 2148 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.roblox.com.lk/users/4983248068/profile1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffe676dab58,0x7ffe676dab68,0x7ffe676dab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1856,i,13702860355915158180,11050779028968018003,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1856,i,13702860355915158180,11050779028968018003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1856,i,13702860355915158180,11050779028968018003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2804 --field-trial-handle=1856,i,13702860355915158180,11050779028968018003,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2812 --field-trial-handle=1856,i,13702860355915158180,11050779028968018003,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4280 --field-trial-handle=1856,i,13702860355915158180,11050779028968018003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4428 --field-trial-handle=1856,i,13702860355915158180,11050779028968018003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4276 --field-trial-handle=1856,i,13702860355915158180,11050779028968018003,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4444 --field-trial-handle=1856,i,13702860355915158180,11050779028968018003,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4072 --field-trial-handle=1856,i,13702860355915158180,11050779028968018003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4356 --field-trial-handle=1856,i,13702860355915158180,11050779028968018003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 --field-trial-handle=1856,i,13702860355915158180,11050779028968018003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4440 --field-trial-handle=1856,i,13702860355915158180,11050779028968018003,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD54a7fcbb580777bc7949970bc7877100f
SHA1705d6c36414980bc8de7c7b2a6aa73cc18bd7727
SHA256baf0d944fb5bdc39da41041959935bc3212b958fd063f6375ebf71db10ac6567
SHA5125107b326d75cc84424bb7e9a14f8526df3f3fb53d83cfd4281068ad8c323a27f2377a572930c4e398783bfe1a34e713cf9260f22e894c9da0af12009e5140666
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
257KB
MD51e9fa1579e51d3461715ada2b8090237
SHA1baafffd2e789e0b3dc105e55246594b6c61b76d0
SHA2565c24ca1430373f7c71c8ea6a0f5f18af2a710c7b849764adb8274ba651e5d233
SHA5126fb4fa881a9388955ea521c4108c0fa17eac376935a7cf3521cb5339fb53939a0d19f14ab7836687fd6fa7e86b0cfffcb95b712ce58e2b83d965ca53343066db
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
257KB
MD54de7047cc1a96bd9ba22a86619cdcf4b
SHA1921d9d8703d3a9cdde89efb538602af0dbeba0ed
SHA25637692be052eb00fb9c994104676e81d1c0db616171f4fd86628d91f13319a38f
SHA512cfae2fc12f034bc4ecb06a0ee5da59fb9cb1db523f5dcb8b3260b205c8ee41fe351cd0c07da4f37eac673dff0a31d872452abb96b00c57ffa8a84bb9bba8b641
-
\??\pipe\crashpad_2148_LDXAWTPFLGHEJSVMMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e