Resubmissions
06-07-2024 05:13
240706-fwdgqayfmf 106-07-2024 05:09
240706-ftk4sawekq 106-07-2024 05:08
240706-fsqmwayfje 4Analysis
-
max time kernel
53s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 05:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://http//roblox.com
Resource
win7-20240705-en
Errors
General
-
Target
http://http//roblox.com
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC174A01-3B55-11EF-B82A-724B7A5D7CD6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20cccfa362cfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000076128320cb8efb31086a8b3a8621dbad8250ae44261c58eb7246b994df75666e000000000e80000000020000200000006ec8a5335acfd82153a333627443120c9d09042880776efa0b33e2679366e03720000000d5f7969e38e1fbef7d426e80228b65828b824ef0f9721c148fb928138998dfad400000003982e26f7ec39ffaea5208c8fc12a78919bd9186c6a130db11a749f348278d4db8399a373f106e6d4efe2962d5d145fe0e0412685922ddb01774e0faf3fe424f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000004fcb9b7ae05ae3ca231b60d6f2183144891e8d13309efa7359a4bd5dd0baf16e000000000e800000000200002000000034a9927ce13293e5cc9ef81d3878bc820dcf54fe6100143ddd1c4a8a49a37bba90000000e82c306da66de347f9f75325b3d4843f2caed93e05aaf88dce40784b26d61a5508d6f3abe5b559edbd246efc57721226aa8735866d4bf5efbb0cfcc7d6dd65cb66fcca4890ba28be9222f25c07a2aa4d8098f82bc51be7e21b5f7d7435c7390608e4f2eba4b257a41c035839881ecd4b36ccb21fe5bc1c5c64be4a06fbea3ef0f6b6c0366276b31860fbacc2dff6a5eb40000000fbf390ef7860ca6f149932891a122f8f06ec4b03e15b27d832ba0b0d56b722b2c56c951b2f56b88f272b2a5478625294bcdf677a5338c68b6bc93f0b0538b268 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3012 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3012 AUDIODG.EXE Token: 33 3012 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3012 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 1176 IEXPLORE.EXE 1176 IEXPLORE.EXE 2436 mspaint.exe 2436 mspaint.exe 2436 mspaint.exe 2436 mspaint.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1176 2524 iexplore.exe 29 PID 2524 wrote to memory of 1176 2524 iexplore.exe 29 PID 2524 wrote to memory of 1176 2524 iexplore.exe 29 PID 2524 wrote to memory of 1176 2524 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://http//roblox.com1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1176
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2436
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1976
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1781⤵
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5573d9fe934adf21e42ff6a367dc3f3
SHA1fbf936a66c6fe65f1af581a937e66f9afadc96e6
SHA25681dbdba04fbb117c395ae9955ad12b4efe381ce1ffa60421ff9a93257669a025
SHA51243e9dd881ee083294f0d6375282df9cd011b220a028bd1d38c904016063ce21d02c9b5a173f4c6d7df633e634693e0e7aa924411168c519e1d8149cf69b57ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e940b874f8db3bf83c8ef1350b2a46c
SHA1bee0b1796831323187f781724de7795149f1ee8c
SHA256e31143600e5bf0a32d469db65bdbe06f291423b5818fe90d736277cd12b8608e
SHA512444852fd0253cd18e910045eddb4c200c6ec0ba04ff1d8badf275f75c912169f7b9d8af7cfb37cad88d3fe2e430d9a84b50d5b60c2e11a31a38f6358c6a334b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d66af4b5455812e6c6a7025f7c5f37ec
SHA17181c4d463e910163e81028fb5baa004984d96b6
SHA25659719825dd69c119077d1b1d87cadfc70574dc6c6a6b9b5645b5bae924ab0bc0
SHA5127811d946e1b3a7eb7c904d494c5f959d5e0eebbe2850150b24bbef9a98d256e06c728802626f5bd0282c893a3d23b20fa936597090acc392dcc660232da48ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5034699eab70ba5301f48ff267e650313
SHA1907874dcb34aeff1b10f3f4836adb4b24e186613
SHA2560a11ab359d8ad3c7de9e9388b178f786e8d58b9c6551e64ad58a8969356b3dae
SHA512665ba05419630f3e4b347ab7b809e7ee5a6ee86d03792298cedd3a41bde5fbda77fa788ac30ee71131407b1bb2190ae8a1ec98ce030d96db301fa9636adb6c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538bb82f715d4158d7a461b46ed0b4243
SHA129cedc0b74f5959c4a51c0ce025a0ce0588bac33
SHA2562a6d48bac3762ce9d48c4a0e80ce14c45da611ecadc9b0b73e1f2f936200a908
SHA512ba1087a4ff066a5b13f2ae93c0a355ca3158e9c8864b3ad67cbf7f043e4d821b05ae799513af06858c50000742d2f7534f43d5c279827eaf7727c159754d638f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2c480c5b297c48c859df5b5778757fc
SHA110819c24d9f97fc588d326922d53b45518661449
SHA256cd4842912d663fa51909b3ab6934a45c537194e144c9fe2e63a6029f0f50ada6
SHA512546f0e9d217569ee86decdb96b646944e226d4e788a20a3c073c29afe2794f04337b42eec0fdd86fb7ce380683d124a4b2c2c9c5399bfa50f1344e339aa5f482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d7a59c8ae992268f76eb4be98fb35aa
SHA1af1283da843d0f3cad7dacd230e9257e3828fba7
SHA256c167642f482412e9f854e38c11b382f02f6660b8f2213f32d9a7dd8b64f8be55
SHA51253695027b253e5f891a7454d0d05b624e63c2eb5d74611ff8aefdc8ac55e3c5196f99234f1e85775994614f3db328b486487d1d8d9d8d2b23f7229ae35fc4b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51433a848ff33ab7fd115577288b4fa03
SHA194987a339eaba2ad39a2a4e4cf938f538f89631a
SHA2563b1a2d1952c401e9c532738d9cb1570921838c3ba09608542e0a94b516f6d25d
SHA512b90ed41ac030b668bc5716b0c9e2653d1f08bc2bb5c1b11f86cf75b1caeb7008e56b384b8f068429d84f28f5454fcc7c02626d1a4a676370ff6ccf8047b4deb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e3d8fca1dd0eabb2ccc252969b8f0a7
SHA129e8617464c24a720898c025a7b85bf6310c9638
SHA256a3fa16813c7b8a3d8770ce3f54329196249f3c2d509d709a4313a8eeeb2f3bcd
SHA51226a3786db95ff1114a615e795fd605a225e2a308a78cc4d54a2c52903e8c990c623a6fd7d506ca5eb2fb6fd10bddd502a5c89b0e8a95f8980ec9ceb374507b6e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b