Resubmissions
06-07-2024 05:13
240706-fwdgqayfmf 106-07-2024 05:09
240706-ftk4sawekq 106-07-2024 05:08
240706-fsqmwayfje 4Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-07-2024 05:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://http//roblox.com
Resource
win11-20240704-en
General
-
Target
http://http//roblox.com
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133647162204676521" chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1640 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1640 POWERPNT.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1640 POWERPNT.EXE 1640 POWERPNT.EXE 1640 POWERPNT.EXE 1640 POWERPNT.EXE 1640 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1004 2332 chrome.exe 80 PID 2332 wrote to memory of 1004 2332 chrome.exe 80 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 2012 2332 chrome.exe 82 PID 2332 wrote to memory of 1848 2332 chrome.exe 83 PID 2332 wrote to memory of 1848 2332 chrome.exe 83 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84 PID 2332 wrote to memory of 2064 2332 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://http//roblox.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffceac8ab58,0x7ffceac8ab68,0x7ffceac8ab782⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1484 --field-trial-handle=1796,i,2848775012461667859,12019123195712686652,131072 /prefetch:22⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1796,i,2848775012461667859,12019123195712686652,131072 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2136 --field-trial-handle=1796,i,2848775012461667859,12019123195712686652,131072 /prefetch:82⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1796,i,2848775012461667859,12019123195712686652,131072 /prefetch:12⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1796,i,2848775012461667859,12019123195712686652,131072 /prefetch:12⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4296 --field-trial-handle=1796,i,2848775012461667859,12019123195712686652,131072 /prefetch:12⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3088 --field-trial-handle=1796,i,2848775012461667859,12019123195712686652,131072 /prefetch:12⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1796,i,2848775012461667859,12019123195712686652,131072 /prefetch:82⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 --field-trial-handle=1796,i,2848775012461667859,12019123195712686652,131072 /prefetch:82⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4504 --field-trial-handle=1796,i,2848775012461667859,12019123195712686652,131072 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3964
-
C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1640
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD50cd81670a78e62ae66d6db2adb2f50b1
SHA14f73aff4306791a35bd7c7f96edb32c6a5c6478d
SHA25605b2ae61754b9c573f5c8757782d3ef156d8e5f57e585676c72534aeb2d123b1
SHA512992d30a277ffe6f5584203f2fcf242c53bd7f570f7b467ffd02831fa07d71d31b5d0b2b8bef4a714507e4a2a69b5f26750fbbd2fc9d5fdabe090db0790f1eb91
-
Filesize
6KB
MD5abb235eaf5bc557126f2360b1b774944
SHA1c96bd4beb13e5779b50b2c26f1abab7090842b8f
SHA256bfd2d50841b2a438c4374ccc96a9426d200775a627b8972be3ebab16006f4e90
SHA512c7b585a2ad4a4b8d19a27350092cb3b0468857dd2c65e67eebfa404f2ce766948413846aca30576405d805479ab73766431738ddc4da56b4c87a6a1009f2484b
-
Filesize
144KB
MD5a57f4ccb2ac443e5df4be1930166f714
SHA1849f8cd36c1e727bfdd43277ff95e219f4ee19b7
SHA25607a17153598f0bd6ea725221cc4566960cb569a56af57865f942e7a24adcc7b6
SHA5122caca84eeb9e0dce5c7bf71bfff681cc2ab5bb148020e2650ad5a8d256532e16d5318e87a3ed3b7e7608e2a8d6ccc55eefb659c1db490b1e685be806fab8e594
-
Filesize
144KB
MD5537d243d01c8b7fca31a524493909c5a
SHA1adafcd257f5b85d0a06efa33c80a763e0ed5fd9e
SHA25655796b2e4acfe023ad3cc72cf8eef45a9cb5874cf7e4e60c1990500e8d30d9ba
SHA5122a42b12a46c08602b4e07bcdea8607013fe1cdbb38060385caae222939c7c13faa31910f89f5a3363d872758295328d7437a35be356016e48c7e0a68edbcd4c1
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58