Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-07-2024 18:12

General

  • Target

    https://www.roblox.com/games/14731675668/MeepCity-4

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://www.roblox.com/games/14731675668/MeepCity-4"
    1⤵
      PID:520
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4060
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2320
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3888
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3500
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1236
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3444
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:2292
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4984

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      4KB

      MD5

      1bfe591a4fe3d91b03cdf26eaacd8f89

      SHA1

      719c37c320f518ac168c86723724891950911cea

      SHA256

      9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

      SHA512

      02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZVQ9VIUB\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\O50WOFGQ\e[1].png

      Filesize

      68B

      MD5

      2a637d3d825673c0e3462fa4ed9a1c5c

      SHA1

      81668d396da22832d75a986407ff10035e0d5899

      SHA256

      69539b5b3777cffda28a66d7f2aa9b17c91ee1ec8fd50c00c442af91753a60f7

      SHA512

      dc7c40381b3d22919e32c1b700ccb77b1b0aea2690642d01c1ac802561e135c01d5a4d2a0ea18efc0ec3362e8c549814a10a23563f1f56bd62aee0ced7e2bd99

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4POTFLU2\www.roblox[1].xml

      Filesize

      616B

      MD5

      04a0030a7466fa5307880b02afa3327a

      SHA1

      693cc5792bdbe52586340387a1400525caf2de3f

      SHA256

      6e4a46307b5906d5578f92865520fd73097b5b533eb3234806c5d0bbb0cce602

      SHA512

      6c1aafd107bed91a8f907d5d9c5854e862ef50d6c4fa78968be85ebd2da5c81d5f92575caa83f342804f9ad2d3648712a8b39f426a3fdd1b480af90522dba79c

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4POTFLU2\www.roblox[1].xml

      Filesize

      616B

      MD5

      87c9e6be30f95e11542385e2cfcfcc09

      SHA1

      a0489b51ac98e66a50af4cdece183effce3ad68d

      SHA256

      d781ac11f16d596cc8109cc7051116055a759826eeaeb407a3adc17df15461bb

      SHA512

      fe49cfd6bfe267e506c3723dabb01770ed8f39d09cbba1e3604bc31cdf83a521bed00cc0cd1eaa28cbefdded221e8bae5570f0f79c82d786289224890f9263d6

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4POTFLU2\www.roblox[1].xml

      Filesize

      95B

      MD5

      7b89a26555f7370966c36d19aee7819e

      SHA1

      30b3f07732fddcec5c0e4844baf79d7857dae93b

      SHA256

      149c314499e5294fc8225496570d7dd2a9133387459450621041299e98f7679e

      SHA512

      6497d00a672b49d76eb3b7d827a11abcd3f1079ef23ad0683343e244941a5b19676eb947ab7a25c0df3f1ada589e198c157dd66696662ac6099a72e26634c85f

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4POTFLU2\www.roblox[1].xml

      Filesize

      209B

      MD5

      ad0d74fc6a8b0a377e1b7d5dfe11bccf

      SHA1

      907d8d8252b01333157991f0f09fb5145a6aa629

      SHA256

      6e72f3a81ae1260684c4e980a94724d5529363d30d778f3ff0d58691f68b5fb3

      SHA512

      a52f478aa712ababba761a7c4fb087d08dfd2a84e55b2b027b8850ece21f6edd2a487b44a2f6e2a877800c1d2973cda750296a0b930e0d28ef345620efc5b08d

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4POTFLU2\www.roblox[1].xml

      Filesize

      409B

      MD5

      1e56cf8eb38378829b002fb814b8de46

      SHA1

      689c998eed582cdf0e9fcdf2e5b1875a3caa43ee

      SHA256

      df3c5220c778816142af7eec96ea3601a80747a6b8e5cf6e652be9c9d419b175

      SHA512

      3bb689e273b4f9b0b8f3566dc670f44e99bd045c73eec841791f693ee5bca3df4ddcf21eb9d46a28a1bb58a9c52df611df7323edf01fd4df12edeea009f4f398

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4POTFLU2\www.roblox[1].xml

      Filesize

      409B

      MD5

      76e09ea38e34c4c4625d6c112caa51d6

      SHA1

      4877d9405d3f2d8fdf0ac8375e5b3a52f3fa7dac

      SHA256

      86d11e9a99d1619766faf76bdd1a6b3c255c438c2ec879320b22c58c7a687d22

      SHA512

      ce55a81a6c2f1477946336359c87890f4c9875bb7c19bd5fa7c071d8973bd083b700bc951c65286a97605a7bcca3fb575ac6bf38fdd3ea32907f5e02ad2b5e2a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4POTFLU2\www.roblox[1].xml

      Filesize

      458B

      MD5

      d2e70e8281f874d8f94415437d65cec6

      SHA1

      e1075bbc024902980cb018139ae73f8c41b77d3a

      SHA256

      a8c2544c6228fa449aacc0c9e193c4d8aab34fe6b19f817830cf2f32c09e6478

      SHA512

      a25affe5d8b827befd647f8c47e0bd168aee0fcc8531f3f6ba70722206074db6636000dbbba870b0f3ee4356c1376c7b8fc304150b2ed1aab1bf722b5c375716

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\F9HL5P9L\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\MK7NOO12\7bba321f4d8328683d6e59487ce514eb[1].ico

      Filesize

      4KB

      MD5

      7bba321f4d8328683d6e59487ce514eb

      SHA1

      ae0edd3d76e39c564740b30e4fe605b4cd50ad48

      SHA256

      68984ffee2a03c1cdb6296fd383d64cc2c75e13471221a4bcb4d93fcfa8dab54

      SHA512

      ed6a932f8818d5340e2e2c09dcc61693e9f9032c7201e05a0ce21c6c521b4ac7dd9204affbbfffd3bcebbebe88337fbd32091eaa1e35469b861834f2523c800d

    • memory/1236-815-0x000002063D700000-0x000002063D800000-memory.dmp

      Filesize

      1024KB

    • memory/1236-885-0x00000206275D0000-0x00000206275E0000-memory.dmp

      Filesize

      64KB

    • memory/1236-405-0x000002063A0A0000-0x000002063A0C0000-memory.dmp

      Filesize

      128KB

    • memory/1236-410-0x000002063BBF0000-0x000002063BC10000-memory.dmp

      Filesize

      128KB

    • memory/1236-479-0x000002063B930000-0x000002063B950000-memory.dmp

      Filesize

      128KB

    • memory/1236-483-0x000002063B9D0000-0x000002063B9F0000-memory.dmp

      Filesize

      128KB

    • memory/1236-502-0x000002063C820000-0x000002063C920000-memory.dmp

      Filesize

      1024KB

    • memory/1236-554-0x000002063C600000-0x000002063C620000-memory.dmp

      Filesize

      128KB

    • memory/1236-383-0x000002063B420000-0x000002063B422000-memory.dmp

      Filesize

      8KB

    • memory/1236-746-0x000002063CAC0000-0x000002063CAE0000-memory.dmp

      Filesize

      128KB

    • memory/1236-62-0x0000020627A00000-0x0000020627B00000-memory.dmp

      Filesize

      1024KB

    • memory/1236-878-0x00000206275D0000-0x00000206275E0000-memory.dmp

      Filesize

      64KB

    • memory/1236-874-0x000002063D700000-0x000002063D800000-memory.dmp

      Filesize

      1024KB

    • memory/1236-880-0x00000206275D0000-0x00000206275E0000-memory.dmp

      Filesize

      64KB

    • memory/1236-883-0x00000206275D0000-0x00000206275E0000-memory.dmp

      Filesize

      64KB

    • memory/1236-389-0x000002063AB40000-0x000002063AC40000-memory.dmp

      Filesize

      1024KB

    • memory/1236-379-0x000002063B3E0000-0x000002063B3E2000-memory.dmp

      Filesize

      8KB

    • memory/1236-381-0x000002063B400000-0x000002063B402000-memory.dmp

      Filesize

      8KB

    • memory/1236-64-0x0000020627A00000-0x0000020627B00000-memory.dmp

      Filesize

      1024KB

    • memory/1236-888-0x00000206275D0000-0x00000206275E0000-memory.dmp

      Filesize

      64KB

    • memory/1236-884-0x00000206275D0000-0x00000206275E0000-memory.dmp

      Filesize

      64KB

    • memory/1236-886-0x00000206275D0000-0x00000206275E0000-memory.dmp

      Filesize

      64KB

    • memory/1236-882-0x00000206275D0000-0x00000206275E0000-memory.dmp

      Filesize

      64KB

    • memory/1236-881-0x00000206275D0000-0x00000206275E0000-memory.dmp

      Filesize

      64KB

    • memory/1236-68-0x0000020637E30000-0x0000020637E32000-memory.dmp

      Filesize

      8KB

    • memory/1236-70-0x0000020637E50000-0x0000020637E52000-memory.dmp

      Filesize

      8KB

    • memory/1236-65-0x000001FE25C00000-0x000001FE25D00000-memory.dmp

      Filesize

      1024KB

    • memory/1236-72-0x0000020638010000-0x0000020638012000-memory.dmp

      Filesize

      8KB

    • memory/3500-44-0x0000027E54A40000-0x0000027E54B40000-memory.dmp

      Filesize

      1024KB

    • memory/4060-16-0x0000025817520000-0x0000025817530000-memory.dmp

      Filesize

      64KB

    • memory/4060-35-0x0000025816570000-0x0000025816572000-memory.dmp

      Filesize

      8KB

    • memory/4060-0-0x0000025817420000-0x0000025817430000-memory.dmp

      Filesize

      64KB