Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-08-2024 01:39
Behavioral task
behavioral1
Sample
Roblox.Account.Gen.v1.1.0.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Roblox.Account.Gen.v1.1.0.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Roblox.Account.Gen.v1.1.0.exe
Resource
win11-20240802-en
General
-
Target
Roblox.Account.Gen.v1.1.0.exe
-
Size
16.7MB
-
MD5
d08800a125f32eb3053ba77d75f9095b
-
SHA1
e456be4de88c109f40435a562c6f2ea3b42af0b5
-
SHA256
790d8d9f0163cf4bc1bfff37d3109a7387626327a561ace0cfeb6e9273aaab86
-
SHA512
165a2bd5783411664e27ad129118f939625bf70338ffb9b032f306c78b27e0d3f534ccc6bc63e1fe885ce2b483185aa279b451577b5a36871d4ab0ba8e7f873b
-
SSDEEP
393216:DDTk3+eBcGfdKT74mSy7BAcE1AT+F5s4PG/zz2mH0P5Aurc/m:DPa75Fq74mr7uJA85s4PCzzlHn
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2304 selenium-manager.exe 2996 selenium-manager.exe 332 selenium-manager.exe 976 selenium-manager.exe 2776 selenium-manager.exe 2072 selenium-manager.exe -
Loads dropped DLL 15 IoCs
pid Process 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe 932 Roblox.Account.Gen.v1.1.0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 1 raw.githubusercontent.com 27 raw.githubusercontent.com 28 raw.githubusercontent.com -
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language selenium-manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language selenium-manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language selenium-manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language selenium-manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language selenium-manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language selenium-manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1480 WMIC.exe Token: SeSecurityPrivilege 1480 WMIC.exe Token: SeTakeOwnershipPrivilege 1480 WMIC.exe Token: SeLoadDriverPrivilege 1480 WMIC.exe Token: SeSystemProfilePrivilege 1480 WMIC.exe Token: SeSystemtimePrivilege 1480 WMIC.exe Token: SeProfSingleProcessPrivilege 1480 WMIC.exe Token: SeIncBasePriorityPrivilege 1480 WMIC.exe Token: SeCreatePagefilePrivilege 1480 WMIC.exe Token: SeBackupPrivilege 1480 WMIC.exe Token: SeRestorePrivilege 1480 WMIC.exe Token: SeShutdownPrivilege 1480 WMIC.exe Token: SeDebugPrivilege 1480 WMIC.exe Token: SeSystemEnvironmentPrivilege 1480 WMIC.exe Token: SeRemoteShutdownPrivilege 1480 WMIC.exe Token: SeUndockPrivilege 1480 WMIC.exe Token: SeManageVolumePrivilege 1480 WMIC.exe Token: 33 1480 WMIC.exe Token: 34 1480 WMIC.exe Token: 35 1480 WMIC.exe Token: 36 1480 WMIC.exe Token: SeIncreaseQuotaPrivilege 1480 WMIC.exe Token: SeSecurityPrivilege 1480 WMIC.exe Token: SeTakeOwnershipPrivilege 1480 WMIC.exe Token: SeLoadDriverPrivilege 1480 WMIC.exe Token: SeSystemProfilePrivilege 1480 WMIC.exe Token: SeSystemtimePrivilege 1480 WMIC.exe Token: SeProfSingleProcessPrivilege 1480 WMIC.exe Token: SeIncBasePriorityPrivilege 1480 WMIC.exe Token: SeCreatePagefilePrivilege 1480 WMIC.exe Token: SeBackupPrivilege 1480 WMIC.exe Token: SeRestorePrivilege 1480 WMIC.exe Token: SeShutdownPrivilege 1480 WMIC.exe Token: SeDebugPrivilege 1480 WMIC.exe Token: SeSystemEnvironmentPrivilege 1480 WMIC.exe Token: SeRemoteShutdownPrivilege 1480 WMIC.exe Token: SeUndockPrivilege 1480 WMIC.exe Token: SeManageVolumePrivilege 1480 WMIC.exe Token: 33 1480 WMIC.exe Token: 34 1480 WMIC.exe Token: 35 1480 WMIC.exe Token: 36 1480 WMIC.exe Token: SeIncreaseQuotaPrivilege 2404 WMIC.exe Token: SeSecurityPrivilege 2404 WMIC.exe Token: SeTakeOwnershipPrivilege 2404 WMIC.exe Token: SeLoadDriverPrivilege 2404 WMIC.exe Token: SeSystemProfilePrivilege 2404 WMIC.exe Token: SeSystemtimePrivilege 2404 WMIC.exe Token: SeProfSingleProcessPrivilege 2404 WMIC.exe Token: SeIncBasePriorityPrivilege 2404 WMIC.exe Token: SeCreatePagefilePrivilege 2404 WMIC.exe Token: SeBackupPrivilege 2404 WMIC.exe Token: SeRestorePrivilege 2404 WMIC.exe Token: SeShutdownPrivilege 2404 WMIC.exe Token: SeDebugPrivilege 2404 WMIC.exe Token: SeSystemEnvironmentPrivilege 2404 WMIC.exe Token: SeRemoteShutdownPrivilege 2404 WMIC.exe Token: SeUndockPrivilege 2404 WMIC.exe Token: SeManageVolumePrivilege 2404 WMIC.exe Token: 33 2404 WMIC.exe Token: 34 2404 WMIC.exe Token: 35 2404 WMIC.exe Token: 36 2404 WMIC.exe Token: SeIncreaseQuotaPrivilege 2404 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 932 2112 Roblox.Account.Gen.v1.1.0.exe 82 PID 2112 wrote to memory of 932 2112 Roblox.Account.Gen.v1.1.0.exe 82 PID 932 wrote to memory of 3540 932 Roblox.Account.Gen.v1.1.0.exe 93 PID 932 wrote to memory of 3540 932 Roblox.Account.Gen.v1.1.0.exe 93 PID 932 wrote to memory of 3132 932 Roblox.Account.Gen.v1.1.0.exe 94 PID 932 wrote to memory of 3132 932 Roblox.Account.Gen.v1.1.0.exe 94 PID 932 wrote to memory of 3756 932 Roblox.Account.Gen.v1.1.0.exe 95 PID 932 wrote to memory of 3756 932 Roblox.Account.Gen.v1.1.0.exe 95 PID 932 wrote to memory of 4220 932 Roblox.Account.Gen.v1.1.0.exe 96 PID 932 wrote to memory of 4220 932 Roblox.Account.Gen.v1.1.0.exe 96 PID 932 wrote to memory of 2304 932 Roblox.Account.Gen.v1.1.0.exe 97 PID 932 wrote to memory of 2304 932 Roblox.Account.Gen.v1.1.0.exe 97 PID 932 wrote to memory of 2304 932 Roblox.Account.Gen.v1.1.0.exe 97 PID 2304 wrote to memory of 1212 2304 selenium-manager.exe 99 PID 2304 wrote to memory of 1212 2304 selenium-manager.exe 99 PID 2304 wrote to memory of 1212 2304 selenium-manager.exe 99 PID 1212 wrote to memory of 1480 1212 cmd.exe 100 PID 1212 wrote to memory of 1480 1212 cmd.exe 100 PID 1212 wrote to memory of 1480 1212 cmd.exe 100 PID 2304 wrote to memory of 4724 2304 selenium-manager.exe 102 PID 2304 wrote to memory of 4724 2304 selenium-manager.exe 102 PID 2304 wrote to memory of 4724 2304 selenium-manager.exe 102 PID 2304 wrote to memory of 4288 2304 selenium-manager.exe 103 PID 2304 wrote to memory of 4288 2304 selenium-manager.exe 103 PID 2304 wrote to memory of 4288 2304 selenium-manager.exe 103 PID 4288 wrote to memory of 2404 4288 cmd.exe 104 PID 4288 wrote to memory of 2404 4288 cmd.exe 104 PID 4288 wrote to memory of 2404 4288 cmd.exe 104 PID 932 wrote to memory of 956 932 Roblox.Account.Gen.v1.1.0.exe 105 PID 932 wrote to memory of 956 932 Roblox.Account.Gen.v1.1.0.exe 105 PID 932 wrote to memory of 912 932 Roblox.Account.Gen.v1.1.0.exe 106 PID 932 wrote to memory of 912 932 Roblox.Account.Gen.v1.1.0.exe 106 PID 932 wrote to memory of 476 932 Roblox.Account.Gen.v1.1.0.exe 107 PID 932 wrote to memory of 476 932 Roblox.Account.Gen.v1.1.0.exe 107 PID 932 wrote to memory of 2996 932 Roblox.Account.Gen.v1.1.0.exe 108 PID 932 wrote to memory of 2996 932 Roblox.Account.Gen.v1.1.0.exe 108 PID 932 wrote to memory of 2996 932 Roblox.Account.Gen.v1.1.0.exe 108 PID 2996 wrote to memory of 1584 2996 selenium-manager.exe 110 PID 2996 wrote to memory of 1584 2996 selenium-manager.exe 110 PID 2996 wrote to memory of 1584 2996 selenium-manager.exe 110 PID 1584 wrote to memory of 4900 1584 cmd.exe 111 PID 1584 wrote to memory of 4900 1584 cmd.exe 111 PID 1584 wrote to memory of 4900 1584 cmd.exe 111 PID 2996 wrote to memory of 2828 2996 selenium-manager.exe 112 PID 2996 wrote to memory of 2828 2996 selenium-manager.exe 112 PID 2996 wrote to memory of 2828 2996 selenium-manager.exe 112 PID 2996 wrote to memory of 720 2996 selenium-manager.exe 113 PID 2996 wrote to memory of 720 2996 selenium-manager.exe 113 PID 2996 wrote to memory of 720 2996 selenium-manager.exe 113 PID 720 wrote to memory of 4672 720 cmd.exe 114 PID 720 wrote to memory of 4672 720 cmd.exe 114 PID 720 wrote to memory of 4672 720 cmd.exe 114 PID 932 wrote to memory of 1968 932 Roblox.Account.Gen.v1.1.0.exe 115 PID 932 wrote to memory of 1968 932 Roblox.Account.Gen.v1.1.0.exe 115 PID 932 wrote to memory of 252 932 Roblox.Account.Gen.v1.1.0.exe 116 PID 932 wrote to memory of 252 932 Roblox.Account.Gen.v1.1.0.exe 116 PID 932 wrote to memory of 1988 932 Roblox.Account.Gen.v1.1.0.exe 117 PID 932 wrote to memory of 1988 932 Roblox.Account.Gen.v1.1.0.exe 117 PID 932 wrote to memory of 332 932 Roblox.Account.Gen.v1.1.0.exe 118 PID 932 wrote to memory of 332 932 Roblox.Account.Gen.v1.1.0.exe 118 PID 932 wrote to memory of 332 932 Roblox.Account.Gen.v1.1.0.exe 118 PID 332 wrote to memory of 2144 332 selenium-manager.exe 120 PID 332 wrote to memory of 2144 332 selenium-manager.exe 120 PID 332 wrote to memory of 2144 332 selenium-manager.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\Roblox.Account.Gen.v1.1.0.exe"C:\Users\Admin\AppData\Local\Temp\Roblox.Account.Gen.v1.1.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Roblox.Account.Gen.v1.1.0.exe"C:\Users\Admin\AppData\Local\Temp\Roblox.Account.Gen.v1.1.0.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4220
-
-
C:\Users\Admin\AppData\Local\Temp\_MEI21122\selenium\webdriver\common\windows\selenium-manager.exeC:\Users\Admin\AppData\Local\Temp\_MEI21122\selenium\webdriver\common\windows\selenium-manager.exe --browser MicrosoftEdge --language-binding python --output json3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic os get osarchitecture"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic os get osarchitecture5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "msedgedriver --version"4⤵
- System Location Discovery: System Language Discovery
PID:4724
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic datafile where name='C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe' get Version /value"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic datafile where name='C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe' get Version /value5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:476
-
-
C:\Users\Admin\AppData\Local\Temp\_MEI21122\selenium\webdriver\common\windows\selenium-manager.exeC:\Users\Admin\AppData\Local\Temp\_MEI21122\selenium\webdriver\common\windows\selenium-manager.exe --browser MicrosoftEdge --language-binding python --output json3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic os get osarchitecture"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic os get osarchitecture5⤵
- System Location Discovery: System Language Discovery
PID:4900
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "msedgedriver --version"4⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic datafile where name='C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe' get Version /value"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic datafile where name='C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe' get Version /value5⤵
- System Location Discovery: System Language Discovery
PID:4672
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\_MEI21122\selenium\webdriver\common\windows\selenium-manager.exeC:\Users\Admin\AppData\Local\Temp\_MEI21122\selenium\webdriver\common\windows\selenium-manager.exe --browser MicrosoftEdge --language-binding python --output json3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic os get osarchitecture"4⤵
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic os get osarchitecture5⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "msedgedriver --version"4⤵
- System Location Discovery: System Language Discovery
PID:1660
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic datafile where name='C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe' get Version /value"4⤵
- System Location Discovery: System Language Discovery
PID:4208 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic datafile where name='C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe' get Version /value5⤵
- System Location Discovery: System Language Discovery
PID:3116
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:5040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\_MEI21122\selenium\webdriver\common\windows\selenium-manager.exeC:\Users\Admin\AppData\Local\Temp\_MEI21122\selenium\webdriver\common\windows\selenium-manager.exe --browser MicrosoftEdge --language-binding python --output json3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:976 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic os get osarchitecture"4⤵
- System Location Discovery: System Language Discovery
PID:3844 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic os get osarchitecture5⤵
- System Location Discovery: System Language Discovery
PID:5064
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "msedgedriver --version"4⤵
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic datafile where name='C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe' get Version /value"4⤵
- System Location Discovery: System Language Discovery
PID:3468 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic datafile where name='C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe' get Version /value5⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\_MEI21122\selenium\webdriver\common\windows\selenium-manager.exeC:\Users\Admin\AppData\Local\Temp\_MEI21122\selenium\webdriver\common\windows\selenium-manager.exe --browser MicrosoftEdge --language-binding python --output json3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic os get osarchitecture"4⤵
- System Location Discovery: System Language Discovery
PID:5048 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic os get osarchitecture5⤵
- System Location Discovery: System Language Discovery
PID:3664
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "msedgedriver --version"4⤵
- System Location Discovery: System Language Discovery
PID:4752
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic datafile where name='C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe' get Version /value"4⤵
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic datafile where name='C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe' get Version /value5⤵
- System Location Discovery: System Language Discovery
PID:4656
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2476
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\_MEI21122\selenium\webdriver\common\windows\selenium-manager.exeC:\Users\Admin\AppData\Local\Temp\_MEI21122\selenium\webdriver\common\windows\selenium-manager.exe --browser MicrosoftEdge --language-binding python --output json3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic os get osarchitecture"4⤵
- System Location Discovery: System Language Discovery
PID:364 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic os get osarchitecture5⤵
- System Location Discovery: System Language Discovery
PID:4500
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "msedgedriver --version"4⤵PID:2380
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c "wmic datafile where name='C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe' get Version /value"4⤵PID:4008
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic datafile where name='C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe' get Version /value5⤵PID:3164
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272B
MD55a4f0126f624e39bd1b815a51b3f9cd4
SHA1b95cc859083e494caebbfe8e282eba79c1edd830
SHA256324888dde5104579f8aa9742c2a21acfba3c187a338805684b4ad5dcd7fe2345
SHA512dc618969d50bbbd3ef328d2b6592b200c46115c2098ece3f9854974cd12c60c538bf30c300026544599c04cb1016b760bf80e4c4fb4aeaed94b75ce96af53ee5
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
82KB
MD54438affaaa0ca1df5b9b1cdaa0115ec1
SHA14eda79eaf3de614d5f744aa9eea5bfcf66e2d386
SHA256ec91e2b4baca31b992d016b84b70f110ce2b1b2dfd54f5e5bef6270ed7d13b85
SHA5126992107ac4d2108e477bc81af667b8b8e5439231e7e9f4b15ce4bce1aeea811bc0f1aaa438be3b0e38597760cb504367512809ee1937c4b538a86724ae543ba6
-
Filesize
247KB
MD5be315973aff9bdeb06629cd90e1a901f
SHA1151f98d278e1f1308f2be1788c9f3b950ab88242
SHA2560f9c6cc463611a9b2c692382fe1cdd7a52fea4733ffaf645d433f716f8bbd725
SHA5128ea715438472e9c174dee5ece3c7d9752c31159e2d5796e5229b1df19f87316579352fc3649373db066dc537adf4869198b70b7d4d1d39ac647da2dd7cfc21e8
-
Filesize
63KB
MD51524882af71247adecf5815a4e55366a
SHA1e25014c793c53503bdff9af046140edda329d01b
SHA2566f7742dfdd371c39048d775f37df3bc2d8d4316c9008e62347b337d64ebed327
SHA5125b954bb7953f19aa6f7c65ad3f105b77d37077950fb1b50d9d8d337bdd4b95343bac2f4c9fe17a02d1738d1f87eeef73dbbf5cdddcb470588cbc5a63845b188a
-
Filesize
155KB
MD5737119a80303ef4eccaa998d500e7640
SHA1328c67c6c4d297ac13da725bf24467d8b5e982e3
SHA2567158c1290ac29169160b3ec94d9c8bcde4012d67a555f325d44b418c54e2cc28
SHA5121c9920e0841a65b01a0b339c5f5254d1039ef9a16fe0c2484a7e2a9048727f2cc081817aa771b0c574fb8d1a5a49dc39798a3c5e5b5e64392e9c168e1827be7c
-
Filesize
31KB
MD58bbed19359892f8c95c802c6ad7598e9
SHA1773fca164965241f63170e7a1f3a8fa17f73ea18
SHA2564e5b7c653c1b3dc3fd7519e4f39cc8a2fb2746e0ecdc4e433fe6029f5f4d9065
SHA51222ea7667689a9f049fa34ddae6b858e1af3e646a379d2c5a4aef3e74a4ff1a4109418b363c9be960127f1c7e020aa393a47885bc45517c9e9aebe71ec7cb61a0
-
Filesize
77KB
MD564a6c475f59e5c57b3f4dd935f429f09
SHA1ca2e0719dc32f22163ae0e7b53b2caadb0b9d023
SHA256d03fa645cde89b4b01f4a2577139fbb7e1392cb91dc26213b3b76419110d8e49
SHA512cf9e03b7b34cc095fe05c465f9d794319aaa0428fe30ab4ddce14ba78e835edf228d11ec016fd31dfe9f09d84b6f73482fb8e0f574d1fd08943c1ec9e0584973
-
Filesize
172KB
MD5a0b40f1f8fc6656c5637eacacf7021f6
SHA138813e25ffde1eee0b8154fa34af635186a243c1
SHA25679d861f0670828dee06c2e3523e2f9a2a90d6c6996bde38201425aa4003119f1
SHA512c18855d7c0069fff392d422e5b01fc518bbdf497eb3390c0b333ecac2497cd29abbdae4557e4f0c4e90321fba910fc3e4d235ce62b745fa34918f40fa667b713
-
Filesize
24KB
MD54faa479423c54d5be2a103b46ecb4d04
SHA1011f6cdbd3badaa5c969595985a9ad18547dd7ec
SHA256c2ad3c1b4333bc388b6a22049c89008505c434b1b85bff0823b19ef0cf48065a
SHA51292d35824c30667af606bba883bf6e275f2a8b5cbfea2e84a77e256d122b91b3ee7e84d9f4e2a4946e903a11293af9648a45e8cfbe247cbdc3bcdea92eb5349c6
-
Filesize
1.4MB
MD51e65f6c9ed52ba79f93c0d0395cbd591
SHA10f30bd8baefe9876a7973aabd86b003c31ee869f
SHA256b5fdda23550867243f1b8df3818b955255685660d61a15aab8f5de1a49735d9d
SHA51251074c9d578ce0b03cd92338dae929d290c2bb5bd8893268bc7b9de6a7f8ada62d2dea999ee80ad3c8441736b01017b23d9bfc6cecc23488d87e4413143d62ea
-
Filesize
275KB
MD578d9dd608305a97773574d1c0fb10b61
SHA19e177f31a3622ad71c3d403422c9a980e563fe32
SHA256794d039ffdf277c047e26f2c7d58f81a5865d8a0eb7024a0fac1164fea4d27cf
SHA5120c2d08747712ed227b4992f6f8f3cc21168627a79e81c6e860ee2b5f711af7f4387d3b71b390aa70a13661fc82806cc77af8ab1e8a8df82ad15e29e05fa911bf
-
Filesize
10KB
MD528af0ffb49cc20fe5af9fe8efa49d6f1
SHA12c17057c33382ddffea3ca589018cba04c4e49d7
SHA256f1e26ef5d12c58d652b0b5437c355a14cd66606b2fbc00339497dd00243081e0
SHA5129aa99e17f20a5dd485ae43ac85842bd5270ebab83a49e896975a8fa9f98ffc5f7585bef84ed46ba55f40a25e224f2640e85cebe5acb9087cf46d178ecc8029f0
-
Filesize
110KB
MD56cdca2fde9df198da58955397033af98
SHA1e457c97721504d25f43b549d57e4538a62623168
SHA256a4a758eabd1b2b45f3c4699bdfebc98f196dc691c0a3d5407e17fffffafc5df7
SHA5127b3c384ba9993d3192ed852191ff77bdcd3421cbc69ff636c6deb8fe7248e066573b68d80a8f280ae0c1cb015f79967d46d910455d932eaeac072c76d0757e92
-
Filesize
4.9MB
MD57a6a8c2a8c379b111cdceb66b18d687d
SHA1f3b8a4c731fa0145f224112f91f046fddf642794
SHA2568e13b53ee25825b97f191d77b51ed03966f8b435773fa3fbc36f3eb668fc569b
SHA512f2ef1702df861ef55ef397ad69985d62b675d348cab3862f6ca761f1ce3ee896f663a77d7b69b286be64e7c69be1215b03945781450b186fc02cfb1e4cb226b5
-
Filesize
771KB
MD564acb046fe68d64ee475e19f67253a3c
SHA1d9e66c9437ce6f775189d6fdbd171635193ec4cc
SHA256b21309abd3dbbb1bf8fb6aa3c250fc85d7b0d9984bf4c942d1d4421502f31a10
SHA512f8b583981df528cf4f1854b94eff6f51dd9d4be91e6fa6329a8c4435b705457c868ae40ee030fa54bebb646a37b547bc182c9cbf0df9a07fea03a18cf85c6766
-
Filesize
194KB
MD5cdcf0e74a32ad7dfeda859a0ce4fcb20
SHA1c72b42a59ba5d83e8d481c6f05b917871b415f25
SHA25691fe5b1b2de2847946e5b3f060678971d8127dfd7d2d37603fdcd31bd5c71197
SHA512c26fdf57299b2c6085f1166b49bd9608d2dd8bc804034ebb03fb2bba6337206b6018bf7f74c069493ffae42f2e9d6337f6f7df5306b80b63c8c3a386bce69ea6
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081
-
Filesize
29KB
MD5653bdccb7af2aa9ccf50cb050fd3be64
SHA1afe0a85425ae911694c250ab4cb1f6c3d3f2cc69
SHA256e24a3e7885df9a18c29ba058c49c3adcf59e4b58107847b98eca365b6d94f279
SHA51207e841fda7a2295380bfa05db7a4699f18c6e639da91d8ee2d126d4f96e4cddaedbd490deb4d2a2e8e5877edfff877693f67a9dc487e29742943e062d7be6277
-
Filesize
3.5MB
MD5f3f45ff4bfa86c89cc5869bf673a9f82
SHA188be70a22c945dacaf2f2f37d706103e5eb56c8f
SHA2566cc186fc7d11f3b70932f20cf701be791ad41a9b6a091452253b1774539e10d6
SHA51276718a6c0a6ab96464e7b0dc83743a69ed985569d27dd9757a261497efdef57c292a6d37a8a290b5361af33f11de143f299687addd8813a0e08c8c430476365c
-
Filesize
1.1MB
MD51905b5d0f945499441e8cd58eb123d86
SHA1117e584e6fcc0e8cfc8e24e3af527999f14bac30
SHA256b1788b81fa160e5120451f9252c7745cdde98b8ce59bf273a3dd867bb034c532
SHA512ed88cd7e3259239a0c8d42d95fa2447fc454a944c849fa97449ad88871236fefdafe21dbfa6e9b5d8a54ddf1d5281ec34d314cb93d47ce7b13912a69d284f522