Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 05:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://roblox.tz/users/9742034425/profile
Resource
win10v2004-20240802-en
General
-
Target
https://roblox.tz/users/9742034425/profile
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 516 msedge.exe 516 msedge.exe 516 msedge.exe 468 msedge.exe 468 msedge.exe 3260 identity_helper.exe 3260 identity_helper.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 4856 468 msedge.exe 83 PID 468 wrote to memory of 4856 468 msedge.exe 83 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 3268 468 msedge.exe 84 PID 468 wrote to memory of 516 468 msedge.exe 85 PID 468 wrote to memory of 516 468 msedge.exe 85 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86 PID 468 wrote to memory of 404 468 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://roblox.tz/users/9742034425/profile1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff51c846f8,0x7fff51c84708,0x7fff51c847182⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,4592548770478592446,12440182566123351142,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,4592548770478592446,12440182566123351142,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,4592548770478592446,12440182566123351142,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,4592548770478592446,12440182566123351142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,4592548770478592446,12440182566123351142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,4592548770478592446,12440182566123351142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,4592548770478592446,12440182566123351142,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,4592548770478592446,12440182566123351142,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,4592548770478592446,12440182566123351142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,4592548770478592446,12440182566123351142,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,4592548770478592446,12440182566123351142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,4592548770478592446,12440182566123351142,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,4592548770478592446,12440182566123351142,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5e62af6870a549fc0c85e79e3088c82e9
SHA155af4e6675f3c0efbed413112a038dc3d13d0371
SHA2564c0293f8626b3f4ea2aee853eeb50bd2ca9208f7173babdd5138ea4498be36df
SHA512801fd44ada0a6216d34f8873588829c41a77f4a93bf18e7637f40a6c6f7a7732c6981f816d7c5c93ebf06df16dc576a11987a25d2e3d9ddc938cd7f9d5280bba
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD57297259b19935b67693d4e9dbd2ab5e4
SHA1129aa4b323daa38ae441c75e461397580078d19e
SHA256b32e06e5624293069832bc346a01e2f86af17ae52f3e3c71202d9bb51233f6bf
SHA512659d19aa7e4ed2200a650d2d11cf98f2c91fc098077bfddadc98714a3302166ff4c7518054ab9e2c9aff11452c7ac5325f1256fe3cf130a88924ec590b470838
-
Filesize
1KB
MD51ed5f1b83c304ede5a7e00f8d142c0ff
SHA11ce3414a45740ed5aced9fa9f98d758a5eee3449
SHA25649afa4c8b5c8258e41dc4f807ca76c010b1be93c7fe3aa504b42b43f57cc39a2
SHA5125046d3881e85c81015991be63ad62891dc6e92a595904def93740f3f14c2a5157a3ae29297c40f165cc49bb9516a9f4f6fb9731d3c524185d67711257a8b6f2d
-
Filesize
1KB
MD5ddb737b6150b2e2307ffa958504d8f6b
SHA128dee07b859bccde8dc56c0e6aee9d8d3beb50e8
SHA2567fc098f7a3a1680dcf2fb11cb0641128831036844fb8ddbafedee280a0794682
SHA512c2eca6c8cfdf35de851f0b4aa1b1e0dcc52297c71c2b014eefe943e4dca99a4a7334d1c8319df7c27d3e1adb6aee888cf1040572d79c87a6085b95d69a98c8d9
-
Filesize
6KB
MD5c51207eecd0dffad47b69228b3f274a4
SHA14873d848af5edd2373201077cc8094e9a246ac68
SHA2568927c84c67485ddc7e0f0a4c1ae9705dc632c77ac86cb2ebdbe61e6ce7df5a24
SHA512ffa579e65ea98931f6158f0161e1283628a8cecd77e20afc63d93d961f6cd197fe72b146e91ac03bfa0b9a46d71e1cb93886c786f93bd559c583ed970f4dae3d
-
Filesize
6KB
MD5a2bbd084985a59897a53a64f2aa94191
SHA1b528599cf5817d8da8738f4cfbd3501f7233be9d
SHA2564d70a6e8188956f22e154e3e8dc784bd4c4a311cd1996dc3c847ab0206ebee68
SHA512f97ff555fccedbcbd09b05ed87a8c9f8b2697b2afe4ddbc2c587cdd453d7e7b76e76b52842f51aae7e0d612286a43e2f9a8ae3030dc035777e17dcad4fd4dd65
-
Filesize
1KB
MD5e3aade69c687f43c367336bd2573770a
SHA110173ce70dbc0f4cbc5ad1e7929a98509b0f76e8
SHA2569b7e9b6aa3aa027992ce7cd431ca5f7836b8faa59bc0d2ec7019d8a9c6fdedeb
SHA512fecf819a37dc10726f340e45c1d7411075cd23d596ba165280c798fda8cea06eecdd1e50488d69a971ccc876ccee0ed2b003d877a553734849ea85f033b539f5
-
Filesize
1KB
MD5706e32f797a2bbcb53f92d96feee925e
SHA19b0b079c5fb7dcb563d9c023b23dd0535f2ee5a7
SHA2562084759cb4503a5b181e413358a3a3424e8f820881555ce1381a9c85ca0b3427
SHA51225a20a3883a3b8620f85732c5f153ef42b800bb836deadd44a2ef8ca1936472042a2e853a843a5b15593ab2177d915e4918d63b46195a4316b50c3e84a40562a
-
Filesize
1KB
MD572e62656e6140906a9bfe393c988cc4e
SHA1ec96d179ab62187bcf9392ee4adcb3877a3ecd06
SHA25681e073498fbcad309e76cb5fd46b1cc08c8276d1a72442cd6ad614371cd177b0
SHA51217d501c1e081a68d66c1763e48b52bc2d316ec77caccd6b226adbe702661add4fdc2300cd02a1458a801a5ec86b6240cfb7ef1cad5a96a8622ca9da8492a5ae5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a1aec5c0-181c-46d9-89fc-2b85e175b638.tmp
Filesize1KB
MD59f2516e22a902dbfdd866d19d70d0f79
SHA16e0ce3bca8887fd18eaf243cb3af9d9fe9741a6c
SHA256f8bff1958b731d90dc9652a0a54cf0b98dd2509aefb2a272ff7149a619429cb1
SHA5126a0537e7ddb837e513b0edeb0ceb910fc6b19017c313426954cd929d609af1809068ca194a5cf7fb6b0796f13a3a594e6a941123367cdb3f79c97c49d5fe3f7e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389