Resubmissions

07/09/2024, 16:30

240907-tzvgasshlk 4

07/09/2024, 16:29

240907-tzarwsvfjh 10

07/09/2024, 03:56

240907-ehft9atfpa 10

Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/09/2024, 03:56

General

  • Target

    https://www.roblox.com.bi/users/5445740091/profile

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://www.roblox.com.bi/users/5445740091/profile"
    1⤵
      PID:4740
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:804
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:1928
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3168
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1060
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:3648
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4468
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
        PID:1520
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        PID:3196

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XCFODRP5\edgecompatviewlist[1].xml

        Filesize

        74KB

        MD5

        d4fc49dc14f63895d997fa4940f24378

        SHA1

        3efb1437a7c5e46034147cbbc8db017c69d02c31

        SHA256

        853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

        SHA512

        cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\4DMXKMXR\api[1].js

        Filesize

        376B

        MD5

        612e612ebc922b19bcda0a4899a50a66

        SHA1

        09b0017a2c25e1b2aa9be4543ca16b367a0d6e5c

        SHA256

        20bbf65fbeb252f305a52000604e524d4c8490f5bc5e7136b57366d8ec95a8f3

        SHA512

        a99f20f09ba658277ef8983b601fa5eac08276dd80fa0f42f10f16a944186b701a18254e8ecdbb5e8a9a9b800a99ab972e7fbcec2a95647c206e3f5115925a77

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\B4W0D256\js[2].js

        Filesize

        311KB

        MD5

        25d188950b38d29dc95c112101830c23

        SHA1

        88b00ab1683ee46c1e50eba4441ca2cd4c49b93f

        SHA256

        a4c00e9aada667bd9169281e666e7a95721508ceb26c3c51964d241e527f2cbf

        SHA512

        3d75af859f35008dd24a4b402fe84e9a55b1a30af20e2af38b5fc9cf3748dd7d3e56d79ac722819e2d3570606932d1c2844be432f31aca90054aafb4c65c9e4a

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\KWVU6P2A\funcaptcha_api[1].js

        Filesize

        147KB

        MD5

        759ab24cf5846f06c5cdb324ee4887ea

        SHA1

        41969c5b737bc40bbb54817da755e3aa7d02f3c6

        SHA256

        7037e6c967c38477a5fcd583c74892e16b7a9066cd60287c7035bf0760d05471

        SHA512

        3470ae07eb7c54feee1e791e63a365cfb0da42f570a66e6c84faf5db6bf8395173c6cb60e8c5cf28eae409f26ea5433c3c5d6ea32eb07e5997c979c6e3ccf4be

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\R1PCU0Y5\www.roblox.com[1].xml

        Filesize

        295B

        MD5

        2cfd09999337246b9dbf7309f4bd49f1

        SHA1

        ab8bcffd2306035c2cf1a5a94cb96f33049e5182

        SHA256

        8aa15f1550ebd012ca2a53240ef18a4c1b42267ef926df59386810284e0ce20f

        SHA512

        1aaf996a5ee3632fa090e2c73fbc58900e60bd6cba8164232f00f4503d87cf61a350bb60d422c8b644d7176daf24314a37f5ff4ba245b8e54cb82252d768761e

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\R1PCU0Y5\www.roblox.com[1].xml

        Filesize

        384B

        MD5

        55dc68dde180d3056d2aaa25974af4c9

        SHA1

        bee41445b2caf82d09eb6aa56b669a8e416941f1

        SHA256

        67805ab0df4a26e95eceaaf3fac65fba7a708ee58b3537b68a26ec026bc6811d

        SHA512

        c431dac9c686d6866b71c9610eb9d8c3372480868570185c37e6858bf31de4a1907c37926a0cf0e0ed9d6743e38aae0cebe7567d1f362d2d0ba804314dac7ff2

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\R1PCU0Y5\www.roblox.com[1].xml

        Filesize

        94B

        MD5

        48c184edb7fbd015df6ffa1fa647ce11

        SHA1

        55e70187b0b6950db4eec3c51d61fe9a691152ec

        SHA256

        375627deeff3c010fdc5fb85f206699f7697a2c1230bc76609e9432670f559d6

        SHA512

        9f48d978071c517a0f081e95e604888623aed99b43aac69c4163c392ec4ceb2b14845e74abe6ad64f829e9841cc5f7aca58eba4878675247b6720c7fbd4d90e7

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\R1PCU0Y5\www.roblox.com[1].xml

        Filesize

        182B

        MD5

        5376508b38a2a5d1ec01693b21f590ca

        SHA1

        3bc1b3ccc55db5e860451c7001221473d8bb0bec

        SHA256

        0f29a9208c801478fbb7bf063add4a473403cb50c59514f461cdfdae64a701db

        SHA512

        4417d2b238d3fb35bf159b1c43481b2cbdc09aa10b3281bb5a869ff065de73d71e5bac3a1cdba6c47d1e9423a62c21ecb71594f02180cae0d086135c1e409e6e

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\D0723Z5G\suggestions[1].en-US

        Filesize

        17KB

        MD5

        5a34cb996293fde2cb7a4ac89587393a

        SHA1

        3c96c993500690d1a77873cd62bc639b3a10653f

        SHA256

        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

        SHA512

        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\UW3WW5XR\7bba321f4d8328683d6e59487ce514eb[1].ico

        Filesize

        4KB

        MD5

        7bba321f4d8328683d6e59487ce514eb

        SHA1

        ae0edd3d76e39c564740b30e4fe605b4cd50ad48

        SHA256

        68984ffee2a03c1cdb6296fd383d64cc2c75e13471221a4bcb4d93fcfa8dab54

        SHA512

        ed6a932f8818d5340e2e2c09dcc61693e9f9032c7201e05a0ce21c6c521b4ac7dd9204affbbfffd3bcebbebe88337fbd32091eaa1e35469b861834f2523c800d

      • memory/804-85-0x000001FDB4870000-0x000001FDB4871000-memory.dmp

        Filesize

        4KB

      • memory/804-86-0x000001FDB4880000-0x000001FDB4881000-memory.dmp

        Filesize

        4KB

      • memory/804-0-0x000001FDAC720000-0x000001FDAC730000-memory.dmp

        Filesize

        64KB

      • memory/804-35-0x000001FDA9C70000-0x000001FDA9C72000-memory.dmp

        Filesize

        8KB

      • memory/804-16-0x000001FDAC820000-0x000001FDAC830000-memory.dmp

        Filesize

        64KB

      • memory/1060-44-0x00000204937C0000-0x00000204938C0000-memory.dmp

        Filesize

        1024KB

      • memory/3648-505-0x000002AEB1AB0000-0x000002AEB1AB2000-memory.dmp

        Filesize

        8KB

      • memory/3648-594-0x000002AEB39C0000-0x000002AEB39C2000-memory.dmp

        Filesize

        8KB

      • memory/3648-509-0x000002AEB3220000-0x000002AEB3222000-memory.dmp

        Filesize

        8KB

      • memory/3648-567-0x000002AEB2660000-0x000002AEB2680000-memory.dmp

        Filesize

        128KB

      • memory/3648-511-0x000002AEB3240000-0x000002AEB3242000-memory.dmp

        Filesize

        8KB

      • memory/3648-575-0x000002AEB2420000-0x000002AEB2422000-memory.dmp

        Filesize

        8KB

      • memory/3648-587-0x000002AEB3800000-0x000002AEB3900000-memory.dmp

        Filesize

        1024KB

      • memory/3648-590-0x000002AEB3900000-0x000002AEB3902000-memory.dmp

        Filesize

        8KB

      • memory/3648-592-0x000002AEB39A0000-0x000002AEB39A2000-memory.dmp

        Filesize

        8KB

      • memory/3648-596-0x000002AEB3A60000-0x000002AEB3A62000-memory.dmp

        Filesize

        8KB

      • memory/3648-598-0x000002AEB3A70000-0x000002AEB3A72000-memory.dmp

        Filesize

        8KB

      • memory/3648-507-0x000002AEB3200000-0x000002AEB3202000-memory.dmp

        Filesize

        8KB

      • memory/3648-601-0x000002AEB3D20000-0x000002AEB3D22000-memory.dmp

        Filesize

        8KB

      • memory/3648-606-0x000002AEB3B80000-0x000002AEB3BA0000-memory.dmp

        Filesize

        128KB

      • memory/3648-607-0x000002AEB3CE0000-0x000002AEB3D00000-memory.dmp

        Filesize

        128KB

      • memory/3648-642-0x000002AE9D5B0000-0x000002AE9D5C0000-memory.dmp

        Filesize

        64KB

      • memory/3648-418-0x000002AEB1EC0000-0x000002AEB1FC0000-memory.dmp

        Filesize

        1024KB

      • memory/3648-376-0x000002AEB0A40000-0x000002AEB0A60000-memory.dmp

        Filesize

        128KB

      • memory/3648-358-0x000002AEB1870000-0x000002AEB1872000-memory.dmp

        Filesize

        8KB

      • memory/3648-61-0x000002AE9D5A0000-0x000002AE9D5A2000-memory.dmp

        Filesize

        8KB

      • memory/3648-64-0x000002AE9D5D0000-0x000002AE9D5D2000-memory.dmp

        Filesize

        8KB

      • memory/3648-66-0x000002AE9D5F0000-0x000002AE9D5F2000-memory.dmp

        Filesize

        8KB