Analysis
-
max time kernel
1154s -
max time network
1200s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 23:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.roblox.ht/games/13772394625/Blade-Ball?privateServerLinkCode=447541284735220506028551259900
Resource
win10v2004-20240802-en
General
-
Target
https://www.roblox.ht/games/13772394625/Blade-Ball?privateServerLinkCode=447541284735220506028551259900
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 3680 msedge.exe 3680 msedge.exe 4892 identity_helper.exe 4892 identity_helper.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 5088 3680 msedge.exe 85 PID 3680 wrote to memory of 5088 3680 msedge.exe 85 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 3168 3680 msedge.exe 86 PID 3680 wrote to memory of 2268 3680 msedge.exe 87 PID 3680 wrote to memory of 2268 3680 msedge.exe 87 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88 PID 3680 wrote to memory of 1180 3680 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.roblox.ht/games/13772394625/Blade-Ball?privateServerLinkCode=4475412847352205060285512599001⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe597946f8,0x7ffe59794708,0x7ffe597947182⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,15603364821204657029,863917686464065846,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,15603364821204657029,863917686464065846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,15603364821204657029,863917686464065846,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15603364821204657029,863917686464065846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15603364821204657029,863917686464065846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,15603364821204657029,863917686464065846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,15603364821204657029,863917686464065846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15603364821204657029,863917686464065846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15603364821204657029,863917686464065846,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15603364821204657029,863917686464065846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,15603364821204657029,863917686464065846,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,15603364821204657029,863917686464065846,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5b22d433e9f5b762f3bc64d19adef4d43
SHA133e1ce14961d4cbfeb5cc6b48cfaa5c52d62d3e6
SHA2560bded96045e2c7e637d3bc013ec4907edb397934696468bcae2e685bd487395d
SHA512bd646aa28e695402fe0fd41d90a693ad095cce5001ee7c18734022c9a029914546a5a5bc2460d775e13269ce223ef36f597cc1ec530911543d853557aca573ec
-
Filesize
907B
MD5b590f52bf62e5fbb1f7989c6dff9c08b
SHA1fd302d86a5cd9430b1fa8c4919c63a42c6fc7529
SHA256927bbd46b213cde83ef337cab41d60680296c48134f17e2403b0ddb9cf17701b
SHA5128896e67d303e14c4e1ac171187bdc4a3ae7894b9ef851b603079578ecd8008c8635d7418fa04821f23cbdd757f4e78b9e53b60cd9215bf3d6ed2f61989072bc3
-
Filesize
5KB
MD5cb98b4fcb9b8a7eb7163c1f7e96051b1
SHA148bd24821cdc68d384cf6824ea2aa6f30f0212d5
SHA2561a21dda838fba1cafe3ab280e492746f0fda5fcc1fec67e609e22ccb1f43cf9e
SHA512a4e43cfd51dfd3d070004d7052fb3501e6494880c4d186e84c4fa8b56c23d89a1c9127efb75f8476c623ba40b00b016fe73686558a46eda7f32e503d3dbf3647
-
Filesize
6KB
MD5006443102cfb132616441747e620cb59
SHA16161cbae02d05858e961c0969a2273ee15a1ae8f
SHA256a822b40eddcf8db840ede5e8cfe7d077a2ba1fb3bbd344c8f98e71b7f4697159
SHA51280a286e0afd301dac451fe4a6e7bba82c2080245236610d4db98b752cd888d9fe7d6addf98cdd87fa4648bb905f661ae039a58c7cc691c2302203fe91f1bd5d2
-
Filesize
6KB
MD55a0fdcba686c8fcc389bfd4042cd24bf
SHA17914c3c9588733e91827a8fe29075a5d66a77a73
SHA256c50c2df4973b71c63f860a2343f7e327693b0191754033a465eb1893f1d0fb8b
SHA5128c755317573be68929ebc20472a529363b2f673e42794fdf41700f1e5357b58fdb930bdfe0c565d9bfc5d9d62a8d4d12bccbc72979e3c187be145ee6ddc65613
-
Filesize
1KB
MD540fe1478ef97c0216ef4494fc84ba358
SHA136924f2e6b046b68997f6ba143762505354b4f0d
SHA256b036b669d635817aee7b16cb2dc587ed8ee9157601f725b46bdcd7eb7e63ed85
SHA5127469de408fde072ebd581f3ec71faa49315a2cf671f0a35fe75216e858b2064e1fb6d6d5bf6fbe15d2d28c3499cb5a7dd6c53f0625cce2b6d50ac4946a442050
-
Filesize
1KB
MD50ad5da4dd2b0d1bfa3fcca0b1a327372
SHA134700b08e2d632df4091696dd34b7d42f99ee0e8
SHA2568cca5310654230006891549c2cc00631598f29263ed13ea1d5b159746d974822
SHA5123ca0068e24fe4d4d31069db49c37f92beff2ae4509a49d3596ab6e19f3d5cbfbde90e4c495e0572893fcdc94d4dd890ff2548014fe7f002d3e0e469098215941
-
Filesize
1KB
MD5b5b3449f4f34e29e8e94352baefb6882
SHA149d16b2da0ad9e1029b370482f5a5dcddef37322
SHA2561b96e75e82153efe4d3e4df373f818459ac915685ea15fff2b915cb1fd99bbd2
SHA5123a8815af8402b76ee3539227237fd7e8217bbe44c57e810d839cd768e435b0c0701328dfaf455b146ca22ac4e794941741ab369f9aada8b54fc90747887fabac
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5602aff8a7655451fbba0974ebb545e46
SHA1aa3247b1a8858900b1d9654097942cb45e35255c
SHA256e7325f6e411851ad30583d693446ac99ce2289ee73297929d414ce284ee04ac8
SHA512b6535c11730843d5129115f285d4968ffcac43b7a009260c319e29932fa6f12c935eefeb722cee7d2730b4897a0ea5a66d435f5cb1696a14fbe6ab91abf1a5b5