Resubmissions
28/09/2024, 11:24
240928-nhnpjawbqd 3Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 11:24
Static task
static1
Behavioral task
behavioral1
Sample
roblox-file1.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
roblox-file1.html
Resource
win10v2004-20240802-en
General
-
Target
roblox-file1.html
-
Size
4KB
-
MD5
07135f90dcc73da0d9dae83c4ed3ad73
-
SHA1
f857226b715a59bf7ce88898495eb8d8ad68d06a
-
SHA256
605b7e49d15ed0c2d4f9a2a1cf7f7dda738a8154f0efabef24f03e9566b42274
-
SHA512
72ff7e728ecace90de4da7fde27ad8710dab4ada0a6fa7352ba2e1a174fe2968120f42a15c2a1bca978ce02fca444b252138e32386b58090aa5bc59950d18c73
-
SSDEEP
96:1j9jwIjYj5jDK/D5DMF+C8/ZqXKHvpIkdNhqrRU9PaQxJbGD:1j9jhjYj9K/Vo+n8aHvFdNhqry9ieJGD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133719962741543412" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3732 chrome.exe 3732 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3732 chrome.exe 3732 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe Token: SeShutdownPrivilege 3732 chrome.exe Token: SeCreatePagefilePrivilege 3732 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe 3732 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3732 wrote to memory of 1012 3732 chrome.exe 85 PID 3732 wrote to memory of 1012 3732 chrome.exe 85 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 2192 3732 chrome.exe 86 PID 3732 wrote to memory of 1660 3732 chrome.exe 87 PID 3732 wrote to memory of 1660 3732 chrome.exe 87 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88 PID 3732 wrote to memory of 3256 3732 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\roblox-file1.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffc538ecc40,0x7ffc538ecc4c,0x7ffc538ecc582⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1996,i,14740181994558456930,10173494599757756817,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1992 /prefetch:22⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1780,i,14740181994558456930,10173494599757756817,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2224 /prefetch:32⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,14740181994558456930,10173494599757756817,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2448 /prefetch:82⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,14740181994558456930,10173494599757756817,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,14740181994558456930,10173494599757756817,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4564,i,14740181994558456930,10173494599757756817,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4592 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4800,i,14740181994558456930,10173494599757756817,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5c9147c31cd8615f9771006b100adc539
SHA14c1d8f6b9eb51668b6d6119e7493762132de8b56
SHA256cd96cba46e4b490a6bd6aed69df12b9c9bddc0367410b776fd7986e5ecb50b14
SHA512f970cfac8e0cb7f2416ed9cf99cdbbd22d16ecdff580cc463956c23a2fbb94f8bf9595a42c55fc276e76a49f80bceab2c4cb919d421a98e229e40bef85d887f1
-
Filesize
962B
MD5c8a0dd3f5b40aa56506b52c35c3f6c8a
SHA15138d5add7932fc118132aefd511af3168aee9db
SHA2560d6fb1fdd2b172fed3f4f81dfc255f699db22a8dd9231a57ed1faf70cac47e68
SHA512945364badb14d9f7c82c8cb17e1b4b0acf643f73f8d26e4a51c765c93f17b02d5827b08ebf858f80c3c5aa91485d6a3225ae69cd1f2ad0af5f8a9aa10c99079f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5087a259ce0dd177fc5dabb8f5f4c3e2a
SHA1e0bfc7dec924a62543d8d106823b10ced1944bac
SHA256999df834ae73c551a87c525093b785dbfb21e1989353b022db6e00cda4fb8f31
SHA5120a45c73a5b918d04f169cd439f42030fe255c05c1336b320cc3fd3f5cf614c61362092e69c240f515c430d660bc777730d2eae24c2ff6ea19ec85d47abdfe5fd
-
Filesize
9KB
MD5831532ff75eb8b0223736455cedc0d3e
SHA1aa8ea031e77bcd847e8bb04b0a471f4cdbfd9201
SHA25642c90a44cce2f8b4ec51cd077c51cce96c381a678e4624de92cf1fa209d25dba
SHA51242fcfac3578932005d69e81aff0a9a5c0e24a45edf3dda6efa8ec75cb7102d9de22e5f627608cd74ed4dc7e1f472df9f2ea07b774e2fe35059807b9aef681fc3
-
Filesize
9KB
MD555d9c5c6b0a1c0c28b2409b828379c3f
SHA1cd7b2a754a4535b49bfb1631d59cf08dc1de06d9
SHA25661760b9164a00b76aa42e589a2c8966c924ea290e7b6e526f6e1b13215b13060
SHA512ea4b276e8d67d3e15dd4ef44b93d66ac0d57ea89056ee3f9d53d308e6de8860f9330e6782d7d24b2305daa5f8b1ba7710be509a5b4050a288435153e60549f11
-
Filesize
9KB
MD5ce83389a146144b6cb7bc8e2e454e653
SHA1d59f0f910c4272093e5d51db99481be68a2e76a0
SHA25694c5a5038b696d36f0c39cee0a2d7020716db46bf4383e4ac3ea77e5ba5a460d
SHA512debf547e3422c07e1b69f1b7e50ccf4259c2e4f621e95c72085da11047404da317f492b03c326587ae67f9cbf68f484ce909f04c79ec6db91ce6ee7dcf866dd8
-
Filesize
9KB
MD51d2a96fd7b7c7d9fb81b5a3b4d11e870
SHA18da16be900c4b2d4c24fb1139bbcabee4dcda907
SHA256d831a9bae067b554b6b7902c48578fcb936e8e0429c113dbc8a23fa488dcc38f
SHA5125126b89386dd4a980e07210e5d2507e2854875e2ab46649f3fb663d458d1f9901adeb8bc1e75483920c7e9fd42e6fc6b35c0b1b7629ea503c35b9968a1530332
-
Filesize
99KB
MD5bf5c14fa36e4b3dbcbdc6bc66a43df2e
SHA1fff89f1654084a2469719be895e531bac5a14816
SHA256d92718a60a058c4cd808593b7e7d37f0f0332faaeb169b42955e2cd640a148e4
SHA512059f233c85e180a29dc758849acfde3058b19fc78d50cb116647c7792892f93b9af4503de64c3f3b6169f20df9c76925260de3083f20c869a53156bc2d12cf78
-
Filesize
99KB
MD51a7e19c35abf1bb73b440cf3bde542f4
SHA121e64ba964c06e2cdaa23465baf4cbaeba800215
SHA256e795a2beebb91139388e73771813de8e26f106577939f39671dcb62b6eedbb73
SHA512f5463d3b28d3ed56f0ab2bf2beebfc2498173df5d195e30179c7854691dfbbcb94c0ecbbc7f81fd5d905660ff87f08c795bcf55f726136d6f957fe11d349cfb7