Analysis
-
max time kernel
127s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 14:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1289817375746686986/1289960470702329917/www.roblox.com?ex=66fab8ce&is=66f9674e&hm=fae46adb39165a8abd63345ead6c649c57c18172d9cd55c7bd35610724a940ec&
Resource
win10v2004-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1289817375746686986/1289960470702329917/www.roblox.com?ex=66fab8ce&is=66f9674e&hm=fae46adb39165a8abd63345ead6c649c57c18172d9cd55c7bd35610724a940ec&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 8501.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 1672 msedge.exe 1672 msedge.exe 3488 identity_helper.exe 3488 identity_helper.exe 1544 msedge.exe 1544 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 4408 7zFM.exe Token: 35 4408 7zFM.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 4408 7zFM.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 4892 1672 msedge.exe 83 PID 1672 wrote to memory of 4892 1672 msedge.exe 83 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4580 1672 msedge.exe 84 PID 1672 wrote to memory of 4220 1672 msedge.exe 85 PID 1672 wrote to memory of 4220 1672 msedge.exe 85 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86 PID 1672 wrote to memory of 3616 1672 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1289817375746686986/1289960470702329917/www.roblox.com?ex=66fab8ce&is=66f9674e&hm=fae46adb39165a8abd63345ead6c649c57c18172d9cd55c7bd35610724a940ec&1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd15f846f8,0x7ffd15f84708,0x7ffd15f847182⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 /prefetch:82⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6356 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6204 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1828 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,17261840484492300020,15966077281464689889,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5248 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1608
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4416
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\www.roblox.com"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
6KB
MD5ab3d702770f9cc3340ed321961d046fa
SHA1d4667bc56d5a1b193562c2076255a0f46ebadb24
SHA256df46d8122f8b76af90d2238ebdc29c1edad2f5c439e48efd061299ea208052ad
SHA512b90825b0edcb69d4da39314aa8a0d5378eae0f16fa71ecdf541543a95597579a7ff23a37d07c9fef2f65d6651b1e5db543ef416550438118034af3393da017d9
-
Filesize
5KB
MD58a103bb535f7b67ea01852c20091666d
SHA145b8b70f86d454df2316c39bb49e5b5a17edf25f
SHA2568f03859f886463c0380455958dab74fa2dd5bcf0f488e032680991cc837822c4
SHA512c86da5ec1855c2d75bc24541474862c76bb0253478325f806eb2f6baa462d1eba51df3e946ed28480d5d3737487038a249efdbd4998b7a5d7a437840bb671408
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f0c920c83d874cb28e687aa9c06a8c72
SHA1764fcd13f38a27b35ee162a6c996b30ce60b66c3
SHA2562c2ef1fc8fde0538412eb5f05e0de16134b3ce91acb9236aeccdfceb85742e49
SHA5122f77613c4395df4ec8734873a5d30f190ee27a443a65ec8c5e2f775f15c70f6944c2aa05eedf7b0b3fa4c9f7435a5761e47a9c7a9818a6ab94eec46d00a0d0a0
-
Filesize
196KB
MD56c88683f05790a30f45ae4e163e34e3d
SHA1a89c3923007bf758211a9f77e791dcbe567f8c17
SHA25605ffce03c644e01780a76368bd27113c1f4c6ed9a383e5dac10113127187d857
SHA5124ad9bc75d019aab01f883d8d7a62997520a4ea0c2d046c87f8a84aedcc6e434b87239f10c46def47bf370c8716b18ce21436ce29f4bd839ff73bc587f7d5d8e6