Analysis
-
max time kernel
481s -
max time network
485s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 13:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.roblox.com/home
Resource
win10v2004-20241007-en
General
-
Target
https://www.roblox.com/home
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 3924 msedge.exe 3924 msedge.exe 4024 identity_helper.exe 4024 identity_helper.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 4748 3924 msedge.exe 83 PID 3924 wrote to memory of 4748 3924 msedge.exe 83 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 2752 3924 msedge.exe 84 PID 3924 wrote to memory of 4460 3924 msedge.exe 85 PID 3924 wrote to memory of 4460 3924 msedge.exe 85 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86 PID 3924 wrote to memory of 724 3924 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.roblox.com/home1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc2d446f8,0x7ffcc2d44708,0x7ffcc2d447182⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6149668062935094779,15215016209325235261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,6149668062935094779,15215016209325235261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,6149668062935094779,15215016209325235261,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6149668062935094779,15215016209325235261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6149668062935094779,15215016209325235261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6149668062935094779,15215016209325235261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6149668062935094779,15215016209325235261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4160 /prefetch:82⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6149668062935094779,15215016209325235261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6149668062935094779,15215016209325235261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6149668062935094779,15215016209325235261,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6149668062935094779,15215016209325235261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6149668062935094779,15215016209325235261,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6149668062935094779,15215016209325235261,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3544 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD575c737270e46e01ddfef0d933cd7e8a6
SHA13d8d3b567781660d9f12f6cad131ae15267da39f
SHA256ef32bb6ebcef685ae628fa77ce5037ccc9664d0485fa175ae10e0f1d9b9028e9
SHA51215e5996c9aa68b3e73f609545c256d60e6385b47bc72b8aa61bf4014f8d76a90243e18e776e9b3607eaee0b371c149dbcfe2cd7c3c2d3bb4f526e2533a01c29a
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5c55ff0f3d1cedb2db404d4bc46279c17
SHA1bba203c32c83f14e0833939ed3db5c039a1cc13b
SHA256d6437e1ff8169a23de2eacb53232cbab8582739f1815d2283366b3eae03c7d33
SHA51297a905b125b3e3a3cf9fe6ef0ec1a1159e23296c2661f93898d2ed86415f13449fac576842e09c67059f9106debc426abe52115ce1589cb2045b1e3e68408407
-
Filesize
689B
MD5b9b5c8b760dc6db0b5a7b1d62b2a36c2
SHA114b779ef296d1a1e1b31db915885a99bde856fe5
SHA2567cbfa8bc9ba35552d925b29df450b76fb94cc45f6815f8f5bfc493b1570f7b2c
SHA512fe6ae2ebcd56df523bf8395bd20b62c57bf8ff780a86acbf16427b7ee69195ef7c68b706125aa08292c47e2590b170f473a79115d832bd2d9bded3c273e003b0
-
Filesize
5KB
MD5ca5b1a9ce7649210912012c162ee3780
SHA154afaf3a891e64c3ac4f1419cc09581b91c669f0
SHA25699ffa240a556e0293d96aacf89e717c275f4d7cf32198f82a9d94f86ee6f08b8
SHA512442e31b614b9d10a9ed152c0f24adb4db55b62d6bbaeb1078e4d46d3055d3b1053dfa05e3499ff422c4f5215a8f6c926573c43826e2d4401bbdad8831d80cbf6
-
Filesize
6KB
MD5773eb42c5eea8a85347bf5e9103ffd10
SHA1d939cd929d848eca5e4a43c8a445fdbcfcf7a1a8
SHA25679063f17f3d10cbae309830a2d77817e75b52d29823beb6254d45f0cd7ba36ab
SHA5127de60c149a630582b0f2ed3c885446786194c33d2cb5b3bda16477659b5612b980443d28df3843befaf56e7fef9313e5ad9c667017bdc10ee8c90b1673aad194
-
Filesize
1KB
MD5304d353a98123ed51c1fa906ab76de27
SHA172735c9ad96b8c30f862c7760db00c29755f987f
SHA25607fb70740439ab72c649da2a149291a922270839c50f4879fccaebe2fefb2bcc
SHA5121df9f3f7463457f7a85f99ed219f95b6daca44a7c22d98b87f754fd1d8a9cf90cfc4bdc0720396bd23fa87f13ac3e3ea85d08b2d50326a82feec7f9c435ca83e
-
Filesize
1KB
MD595f8dffc5bc6180f79c7b94784b9e2cd
SHA14a1637e6c07932aeb258b27a46808069683ca711
SHA2569d5986a45ecc52f83c9f85946e1d38f4131090349ad3a028b1b277dd340119fe
SHA51201b448d5be71b3f467d022717efcfed99d83e9105eb210d66a7381b59e50e717b9afd6a67cb47b88898f57c81f4a08507a020957b99eaf474a31097624f745ca
-
Filesize
1KB
MD5e024931519a098217f1841a224a70513
SHA1dd79e1be4970a5145d512b2607743c9ec5c19d56
SHA25663ce543c1a0871f944b3afb3044552a2abebe44baa9a0e0e1d282c93f8fd9d96
SHA5125ff2acbca086cda51ccae0788b5fecf85da48154a4e8b194242739e297cdc927e7a5d2d9b4aa99b3214f82a9206e09e35fe698eb4083b39765aa8afc4f6a0587
-
Filesize
1KB
MD5fc11d3ef4a82ca3be911c864752445c2
SHA17312fa4dded8f6570dac0ca358ad3779e10d7465
SHA256b856fb803247c7efb06468f6ab810bb1d2b08a7123e7c5da266ca6e98d6b660f
SHA512bc19b257ef4b73df3c8898b732ff19601d1ada242c27b4b21a6ab1a40a870c258038a7d9bd86e05f5d469fe71a6daf495160a9e6425a1659e9e4c3cd75f84008
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389