Analysis
-
max time kernel
61s -
max time network
62s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/12/2024, 22:39
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://ingreem-eilish.biz/api
Signatures
-
Lumma family
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE 4 IoCs
pid Process 4928 Loader V2.exe 3288 Loader.exe 3532 Loader.exe 4176 Loader V2.exe -
Loads dropped DLL 4 IoCs
pid Process 4928 Loader V2.exe 3288 Loader.exe 3532 Loader.exe 4176 Loader V2.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4928 set thread context of 3200 4928 Loader V2.exe 105 PID 3288 set thread context of 4152 3288 Loader.exe 111 PID 3532 set thread context of 4720 3532 Loader.exe 114 PID 4176 set thread context of 1004 4176 Loader V2.exe 117 -
Program crash 2 IoCs
pid pid_target Process procid_target 2504 4928 WerFault.exe 101 436 4176 WerFault.exe 115 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader V2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader V2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Roblox Executor V2.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1568 msedge.exe 1568 msedge.exe 3676 msedge.exe 3676 msedge.exe 3856 identity_helper.exe 3856 identity_helper.exe 2288 msedge.exe 2288 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1152 7zG.exe Token: 35 1152 7zG.exe Token: SeSecurityPrivilege 1152 7zG.exe Token: SeSecurityPrivilege 1152 7zG.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 1152 7zG.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3676 wrote to memory of 2620 3676 msedge.exe 77 PID 3676 wrote to memory of 2620 3676 msedge.exe 77 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 4116 3676 msedge.exe 78 PID 3676 wrote to memory of 1568 3676 msedge.exe 79 PID 3676 wrote to memory of 1568 3676 msedge.exe 79 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80 PID 3676 wrote to memory of 3100 3676 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.mediafire.com/folder/0s4l0ql101w6f/ROBLOX+EXECUTOR1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe42a13cb8,0x7ffe42a13cc8,0x7ffe42a13cd82⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6728 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6488 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7140 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7256 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7328 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7104 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1892,13706329229414747212,2451155296584920215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6980 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4408
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4596
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Roblox Executor V2\" -ad -an -ai#7zMap23124:98:7zEvent185081⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1152
-
C:\Users\Admin\Downloads\Roblox Executor V2\Roblox Executor\Loader V2.exe"C:\Users\Admin\Downloads\Roblox Executor V2\Roblox Executor\Loader V2.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 10762⤵
- Program crash
PID:2504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4928 -ip 49281⤵PID:860
-
C:\Users\Admin\Downloads\Roblox Executor V2\Roblox Executor\Loader.exe"C:\Users\Admin\Downloads\Roblox Executor V2\Roblox Executor\Loader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4152
-
-
C:\Users\Admin\Downloads\Roblox Executor V2\Roblox Executor\Loader.exe"C:\Users\Admin\Downloads\Roblox Executor V2\Roblox Executor\Loader.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4720
-
-
C:\Users\Admin\Downloads\Roblox Executor V2\Roblox Executor\Loader V2.exe"C:\Users\Admin\Downloads\Roblox Executor V2\Roblox Executor\Loader V2.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4176 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 10482⤵
- Program crash
PID:436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4176 -ip 41761⤵PID:1152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7145ec3fa29a4f2df900d1418974538
SHA11368d579635ba1a53d7af0ed89bf0b001f149f9d
SHA256efc56eb46cf3352bf706c0309d5d740bca6ac06142f9bdc5e8344b81d4d83d59
SHA5125bb663ede88f8b7c96b09c1214aac68eda99bc09525ac383baa96914ff7d553ea1aed09e3c9d16893d791c81ddb164c682dfbb4759ac0bc751221f3e36558a91
-
Filesize
152B
MD5d91478312beae099b8ed57e547611ba2
SHA14b927559aedbde267a6193e3e480fb18e75c43d7
SHA256df43cd7779d9fc91fd0416155d6771bc81565e98be38689cb17caece256bf043
SHA5124086c4ebe410a37d0124fc8bd00c58775e70ab2b7b5a39b4e49b332ce5b4866c6775707436395467aff9596507c96fb4896f3bf0249c5b9c99a927f31dcc1a96
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5bb4794b7779cd5dcfdf8d7cb84c74ce3
SHA1fd9fbd596c4ddffa44f40f2307e77141176b9f7c
SHA2568861f64870c204c6d28a95727cc643c7ca9d6b29a391cef3d09b5b1ab52bff6c
SHA51255eef339be849767dae887cd986d9cc255638893b5e9d6e78fafb06004bef0d49fa4dd5c0dd4b5fdb7dd4e976e8e0c6aa36843c1f59bbcc1010a58e37042a9bf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD515b7efbc23ce8745952c1067bda14d19
SHA185e29f48cc8f7d64b5d3ff1e6fcfe11bae3b8ee2
SHA2560b7f73057fe92cff0828dbb6d52233f798bdd360f95a82416845068ff66e1627
SHA512f0a5c0b1488ebe6660b14d9b18c1219b42eb91dec252adf9cd82b78f054176301e2c27dc4dcf7c414466345632960f0fd58f3617893a37b3b63a5f1e81b6b91b
-
Filesize
7KB
MD54fcdc1066c80671c8724411a83307510
SHA14bfe27f37506e6f3f048dea15e7e4f1b1da6429a
SHA2569d5c48af8aad4fcaa7347975a01c84f745bd1b9b3b60ee7b1fc719915a9acf43
SHA5120f7f8e3cf69b84cd5b81448ac7fa0706a63e5d6d3c5ed65649162a0a6b00fcc8c941711fef41994669ea83b617dc53b5203863efd6d37cc1b47af27e88e6069a
-
Filesize
5KB
MD5fecd2a4a23b55b5fa0c3307795fb813c
SHA17b46febce380844759f9eec43109a09321678deb
SHA256ed793d24ae0a87d0180cc639cce59a078baff65bda98736c426d61c4e6939dbd
SHA5120b23088ad1b2a8656c74122b66a9fd4b35643f57c5c67ec73145740b7b8b2a35c0161c4286e490b2daa6236ee4050e9cde9887c963d636c2e786abbc16f6a6b0
-
Filesize
8KB
MD56230c47c883fe9e6c31dbd8d1448cf30
SHA1bb3d961d67397df8d48349541e98d6b32856a381
SHA256020be5b5a433fd50a304e9671394a2cb2be46313d50bc3f666823f45ce408b6c
SHA512b5327f63f2631cba607dc761766d490f6e2e9175b253be271db24cd7e4a95f54c37075aef20b99d1bd3d8df0767c1bbe0b6edeea04fb43380df4dbc5a5f75da1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD518d63066c81e71a78f0aa0668c8ddfcd
SHA1726f444f550efd7d3229f0eb1cc6977634eb6bbd
SHA256704a1ebf3ee2d9ded186e0757911ef49e19fa10ce8114039acbb14348f885b37
SHA512282f47b8f0f6c2f332f37a09acabf0f06d72fa41f39a928f5c21c798318ce7eaa225c5ce646ce4a1ed385eb05fda7134fc840a4e7c73e9327bec7a18738c2bc6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57fdf7.TMP
Filesize48B
MD5af84adbe6d18449faaf128414847db01
SHA19668bde9c65624a01b6a75267173701072a09a64
SHA256717068ca8ecd8938d8645555040bf70b3561f973340e5ea1f7550bd46e953b7f
SHA5121c02e1e19f646656d560c3b1a0316b48f0f3e21cf001ff352406df1ab247ab3d0f62fe86445be93406a51db4737533789b971ed451504a2bb112a682f9bcea0d
-
Filesize
1KB
MD5510bb993d8edfa606f2c39893c2b8f56
SHA19a363b3827902b3552a7a097576fd18b362f4868
SHA256ed068c568bb7a09aa0b001ba3740d186097db37938e2776518f1d252e4886a96
SHA512105b4a6b188994d6c4fe3bd9e69ee901bc25a46826d2c860c646d449c27cc2bab08134f3a6531d3f55822cac2971f5721f1b04d6ef4698b88245cdf58e055736
-
Filesize
1KB
MD5813d0e9926352c3c62bb94bc8c3dac0d
SHA14d50dc25fa83782ef048d07b7aac9ed95a4be30b
SHA256d855aa7dd743d9dfde0d5c50091cf9a3a0636e467f2a4195e56a9d307bcc0ce5
SHA51233e9c69172b4d8560af63136e6ba282161aa9c6a5aa61df659876cbd40c08bada44ff402e7382c44a17be62cecb86f1b986590237dae15518ad62087d3e19a6e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD51c240468619fe31d4a0683ad7d9bdd22
SHA136d8a1f875390751b0ef5ac0eb0bab360f8def09
SHA256f54e393aa49849f94b0336e3803d05147c14e28bdcc2ef2ce477226e2bea81a7
SHA512cc1c98dd65a3e6d31ecc57d211afc332f78490e103266508829c5e7b3ad6cd20fd5abe7125bd878c66627b8c65caf0f9924f6a6a63d175224b7e46d97f947f3a
-
Filesize
10KB
MD5c601bbd8bb9068d07db1ed377970bbbe
SHA1890c2fa9ea86ebf6061adcff10ddd831861b3697
SHA25665711f79305cb6b40a11f5c8a708743d8759887f91dd2826ad6bebebfcf7807d
SHA512836946c5d48d83112a15f4cd2a7aac5023034576cd3ff69ced5f5e89a14fe674a8894f7da75808ee30ac832cb3964d423f1963b02cdfc6f1e00bdc6a33d15386
-
Filesize
446KB
MD571c87db03cd9a9179b9ff14d2268e577
SHA1b8b83a653367daf2c3adaa3d96360beb3daf1ba6
SHA256c29c17ed4f7895c9a0a9b8c9a071886c99440d39a7bde596bc5ebfec0ca9ff66
SHA512902c92f809f40249acb689fc4b50e546f53737a378684fc89f93d9f752a562c58e985f553f29a134caf5f8e9ad8d10b0c25d6029f29df469fd83a973049dd0c8
-
Filesize
434KB
MD5f37d6a7a0114353d68bb6a87e74773cf
SHA147566c0ca1dbf49471696fc8a6393a1e235ad874
SHA25693c98d7f3e72a0ce8d49c9d7fe804c5ce1ae1571f3409739dd06f0ea4523e586
SHA5123457290fefcb326bd61533f8b97f6c6b3cf81365bdfef3db072125a2cb748d80951e1dbdc3bcfc8dca819ea08c8d4c6b6d358aff02e4ec077e269c6ce1248bb0
-
Filesize
17.4MB
MD51b287280f091b6d2cf76531298db003e
SHA18e58d8ceefa3c617f033a23573939e21d0aa1b2f
SHA256a969df55ea873573fc6995af3e6182c9dc1d99dff7541957d035d3b6ebce522b
SHA5123e159973d90e0a8c4fd4dc96cb13d72eb46e102e0c0b6c7a29c20ff6eb3d5242eee90fa9062e6570974420f4d0ab825539dee4e3b16183e41595c0f127922e0c
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
692KB
MD52df93f691b753483e3859a79c06452c9
SHA1f4277dfd88ed91d0c1fba04fa5d2a4df97c4d5d5
SHA2560f87ddcfcdcc1bcf77a2fc462cac52440e084d4563bbe3b4470e199d765ae4ab
SHA5123c8239b987753249fddb1d4294425d4fa55f3079e01330b4d391f0eca4818ada461efd93b7a3a676066aff09b301b01bade52f76a5b31f512b4b19188a660406
-
Filesize
1.9MB
MD5cc88d9e31537af9c88da3866d2183c40
SHA1a4d5c5f80df9b248596eea1bded157fdb518af18
SHA256b20a9b310f78a4df2094bc1d11bfefbc9593e8e8037fa36eea37746c9f45d601
SHA5125e51cf247ec65b9f4132a8134d158348c8513d56101d00fe225c23c731caf0227a00e4484bf26badbfcce9753705f38980dd9093f7c7d7b2a3246e8e5adc2da6
-
Filesize
446KB
MD5688153b47e376415b0768fc1076d05fd
SHA1dd5db86689bec9f174fc20bd03242d9e95dacc7b
SHA256ca71e2a6f536b800f3e0a1841171616ef3a462646621f5c53dfd5486d00f4d61
SHA51269e4fcc11ce6f2d54138279bd018f0840fcbb3db25da7d7099151b32133b5c9ca9ed687d744b3c6a883bb8570306149e1dec98b9d8008620ba18b7300c22d96b