Analysis
-
max time kernel
338s -
max time network
397s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16/09/2022, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
roblox.jar
Resource
win10v2004-20220812-en
General
-
Target
roblox.jar
-
Size
1010KB
-
MD5
3bbc7277d7d2d55aaf7ba52ecbd7e0a9
-
SHA1
4c36c69cbc3e02705f9815b4aa3db4d1f163f0b7
-
SHA256
3de86c34ce7eb40bc54172b7fd3803140744633433231105278b480daf27bf01
-
SHA512
877ae2c907a84ba2b44f8ac171e0b70a8782759eb9486c936d0f02c4dcd7ce50a7c67dc8c0e8d2c8f4efd095e9f79e20d2a3872b275a56b6b776cc152de4f405
-
SSDEEP
12288:fu9vibs8gZmCZSY+41Wxwc3yjUxS9+KJ84D8g7BlfseikeBbG3EgWnX0uwBbEp7/:m9v0s/ZvcY7ebxOjD5Te1GUrnlwOpD
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre1.8.0_66\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1663366854913.tmp" reg.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 328 3720 WerFault.exe 32 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3400 java.exe 3400 java.exe 3400 java.exe 3400 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3400 wrote to memory of 4520 3400 java.exe 84 PID 3400 wrote to memory of 4520 3400 java.exe 84 PID 3400 wrote to memory of 3876 3400 java.exe 86 PID 3400 wrote to memory of 3876 3400 java.exe 86 PID 3876 wrote to memory of 3580 3876 cmd.exe 88 PID 3876 wrote to memory of 3580 3876 cmd.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4520 attrib.exe
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\roblox.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1663366854913.tmp2⤵
- Views/modifies file attributes
PID:4520
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1663366854913.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1663366854913.tmp" /f3⤵
- Adds Run key to start application
PID:3580
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 448 -p 3720 -ip 37201⤵PID:3780
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3720 -s 7721⤵
- Program crash
PID:328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1010KB
MD53bbc7277d7d2d55aaf7ba52ecbd7e0a9
SHA14c36c69cbc3e02705f9815b4aa3db4d1f163f0b7
SHA2563de86c34ce7eb40bc54172b7fd3803140744633433231105278b480daf27bf01
SHA512877ae2c907a84ba2b44f8ac171e0b70a8782759eb9486c936d0f02c4dcd7ce50a7c67dc8c0e8d2c8f4efd095e9f79e20d2a3872b275a56b6b776cc152de4f405