Resubmissions

16/09/2022, 22:30

220916-2e4s8scfcm 6

16/09/2022, 20:20

220916-y4lgeacdcr 6

Analysis

  • max time kernel
    338s
  • max time network
    397s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/09/2022, 20:20

General

  • Target

    roblox.jar

  • Size

    1010KB

  • MD5

    3bbc7277d7d2d55aaf7ba52ecbd7e0a9

  • SHA1

    4c36c69cbc3e02705f9815b4aa3db4d1f163f0b7

  • SHA256

    3de86c34ce7eb40bc54172b7fd3803140744633433231105278b480daf27bf01

  • SHA512

    877ae2c907a84ba2b44f8ac171e0b70a8782759eb9486c936d0f02c4dcd7ce50a7c67dc8c0e8d2c8f4efd095e9f79e20d2a3872b275a56b6b776cc152de4f405

  • SSDEEP

    12288:fu9vibs8gZmCZSY+41Wxwc3yjUxS9+KJ84D8g7BlfseikeBbG3EgWnX0uwBbEp7/:m9v0s/ZvcY7ebxOjD5Te1GUrnlwOpD

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\roblox.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3400
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1663366854913.tmp
      2⤵
      • Views/modifies file attributes
      PID:4520
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1663366854913.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3876
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1663366854913.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:3580
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 448 -p 3720 -ip 3720
    1⤵
      PID:3780
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 3720 -s 772
      1⤵
      • Program crash
      PID:328

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1663366854913.tmp

            Filesize

            1010KB

            MD5

            3bbc7277d7d2d55aaf7ba52ecbd7e0a9

            SHA1

            4c36c69cbc3e02705f9815b4aa3db4d1f163f0b7

            SHA256

            3de86c34ce7eb40bc54172b7fd3803140744633433231105278b480daf27bf01

            SHA512

            877ae2c907a84ba2b44f8ac171e0b70a8782759eb9486c936d0f02c4dcd7ce50a7c67dc8c0e8d2c8f4efd095e9f79e20d2a3872b275a56b6b776cc152de4f405

          • memory/3400-180-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-190-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-206-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-153-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-205-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-157-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-160-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-161-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-164-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-166-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-167-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-168-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-169-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-170-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-171-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-172-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-173-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-174-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-176-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-177-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-181-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-204-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-136-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-182-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-183-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-184-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-185-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-186-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-187-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-188-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-189-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-178-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-191-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-192-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-193-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-194-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-195-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-198-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-199-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-200-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB

          • memory/3400-202-0x00000000032D0000-0x00000000042D0000-memory.dmp

            Filesize

            16.0MB