Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
Roblox Exe...nu.dll
windows7-x64
1Roblox Exe...nu.dll
windows10-2004-x64
1Roblox Exe...nk.dll
windows7-x64
1Roblox Exe...nk.dll
windows10-2004-x64
1Roblox Exe...or.exe
windows7-x64
10Roblox Exe...or.exe
windows10-2004-x64
10Roblox Exe...up.dll
windows7-x64
1Roblox Exe...up.dll
windows10-2004-x64
1Roblox Exe...her.js
windows7-x64
1Roblox Exe...her.js
windows10-2004-x64
1Roblox Exe...x.html
windows7-x64
1Roblox Exe...x.html
windows10-2004-x64
1Roblox Exe...ent.js
windows7-x64
1Roblox Exe...ent.js
windows10-2004-x64
1Roblox Exe...ent.js
windows7-x64
1Roblox Exe...ent.js
windows10-2004-x64
1Roblox Exe...ris.js
windows7-x64
1Roblox Exe...ris.js
windows10-2004-x64
1Roblox Exe...x.html
windows7-x64
1Roblox Exe...x.html
windows10-2004-x64
1Roblox Exe...nit.js
windows7-x64
1Roblox Exe...nit.js
windows10-2004-x64
1Roblox Exe...ins.js
windows7-x64
1Roblox Exe...ins.js
windows10-2004-x64
1Roblox Exe...ant.js
windows7-x64
1Roblox Exe...ant.js
windows10-2004-x64
1Roblox Exe...ion.js
windows7-x64
1Roblox Exe...ion.js
windows10-2004-x64
1Roblox Exe...s.json
windows7-x64
3Roblox Exe...s.json
windows10-2004-x64
3Roblox Exe...ic.cfg
windows7-x64
3Roblox Exe...ic.cfg
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
Roblox Executor/Colorful.Menu.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Roblox Executor/Colorful.Menu.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Roblox Executor/DirectInk.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Roblox Executor/DirectInk.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Roblox Executor/Injector.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Roblox Executor/Injector.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Roblox Executor/Setup.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Roblox Executor/Setup.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Roblox Executor/WebResources/Resource0/app1/dc-app-launcher.js
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
Roblox Executor/WebResources/Resource0/app1/dc-app-launcher.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
Roblox Executor/WebResources/Resource0/app1/index.html
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
Roblox Executor/WebResources/Resource0/app1/index.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
Roblox Executor/WebResources/Resource0/appmeasurement/prod/appmeasurement.js
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
Roblox Executor/WebResources/Resource0/appmeasurement/prod/appmeasurement.js
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
Roblox Executor/WebResources/Resource0/appmeasurement/stage/appmeasurement.js
Resource
win7-20220901-en
Behavioral task
behavioral16
Sample
Roblox Executor/WebResources/Resource0/appmeasurement/stage/appmeasurement.js
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
Roblox Executor/WebResources/Resource0/base_uris.js
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
Roblox Executor/WebResources/Resource0/base_uris.js
Resource
win10v2004-20220901-en
Behavioral task
behavioral19
Sample
Roblox Executor/WebResources/Resource0/index.html
Resource
win7-20220901-en
Behavioral task
behavioral20
Sample
Roblox Executor/WebResources/Resource0/index.html
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
Roblox Executor/WebResources/Resource0/init.js
Resource
win7-20220901-en
Behavioral task
behavioral22
Sample
Roblox Executor/WebResources/Resource0/init.js
Resource
win10v2004-20220901-en
Behavioral task
behavioral23
Sample
Roblox Executor/WebResources/Resource0/plugins.js
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
Roblox Executor/WebResources/Resource0/plugins.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
Roblox Executor/WebResources/Resource0/variant.js
Resource
win7-20220901-en
Behavioral task
behavioral26
Sample
Roblox Executor/WebResources/Resource0/variant.js
Resource
win10v2004-20220901-en
Behavioral task
behavioral27
Sample
Roblox Executor/WebResources/Resource0/version.js
Resource
win7-20220901-en
Behavioral task
behavioral28
Sample
Roblox Executor/WebResources/Resource0/version.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
Roblox Executor/config/oreexcavation_shapes.json
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
Roblox Executor/config/oreexcavation_shapes.json
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
Roblox Executor/config/rustic.cfg
Resource
win7-20220901-en
Behavioral task
behavioral32
Sample
Roblox Executor/config/rustic.cfg
Resource
win10v2004-20220901-en
General
-
Target
Roblox Executor/Colorful.Menu.dll
-
Size
6.7MB
-
MD5
376c23547c4bc35c9b9ae015cb16f368
-
SHA1
418b83cd910cc3399847d978e6536da8eacacc6c
-
SHA256
d3c8c838f7757536cefc36f03f0bb37fd63f1f12a673015d2abd704d77c90caa
-
SHA512
7ebfb5c663c16bd641216f68d1955a53cad62b3c5e76ca86b6f514a25f91120105ab5e825a63b801858547476292c3a7939a4129f8e346f88a17911dd7cf818b
-
SSDEEP
98304:dpmljOztPrpFa8oUCITCgJJyzXU73NMl0LrUAakOomrRpqqq8A8s0sL7gKI6C/P:Wja1AVJYCzXU7d/clo6jqqq8A/kKUP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1856 chrome.exe 1768 chrome.exe 1768 chrome.exe 2288 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1952 AcroRd32.exe 1952 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1716 1768 chrome.exe 29 PID 1768 wrote to memory of 1716 1768 chrome.exe 29 PID 1768 wrote to memory of 1716 1768 chrome.exe 29 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1604 1768 chrome.exe 30 PID 1768 wrote to memory of 1856 1768 chrome.exe 31 PID 1768 wrote to memory of 1856 1768 chrome.exe 31 PID 1768 wrote to memory of 1856 1768 chrome.exe 31 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32 PID 1768 wrote to memory of 1876 1768 chrome.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Roblox Executor\Colorful.Menu.dll",#11⤵PID:1140
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\RenameMeasure.pdf"1⤵
- Suspicious use of SetWindowsHookEx
PID:1952
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefaff4f50,0x7fefaff4f60,0x7fefaff4f702⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1048,5315239093135972589,18231678896121632263,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1052 /prefetch:22⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1048,5315239093135972589,18231678896121632263,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1048,5315239093135972589,18231678896121632263,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1768 /prefetch:82⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,5315239093135972589,18231678896121632263,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2068 /prefetch:12⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,5315239093135972589,18231678896121632263,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2024 /prefetch:12⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1048,5315239093135972589,18231678896121632263,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1048,5315239093135972589,18231678896121632263,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3308 /prefetch:22⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,5315239093135972589,18231678896121632263,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1048,5315239093135972589,18231678896121632263,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3364 /prefetch:82⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1048,5315239093135972589,18231678896121632263,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3620 /prefetch:82⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1048,5315239093135972589,18231678896121632263,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1492 /prefetch:82⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1048,5315239093135972589,18231678896121632263,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 /prefetch:82⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1048,5315239093135972589,18231678896121632263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-