Analysis

  • max time kernel
    56s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    31/03/2023, 23:05

General

  • Target

    Roblox_Cheat_FR.exe

  • Size

    18.8MB

  • MD5

    fe21005d7719639712fd6fbb40d01211

  • SHA1

    18ec5cf41567d15e96d3494debd02dfb86fcb750

  • SHA256

    fd2ff83049de09f54fbe49d72d1bcd0eb0c66b90c02874336c97075622ad5662

  • SHA512

    d729284691fea7476eb60ab9f11e8155e01118250ebfcd7a020b64ba687092465e35a4421f7b8b0ae136caef73f58fe6e42aa96fe39f611595a514aab5dd9e42

  • SSDEEP

    393216:ptu7L/quanSyY+k4tO2dQuslN/m3pDl9AJ4ZoWOv+9fPV4aeLq8PS3kM5u:XCLS/Y4tndQu4KRS4ZorvS3wLq8K3kMY

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb849758,0x7fefb849768,0x7fefb849778
      2⤵
        PID:1996
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1240,i,17518160854047189276,16542067409543074346,131072 /prefetch:2
        2⤵
          PID:1956
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1544 --field-trial-handle=1240,i,17518160854047189276,16542067409543074346,131072 /prefetch:8
          2⤵
            PID:520
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1672 --field-trial-handle=1240,i,17518160854047189276,16542067409543074346,131072 /prefetch:8
            2⤵
              PID:1240
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2228 --field-trial-handle=1240,i,17518160854047189276,16542067409543074346,131072 /prefetch:1
              2⤵
                PID:1152
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1240,i,17518160854047189276,16542067409543074346,131072 /prefetch:1
                2⤵
                  PID:1656
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1416 --field-trial-handle=1240,i,17518160854047189276,16542067409543074346,131072 /prefetch:2
                  2⤵
                    PID:1600
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1508 --field-trial-handle=1240,i,17518160854047189276,16542067409543074346,131072 /prefetch:1
                    2⤵
                      PID:1820
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3904 --field-trial-handle=1240,i,17518160854047189276,16542067409543074346,131072 /prefetch:8
                      2⤵
                        PID:2060
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3908 --field-trial-handle=1240,i,17518160854047189276,16542067409543074346,131072 /prefetch:8
                        2⤵
                          PID:2100
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4004 --field-trial-handle=1240,i,17518160854047189276,16542067409543074346,131072 /prefetch:8
                          2⤵
                            PID:2744
                        • C:\Users\Admin\AppData\Local\Temp\Roblox_Cheat_FR.exe
                          "C:\Users\Admin\AppData\Local\Temp\Roblox_Cheat_FR.exe"
                          1⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1936
                          • C:\Users\Admin\AppData\Local\Temp\Roblox_Cheat_FR.exe
                            "C:\Users\Admin\AppData\Local\Temp\Roblox_Cheat_FR.exe"
                            2⤵
                            • Loads dropped DLL
                            PID:528
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:1916
                          • C:\Windows\explorer.exe
                            "C:\Windows\explorer.exe"
                            1⤵
                              PID:2228
                            • C:\Windows\system32\AUDIODG.EXE
                              C:\Windows\system32\AUDIODG.EXE 0x2f4
                              1⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2328

                            Network

                                  MITRE ATT&CK Enterprise v6

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\CURRENT~RF6e4348.TMP

                                    Filesize

                                    16B

                                    MD5

                                    46295cac801e5d4857d09837238a6394

                                    SHA1

                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                    SHA256

                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                    SHA512

                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000004.dbtmp

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    4KB

                                    MD5

                                    44c0557b5e91506dbe7c3a3c003ca9ae

                                    SHA1

                                    67fc3831705d1a42783863f551409f5d508fc579

                                    SHA256

                                    b3d516764afffe4c762d6bb1ef278f59810cc2f208195f81d16f628a87a40035

                                    SHA512

                                    5fc31de63803c1b7bbeb1f1e8c40e7aa4928e007a44d1be8ba5c81b661c199dba6f5536a839f22b9f001a84b3e6ac7fd3f331985048f0bfce60d44395b574a41

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\be785b6a-5403-490a-b156-694499f50a6c.tmp

                                    Filesize

                                    4KB

                                    MD5

                                    f356c3d2847a78d8e3e36148ca473fb0

                                    SHA1

                                    071b58db0233cdd5882821e213e66bc88b791671

                                    SHA256

                                    feaf69c2320c48d4cebaa79df406433628cbe333387c31d77c1ded3a6e058638

                                    SHA512

                                    2678f4c14e5694dfd1135505634d4bf91f6ea7a9efb70f654e06e1dd5a9069865e13f8b48930910bca609254ecf68049758e8a8048c8b0f69156a2453df15fed

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d4462b7d-fcb9-4d7f-8da4-af4eef979b24.tmp

                                    Filesize

                                    4KB

                                    MD5

                                    7c1e612ca17c7fb8b48dd80d38b4305a

                                    SHA1

                                    985d0f6af3b07a170cc5a4b277d50886b58dd19d

                                    SHA256

                                    d3f3650d141cc1d032131075fa46b2e58d0816d6a5251f748c39e6b086c64c74

                                    SHA512

                                    d15bbe2e32cca45dbc11f08a391dd926c087b48728a958719027f09b9977baa8364df5b11b5f1e7024d65c1d04c4c11716dec061fcd49cf45c158bac19110cba

                                  • C:\Users\Admin\AppData\Local\Temp\_MEI19362\python310.dll

                                    Filesize

                                    4.3MB

                                    MD5

                                    deaf0c0cc3369363b800d2e8e756a402

                                    SHA1

                                    3085778735dd8badad4e39df688139f4eed5f954

                                    SHA256

                                    156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d

                                    SHA512

                                    5cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989

                                  • \Users\Admin\AppData\Local\Temp\_MEI19362\python310.dll

                                    Filesize

                                    4.3MB

                                    MD5

                                    deaf0c0cc3369363b800d2e8e756a402

                                    SHA1

                                    3085778735dd8badad4e39df688139f4eed5f954

                                    SHA256

                                    156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d

                                    SHA512

                                    5cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989