Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
23-09-2023 22:24
Behavioral task
behavioral1
Sample
ROBLOX.22003.BOOTSTRAPPER.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ROBLOX.22003.BOOTSTRAPPER.exe
Resource
win10v2004-20230915-en
General
-
Target
ROBLOX.22003.BOOTSTRAPPER.exe
-
Size
6.0MB
-
MD5
7a7b01ac954f9ddd0d621f862d1b652b
-
SHA1
a3f22c0cdcb88506cfb791ab62946f134e048796
-
SHA256
21828292a97fd1edd32d901eb26c65682e78651d4339f520b851a2205ca3b9c0
-
SHA512
e0a25ccf80027b1d28c2b7427f3406191db4bf2a935ca2c7e5c65cc80c15b47f7e3da12ff406a6526ff9502ab9401b0adcd59d7e50b3f92757ec76f89e6b5bae
-
SSDEEP
98304:ocEtdFBmamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzDgsRuGK4R2CTjBHOC47uo:orFFeN/FJMIDJf/gsAGK4R2CTjkCiuo
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2160 ROBLOX.22003.BOOTSTRAPPER.exe -
resource yara_rule behavioral1/files/0x000500000001947a-21.dat upx behavioral1/files/0x000500000001947a-22.dat upx behavioral1/memory/2160-23-0x000007FEF5600000-0x000007FEF5A6E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2160 2452 ROBLOX.22003.BOOTSTRAPPER.exe 28 PID 2452 wrote to memory of 2160 2452 ROBLOX.22003.BOOTSTRAPPER.exe 28 PID 2452 wrote to memory of 2160 2452 ROBLOX.22003.BOOTSTRAPPER.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ROBLOX.22003.BOOTSTRAPPER.exe"C:\Users\Admin\AppData\Local\Temp\ROBLOX.22003.BOOTSTRAPPER.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\ROBLOX.22003.BOOTSTRAPPER.exe"C:\Users\Admin\AppData\Local\Temp\ROBLOX.22003.BOOTSTRAPPER.exe"2⤵
- Loads dropped DLL
PID:2160
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee