Analysis

  • max time kernel
    3s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    23/12/2023, 10:45

General

  • Target

    RobloxPlayerLauncher.exe

  • Size

    5.0MB

  • MD5

    dd3229800e3b48a361637aae158c3afb

  • SHA1

    7ae6961a6f2689ced7d90aefe29571c7c70131d3

  • SHA256

    3a67f79e57ecc1b63f5e06cb205cac46e26a5e2451b72bd0963bbde77d3458dd

  • SHA512

    c8f86461ecfbaeec7c3b0c7757dc4c5ed7b9dd23f9680894d4ccd0c6d7e1aa1de05a311e796ab2eb1eae6baac2c859d96904401acd034c6a3fc89d7aa0d04c0f

  • SSDEEP

    98304:8Av6Lf5T1f2k/GPgl/BcIMvSF/g7wCks2nXbLzdR:DMf5TQlggA4jkvXnxR

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RobloxPlayerLauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\RobloxPlayerLauncher.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\AppData\Local\Temp\RobloxPlayerLauncher.exe
      C:\Users\Admin\AppData\Local\Temp\RobloxPlayerLauncher.exe --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://uploads.backtrace.rbx.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=6628c6e0af24a80e41805419fc5e1e0c1ef7ee48 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=0 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x434,0x438,0x43c,0x408,0x444,0xfbb690,0xfbb6a0,0xfbb6b0
      2⤵
        PID:2380

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

      Filesize

      471B

      MD5

      14ee939f82a11f61c4c7f867af879006

      SHA1

      a366063ef80b941e37f22224f06bbc95f25ac179

      SHA256

      3a00054f7a89ff674287e7208502e3822417bdfef630d5f35d47cbafc33061e4

      SHA512

      f02aa5c0e07975dc6b26317633bc93c95dbbae4f5e549a201dab0cc9ca44c8f236535e6f364aba6df362ec2ccb277956dd12bde1ebbf2e4359906f9b976832aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E573CDF4C6D731D56A665145182FD759_3F250154DC11187BFCB0989AB25259B1

      Filesize

      471B

      MD5

      4095d0f0279b313cbd32e6cb6997ba8e

      SHA1

      da8a799c6668b21e8455fd18b396e561f7b0cc30

      SHA256

      df7747a8a22f21565c7f69e8750812746ebcf020216751bd35b64d354f4bac2a

      SHA512

      67f770e2bdccf6426bf027e73e054f18afd056ddfcb65c7e004813915c0f0faa029686840df3533dc134cb721628bacbbd75022edb4e0500b598f400590162ae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      de4f0b79be1a5360d0cd85399adeeacf

      SHA1

      03d8f2ec9a2b6315d4ed9367d49bae0049d005b5

      SHA256

      1cd3f4cec7376ab842e9899a093aa470a67b5f1aac3c1b3fce2eb9a39f94de5b

      SHA512

      56d9ed745f45054a16cf07600b6458a80470180a1be34ef9070ade1fae39f9996393e63fef00b4d99d5515b180e00422a96c6102dd34a5b85eb3e4fc02b4902f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

      Filesize

      400B

      MD5

      0275a63e3f5c75c7b4df7109c931a25a

      SHA1

      8a2a6a2debd018d070e9abb3f4e9712bbb93027c

      SHA256

      7b80824032c796405dcbfea6c2ecdc3886e8fe10ac8eb34ff7d3266ae65b0736

      SHA512

      8c3011b80df074bf7861b81f6688e541ad2a18d607e1ea28f8cac5ccfa0b952103252f566714a3149f0aff18fff9718ad8bdbbb321c0e1779ba66e62073580d4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E573CDF4C6D731D56A665145182FD759_3F250154DC11187BFCB0989AB25259B1

      Filesize

      396B

      MD5

      826904732ff689da031297ed6d510cf0

      SHA1

      3ae6bf70bf066d48af01ce594126604a11424d4e

      SHA256

      2441876c7f72422341433cf47bb9d6c11a19a74ea4db4cf6c1f62c1a053b1aae

      SHA512

      82661bbf95e1157bdcf8b2d03ab14285bf09ca5a1e30037f58e09bc783e7939149959156d1a3aedb81b3b4a60a5b1104c0507dcf690dbe272ca021543cce4bf2

    • C:\Users\Admin\AppData\Local\Temp\Cab3B5B.tmp

      Filesize

      45KB

      MD5

      dc38d629e51926a750b443772d7c8c65

      SHA1

      2868765523e76b2e6706f18ecb665f4631a00d00

      SHA256

      21a98ea45d4ca76fc03cd769b01345da379395b41295e1506644149d0a378883

      SHA512

      beb8198332e8771a0475a925a4b31a8a80df9a04dc889442d1a4e024b1b66709acc3e347d50af1868d5d0c351d489cd454fc2523f752ea9dec56b9a9d6048ef4

    • C:\Users\Admin\AppData\Local\Temp\Tar4B55.tmp

      Filesize

      26KB

      MD5

      e94bb6afcf1dd920ebbc4846484c3111

      SHA1

      353fc7e656123d274ecc53a357df6afd0e93c22d

      SHA256

      44935f598ee44b9bbc7a592e826ae99092cf8cfd9ebb0f62c1752377c4204ac9

      SHA512

      1a9b6edd32dbb6e23d6ca80540a8bc6f68369b672112441712f4902ba627419f92615aade90db18bdb70b4a739da9187134e6b7f3d61b6d327a280b23c46f420