c:\Users\Ignace\Documents\Visual Studio 2013\Projects\MaterialSkin\MaterialSkin\obj\Debug\MaterialSkin.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Force the Venom/Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
Force the Venom/Bunifu_UI_v1.5.3.dll
Resource
win11-20240214-en
Behavioral task
behavioral3
Sample
Force the Venom/MaterialSkin.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral4
Sample
Force the Venom/MaterialSkin.dll
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
Force the Venom/RobloxPlayerLauncher (1).exe
Resource
win10v2004-20231215-en
General
-
Target
Force_the_Venom.rar
-
Size
547KB
-
MD5
c3a7c81a50466de586466955ff0ab956
-
SHA1
a5b6609027e8b114906cfc9d366f247681dfad9d
-
SHA256
b458972bfeeb83c9dbc3bcdf304e4e536869e253b78fcf68659cd606b3ad8b68
-
SHA512
8e413786af91908369ff932c1486797cacf74fbe18c93b2767504e92dd4cdd5ec113b96fbb416aefb34ad2f4a5612462fd9e1b2c791c04adfedb6311c33ef325
-
SSDEEP
12288:wBwPbnEDPGSFpSTuTEjdTA1bpfQqar64Rj6qkpE3FrLA:UwPbnEDRRAjdTsbpfQ423FrLA
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Force the Venom/Bunifu_UI_v1.5.3.dll unpack001/Force the Venom/MaterialSkin.dll
Files
-
Force_the_Venom.rar.rar
-
Force the Venom/Bunifu_UI_v1.5.3.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Force the Venom/MaterialSkin.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 572KB - Virtual size: 571KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Force the Venom/RobloxPlayerLauncher (1).exe.exe windows:5 windows x86 arch:x86
73f9f543528e94c078c657db3c4cf7d1
Code Sign
7e:93:eb:fb:7c:c6:4e:59:ea:4b:9a:77:d4:06:fc:3bCertificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before21-12-2012 00:00Not After30-12-2020 23:59SubjectCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
0e:cf:f4:38:c8:fe:bf:35:6e:04:d8:6a:98:1b:1a:50Certificate
IssuerCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USNot Before18-10-2012 00:00Not After29-12-2020 23:59SubjectCN=Symantec Time Stamping Services Signer - G4,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
19:1a:32:cb:75:9c:97:b8:cf:ac:11:8d:d5:12:7f:49Certificate
IssuerCN=VeriSign Class 3 Public Primary Certification Authority - G5,OU=VeriSign Trust Network+OU=(c) 2006 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before04-03-2014 00:00Not After03-03-2024 23:59SubjectCN=Symantec Class 3 Extended Validation Code Signing CA - G2,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
07:14:f2:cf:6d:87:1e:01:9a:b0:8d:5c:a4:85:46:57Certificate
IssuerCN=Symantec Class 3 Extended Validation Code Signing CA - G2,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before25-10-2016 00:00Not After25-10-2019 23:59SubjectSERIALNUMBER=3780902,CN=Roblox Corporation,O=Roblox Corporation,L=San Mateo,ST=California,C=US,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.1=#130953616e204d6174656f,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
1f:ef:c7:2c:63:a3:8b:ec:10:f3:84:18:1b:4e:d7:0d:d7:c6:e0:baSigner
Actual PE Digest1f:ef:c7:2c:63:a3:8b:ec:10:f3:84:18:1b:4e:d7:0d:d7:c6:e0:baDigest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\BuildAgent\work\e77fbecb0443eb4\build.msvc\Win32\Installer-Release\BootstrapperClient\RobloxPlayerLauncher.pdb
Imports
kernel32
DeleteCriticalSection
RaiseException
DecodePointer
CreateEventA
WideCharToMultiByte
MultiByteToWideChar
DeleteFileW
GetModuleHandleW
OpenEventW
CreateEventW
CreateMutexW
lstrcmpW
CloseHandle
WaitForSingleObject
ReleaseMutex
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetLastError
GetProcessHeap
HeapSize
WriteConsoleW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetEndOfFile
SetStdHandle
FlushFileBuffers
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetACP
GetStdHandle
ExitProcess
SetFilePointerEx
GetFileType
ReadFile
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
HeapFree
HeapReAlloc
HeapAlloc
GetCommandLineW
GetCommandLineA
LoadLibraryExW
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
EncodePointer
OutputDebugStringW
HeapDestroy
GetProcAddress
LocalFree
FormatMessageA
LockResource
FreeLibrary
LoadResource
SizeofResource
LoadLibraryW
FindResourceW
FindResourceExW
CreateDirectoryW
CreateFileW
GetFileAttributesW
GetVersionExW
GetCurrentThreadId
FindClose
FormatMessageW
FindFirstFileW
FindNextFileW
CopyFileW
GetSystemTime
GetTempPathW
WaitForSingleObjectEx
VerSetConditionMask
InterlockedIncrement
InterlockedDecrement
OpenProcess
GetCurrentProcess
TerminateProcess
GetCurrentThread
Sleep
GetLocalTime
CompareFileTime
GetTickCount
MapViewOfFile
UnmapViewOfFile
lstrlenW
CreateFileMappingW
GetModuleFileNameW
CreateProcessW
GetDiskFreeSpaceExW
RemoveDirectoryW
SetFileAttributesW
VerifyVersionInfoW
GetGeoInfoW
GetUserGeoID
GetSystemTimeAsFileTime
CreateSemaphoreA
ReleaseSemaphore
DuplicateHandle
GetModuleHandleA
InterlockedExchange
InterlockedExchangeAdd
InterlockedCompareExchange
TerminateThread
SetLastError
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
QueueUserAPC
EnterCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SleepEx
SetWaitableTimer
GetShortPathNameW
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
SystemTimeToFileTime
FileTimeToSystemTime
QueryPerformanceCounter
QueryPerformanceFrequency
OpenEventA
WaitForMultipleObjectsEx
GetCurrentProcessId
ResumeThread
CreateWaitableTimerW
GetFileSizeEx
GetFileAttributesExW
GetExitCodeProcess
WriteFile
GetFileTime
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
lstrcmpiW
lstrcpyW
lstrcatW
IsDebuggerPresent
user32
GetParent
GetWindowLongW
GetWindowRect
InvalidateRect
ShowWindow
CreateWindowExW
CallWindowProcW
DefWindowProcW
SendMessageW
MessageBoxA
AllowSetForegroundWindow
CharNextW
CharUpperW
SetWindowLongW
KillTimer
GetWindowTextW
SetForegroundWindow
IsWindowVisible
PostMessageW
LoadBitmapW
LoadIconW
FillRect
EndPaint
BeginPaint
ReleaseDC
GetDC
GetSystemMetrics
GetMessageW
TranslateMessage
DispatchMessageW
PostThreadMessageW
SetWindowPos
SetFocus
LoadAcceleratorsW
TranslateAcceleratorW
SetWindowTextW
MessageBoxW
EnumWindows
GetWindowThreadProcessId
PostQuitMessage
EnableWindow
DestroyWindow
GetDlgItem
SetTimer
RegisterClassW
gdi32
GetStockObject
SelectObject
CreatePen
CreateFontW
SetTextColor
GetDeviceCaps
Rectangle
CreateSolidBrush
DeleteObject
SetBkMode
advapi32
CopySid
RegOpenKeyExW
RegCloseKey
GetUserNameW
CheckTokenMembership
RegDeleteKeyW
RegEnumKeyExW
RegEnumValueW
RegFlushKey
RegQueryInfoKeyW
CryptAcquireContextW
RegCreateKeyExW
RegDeleteValueW
RegQueryValueExW
DuplicateToken
OpenProcessToken
OpenThreadToken
IsValidSid
GetSidLengthRequired
InitializeSid
GetSidSubAuthority
GetLengthSid
RegSetValueExW
GetTokenInformation
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
shell32
ShellExecuteW
ShellExecuteExW
CommandLineToArgvW
SHGetFolderPathAndSubDirW
oleaut32
RegisterTypeLi
shlwapi
StrCpyW
StrRChrW
PathFileExistsW
StrCmpNW
SHDeleteKeyW
StrCmpW
StrStrW
PathAddBackslashW
StrDupW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
sensapi
IsNetworkAlive
userenv
UnloadUserProfile
ws2_32
socket
send
htons
freeaddrinfo
getaddrinfo
WSASocketW
WSASend
WSARecv
WSAGetLastError
WSASetLastError
WSACleanup
WSAStartup
setsockopt
select
getsockopt
ioctlsocket
connect
sendto
closesocket
wininet
HttpSendRequestExW
InternetQueryDataAvailable
InternetWriteFile
HttpEndRequestW
HttpSendRequestW
HttpAddRequestHeadersW
InternetOpenW
HttpQueryInfoW
InternetSetOptionW
InternetConnectW
InternetCloseHandle
InternetReadFile
HttpOpenRequestW
comctl32
_TrackMouseEvent
InitCommonControlsEx
gdiplus
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateHBITMAPFromBitmap
GdipAlloc
GdipFree
winmm
timeBeginPeriod
timeSetEvent
timeGetDevCaps
timeGetTime
psapi
EnumProcesses
GetProcessImageFileNameW
iphlpapi
GetAdaptersInfo
ole32
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
CoCreateGuid
CoCreateInstance
StringFromGUID2
Sections
.text Size: 453KB - Virtual size: 452KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 169KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ