Overview
overview
7Static
static
70.4.2.8/RobloxApp.exe
windows11-21h2-x64
70.4.2.8/Ro...xy.dll
windows11-21h2-x64
10.4.2.8/SciLexer.dll
windows11-21h2-x64
30.4.2.8/fmodex.dll
windows11-21h2-x64
70.4.2.8/rgdx.dll
windows11-21h2-x64
30.4.2.8/rggl.dll
windows11-21h2-x64
30.4.2.8/rgmain.dll
windows11-21h2-x64
30.4.2.8/rgpar.dll
windows11-21h2-x64
3Analysis
-
max time kernel
86s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/03/2024, 13:35
Behavioral task
behavioral1
Sample
0.4.2.8/RobloxApp.exe
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
0.4.2.8/RobloxProxy.dll
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
0.4.2.8/SciLexer.dll
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
0.4.2.8/fmodex.dll
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
0.4.2.8/rgdx.dll
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
0.4.2.8/rggl.dll
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
0.4.2.8/rgmain.dll
Resource
win11-20240221-en
Behavioral task
behavioral8
Sample
0.4.2.8/rgpar.dll
Resource
win11-20240221-en
General
-
Target
0.4.2.8/rggl.dll
-
Size
523KB
-
MD5
dd03259bd8961579aa0c25c74e3a9108
-
SHA1
abc40e479b093b9c63d0133cdb77f3b9765e232c
-
SHA256
9f58153a7ebb8c2c85abf63bc26d7c8f8a6ea010dac55ce8c778faa3279d1956
-
SHA512
c727cdc1766eda697810ad10efab388e55ee3fc7cd74ab9daf68af880cfe6c6cc1a600c2d25b1f7ce18a18dfab41bd6b0e8ebe2ef5aa2af5ebada0a5d8298a28
-
SSDEEP
12288:T/RxzPKu27zaAZBp+8YzcRM1+78rgnfkiKrEIlxgBvTAipoz:C7DCeM07fnfVIlxgBvUcoz
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2752 4108 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1612 wrote to memory of 4108 1612 rundll32.exe 81 PID 1612 wrote to memory of 4108 1612 rundll32.exe 81 PID 1612 wrote to memory of 4108 1612 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0.4.2.8\rggl.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0.4.2.8\rggl.dll,#12⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 4883⤵
- Program crash
PID:2752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 4108 -ip 41081⤵PID:3436