Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1Roblox-Mas...in.zip
windows7-x64
1Roblox-Mas...in.zip
windows10-2004-x64
1Roblox-Mas...Ban.py
windows7-x64
3Roblox-Mas...Ban.py
windows10-2004-x64
3Roblox-Mas...DME.md
windows7-x64
3Roblox-Mas...DME.md
windows10-2004-x64
3Roblox-Mas...es.txt
windows7-x64
1Roblox-Mas...es.txt
windows10-2004-x64
1Roblox-Mas...ain.py
windows7-x64
3Roblox-Mas...ain.py
windows10-2004-x64
3Roblox-Mas...xy.txt
windows7-x64
1Roblox-Mas...xy.txt
windows10-2004-x64
1Roblox-Mas...up.bat
windows7-x64
1Roblox-Mas...up.bat
windows10-2004-x64
1Roblox-Mas...ts.txt
windows7-x64
1Roblox-Mas...ts.txt
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/03/2024, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
Roblox-Mass-Report-main.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Roblox-Mass-Report-main.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Roblox-Mass-Report-main/RBXBan.py
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Roblox-Mass-Report-main/RBXBan.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Roblox-Mass-Report-main/README.md
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
Roblox-Mass-Report-main/README.md
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Roblox-Mass-Report-main/cookies.txt
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Roblox-Mass-Report-main/cookies.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Roblox-Mass-Report-main/main.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Roblox-Mass-Report-main/main.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Roblox-Mass-Report-main/proxy.txt
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Roblox-Mass-Report-main/proxy.txt
Resource
win10v2004-20240319-en
Behavioral task
behavioral13
Sample
Roblox-Mass-Report-main/setup.bat
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Roblox-Mass-Report-main/setup.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Roblox-Mass-Report-main/useragents.txt
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Roblox-Mass-Report-main/useragents.txt
Resource
win10v2004-20240226-en
General
-
Target
Roblox-Mass-Report-main/RBXBan.py
-
Size
3KB
-
MD5
b55c5df7de9147c11a5e7413c22881aa
-
SHA1
48ea8cc4ad4394cf0053ef5044999fef1f48d157
-
SHA256
7fa1d25cdfc56a8fc47cd7042b403435257db1d531a40db3558c17a4099e46aa
-
SHA512
02dab4ecd92c1637fb14c72a5724d26ca09e794c36f9c1a208e6ecdb8f823596e3215cc1a859b740826e05753892de2dd8ebcb5976e1c4ce93ffba3096b8e7d4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2572 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2572 AcroRd32.exe 2572 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2512 2440 cmd.exe 29 PID 2440 wrote to memory of 2512 2440 cmd.exe 29 PID 2440 wrote to memory of 2512 2440 cmd.exe 29 PID 2512 wrote to memory of 2572 2512 rundll32.exe 30 PID 2512 wrote to memory of 2572 2512 rundll32.exe 30 PID 2512 wrote to memory of 2572 2512 rundll32.exe 30 PID 2512 wrote to memory of 2572 2512 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Roblox-Mass-Report-main\RBXBan.py1⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Roblox-Mass-Report-main\RBXBan.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Roblox-Mass-Report-main\RBXBan.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53d1cddb8014eae29094ec18495c777b4
SHA10069a019874b005ea45a98ca76bf6dfacb944811
SHA2568107f1902351629597db40611f027b57098c1ff08a46566aba23891d1f1ba8f4
SHA512deb5dd72e776651d197b5061717df1d2843948671809a5529a8b14bd02ce3b7a50820d19711d7776e74492af4f68063677d531e1e7d188b55e3ac29c56c837e3