Resubmissions

12/05/2024, 14:59

240512-scw6yaee69 7

12/05/2024, 13:19

240512-qkwt2abd49 7

Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-de
  • resource tags

    arch:x64arch:x86image:win7-20240508-delocale:de-deos:windows7-x64systemwindows
  • submitted
    12/05/2024, 13:19

General

  • Target

    RobloxPlayerLauncher.exe

  • Size

    5.0MB

  • MD5

    97d5071b4251a88c685a53051e1ae986

  • SHA1

    ef277883334b865db544af96abaff6687a1e4f42

  • SHA256

    987f45a5fa22b34fe09422b4e8fb844c4dfedae522d1ff35b833fbd0ae850d80

  • SHA512

    d9777d1c766868b3bd51c6fd55ac05fe8381ae2db00ad6072a535ea04814bd2ad92957661e73a13d2feff0812e55e8ced2a1144ee2d805ec951c30faeee22558

  • SSDEEP

    98304:aXvT3ffvvYakoCm4sRE8g/pvTNJcfZdvWbdfNwjbzI+:uTnvvYFPegDLb1uY+

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 64 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RobloxPlayerLauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\RobloxPlayerLauncher.exe"
    1⤵
    • Checks whether UAC is enabled
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\RobloxPlayerLauncher.exe
      C:\Users\Admin\AppData\Local\Temp\RobloxPlayerLauncher.exe --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://uploads.backtrace.rbx.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=7a7d97104819f6db4e65764a0d3ae64f8171bc6e --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x5cc,0x5d0,0x5d4,0x5a8,0x5dc,0x18ce2c0,0x18ce2d0,0x18ce2e0
      2⤵
      • Modifies system certificate store
      PID:2620
    • C:\Users\Admin\AppData\Local\Temp\RBX-0E9DFC7D\RobloxPlayerLauncher.exe
      "C:\Users\Admin\AppData\Local\Temp\RBX-0E9DFC7D\RobloxPlayerLauncher.exe"
      2⤵
      • Checks whether UAC is enabled
      • Checks computer location settings
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\AppData\Local\Temp\RBX-0E9DFC7D\RobloxPlayerLauncher.exe
        C:\Users\Admin\AppData\Local\Temp\RBX-0E9DFC7D\RobloxPlayerLauncher.exe --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://uploads.backtrace.rbx.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=ce85e2d3116edeac8759c2321c39314dee13b8a2 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x5a8,0x5ac,0x5b0,0x584,0x5b8,0x1da6bfc,0x1da6c0c,0x1da6c1c
        3⤵
        • Executes dropped EXE
        PID:1104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Roblox\Versions\RobloxStudioLauncherBeta.exe

    Filesize

    5.7MB

    MD5

    fdee8211f69dce1343ca0dbd2a8ed61e

    SHA1

    4b255d87aeb3ccb381208631edc77ab97c8825d6

    SHA256

    2bbcf80c909a561a790584f25219afa8e3f4b7f2ed57b4de453185f1f267dfb9

    SHA512

    fecd0fc36e622744f7aa8035d8f1cfa98dda119745e3407a6f62483a891274f78cf8e48b4576c0954c16d63a1d23bf998784f1d7db23091e0ef309efd0273f90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_BACC6CD2B29F18349081C9FD2343833B

    Filesize

    2KB

    MD5

    194ed61537032c4b07d54342829fff87

    SHA1

    5f8647ac3c9f5930a5ce33d804992ba2f5e6d882

    SHA256

    bf64d48c901fb3e87cc6cdccc3a03420ba207309fa76efe47ac65f81adf313a1

    SHA512

    61ff7aad065d0632955a40922ea2c83dc9ef29ec63a203ee87eefb92931375a069ec7d259baf840b7ed30f49b544feeeae7cb2cd4bb07bf68dd9759d742656ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517

    Filesize

    1KB

    MD5

    41648cfe61a1e2b229498051a90a4c33

    SHA1

    eb972c577b65bfe8a4c002a4805654640cdaf7fa

    SHA256

    bdaff99efbd0d27ce809611f434dae930f6df106f03f5df5db7570f421503ea4

    SHA512

    e6ff5fc8a23664f9a6a504e72f2ce63270a4406f14f02e24c9d1d04f958e930a4d205cccf1584d9c312706cc21994c83129486a68bdc1992ac0af22574c636d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    a26045c60badc3ea12344117b7bc4403

    SHA1

    e042d0cb3844ca44869d5e01a2e427144b458556

    SHA256

    69872c2a3c0bdca24598431943ea06f46d2a28bee615698ae09ba335b1cfa925

    SHA512

    7b0e7562480066d929e4dce2201ced8be9e7d309d28ada04d7779a9ab232ee4bf5a8ba89317865eb382250f8f529c0c0b95d8eb80cff800e595280f2f395d7bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

    Filesize

    471B

    MD5

    eaeabbe2ec4eb2ab27de022311b9796b

    SHA1

    2596cf1bc4782a2e9c12089bbf1e6602f4cef65d

    SHA256

    e860343a7ab2f4cea4a68acb776bfda82b177e40c32b5d3f3d81077f9203ddcd

    SHA512

    d8830008e29c16a86ded14dd2e2ea68ded807bcbee9fdca92f1b1e9514f0d759c800ceaf45e06c7aa3c2061a7004fd9719a0836637df2f22a069d081e9f3abbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

    Filesize

    2KB

    MD5

    fd65821a88884f3e1ea3bfedd05060c1

    SHA1

    43b081544c623c06655f5bd132674ee71398abd3

    SHA256

    3410abfe8fa4c84319cd76fa804491c55f83d02b926454b92b7371b80dfd78ea

    SHA512

    4b222bde5360751400f597c9caa3cdbab2c54d7de2c59c161d7dd54659e74f466a5fc07435c593d526e52a561dc61da7cdcdfaeb10e25455f142d256325dc47e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

    Filesize

    1KB

    MD5

    9f4cbaaff1f0d6a5435f1d48d1c194f2

    SHA1

    d6f0eb4ee61524d385f74df64f19438b898f56c0

    SHA256

    1b9c623b9c138d18ecc501bd2add745751b98e0892e7c0523496f9c8d65526c6

    SHA512

    8af64ce3ed7dc5037514c0f479209ce91f13d99a98fd2f21d825b036b1939d6e7310d568f773752e3a338e64f0a282a1296a62fda23b13e0378f930673805f4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_BACC6CD2B29F18349081C9FD2343833B

    Filesize

    488B

    MD5

    3bd0cb3e579af8a5caa0945e5e7aeade

    SHA1

    94e39b0685838a7bef90b4a7bf91410b33c90512

    SHA256

    21ea035c40981652ab0c55405a1cd2a51008b1d88b54a94e13d7212eb32747dd

    SHA512

    cfde9301d1b2588d138a27fa0cdc86d61f8e5b543ca51614cb9e84f593736975db9a362d2a9d88c21df19c06bec9725ae11633b40736e7377722a0b5e314ad7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517

    Filesize

    434B

    MD5

    a8667f562ee877e8860ac5ffdb834373

    SHA1

    d8c5d0ff8cabae643c011e1fcb07a0a2f7405f7f

    SHA256

    bb3ac2000eb31aff4f76348bc95d947fb54b696390a66e31c37437838c87e61b

    SHA512

    8c275846412a3e8526f3e025ddffe4eeb77e54259071e2869ec838da2bcf8dbfd6d48907fc93357c4c03f0592fb8c1f43a611eca33d2c4c31c6b34bf0c20b49c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ea58ff61b4fb20c4dc3deb697855058

    SHA1

    d0984f63c5874721a2e50d0f3581086096eca7df

    SHA256

    e0d088628fb9a7952b8d2e8192222495d304118eaa24eee1e63143377f86be3c

    SHA512

    c6c0642d7c981238feadc41d3e964e389f758a28af243a80ba013ca3b532a4e198a03ba4d1568a20d59559d0239546a27a5d9abe76e8522e7ccd0a7d85a8e69b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f1eb5eb05ac9b14930df6e53cd2cf3f3

    SHA1

    403368a59e99a2361a91729f92382915b672ae73

    SHA256

    c40107a714e13551184bb3749255d047351a736dbd00b7ccdb6189306e3579cc

    SHA512

    f5df2f478c536f949e342e698de092d33224c85ada0fb8f9e0f2b077c1dfa5a69ee2687bddd3a4900c6faa7bd8ec112c5ae15129e63df8bb0e31858fa8ed727d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c3f6fadd8b6871c22cd16fb7bd331d3

    SHA1

    87d9f2da5bcf203110d673b8312b8f402af35554

    SHA256

    ad3a1558bc22751655c6a06fede476fec254002a7f0bee1bb068e0f87f0c1175

    SHA512

    12ce792b24cbc0327b0b687c1229ec7d3363b2d0d44a81c7973200e1261fa96f4f47d35a0f93e5951d5a521dda65936f53892c1445accb4ec6bccd952f007b19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    270eea235ced22eff4d20989b93b4d09

    SHA1

    f2682896e905e9d369c2fbfdb534d77747d40caa

    SHA256

    fdf6aa7fb3657c4caec5797e530874c3d12ba5c73568d87b6addd2e4c79f42a6

    SHA512

    f84a77732d745532d258ab7f21156e9d83a167ae6c45dc5e27d1273da5501765e8dc6cdacf64e799c96858521fa9d228a774a75b17c794fbb14512508cb9642c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    ab4f26ad3e32e352c14927ccc7fa6842

    SHA1

    412bcb8edce5ec61ae9a6a1c53146697f84aecfe

    SHA256

    5b3bb9fca2dfb3a0bb66e41453b10a884ceaa79816db5d8a78dceaf159a3e1e5

    SHA512

    12ac84ead91770d89b09220333508fd58d6069fbbd547b75cce2d9f03c51f708a6ae750f122b28754ea7cfc5ef4006d03f3cde462778b8f563deed9261dcc6b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

    Filesize

    400B

    MD5

    437ef6407bac57449990d83c3d1eb128

    SHA1

    26df12972e4493b321eef0a277437c6a880ada3e

    SHA256

    c9e36e9da33b6b856d7c74ae495a53857493ea9f77c7728d894a7071d6e3b83c

    SHA512

    cb0d05eba1d8036aea3a989a294dbd5060471e3ca619d97e41b941c2bdb9c7dc3c080e30cd2735c9e0c98c600a9a832dd02295fd2882ca8aeda93da9d005816c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

    Filesize

    458B

    MD5

    113a253718101ebd21d8b69bcbae7257

    SHA1

    ac4690db7f4f7b07d4012b35131b2bd49d8596df

    SHA256

    74f0cfc8b9a8573b88ef3392613993ef2d2e5a37ba29d306f6f43849fda76a99

    SHA512

    3958ecf6572292b04b03de44c3d35c33111704c00cc9b9b4c2568ea3c9308b0713cd7bb821504e067a85c3c503233d506d38357a76ec9825e2c65873390f4cfd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

    Filesize

    432B

    MD5

    8f27c71fcd1329d055523ad30a0ab2e9

    SHA1

    a1afd7d320ff72009b5c906271e696deba45e674

    SHA256

    3751c2f269cb23a8ff8e3a0028e2512eef1262d910c5c7ebf9d595d883665d28

    SHA512

    4da8d733148291ae07c171f844343b3a3768af7ac26baa40912cf4961c1ecceeccaf6351fdc0913395ecb724f7466495eef6f85a46124ae2c871b0be26a244ec

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\BatchIncrement[1].json

    Filesize

    163B

    MD5

    bedbf7d7d69748886e9b48f45c75fbbe

    SHA1

    aa0789d89bfbd44ca1bffe83851af95b6afb012c

    SHA256

    b4a55cfd050f4a62b1c4831ca0ab6ffadde1fe1c3f583917eade12f8c6726f61

    SHA512

    7dde268af9a2c678be8ec818ea4f12619ecc010cba39b4998d833602b42de505d36371393f33709c2eca788bc8c93634a4fd6bec29452098dbb2317f4c8847f6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\version-5e534e6db34e447e-rbxPkgManifest[1].txt

    Filesize

    1KB

    MD5

    6eb3fbaee1016d3b6991b0080ad9a26d

    SHA1

    6c20d96eb53c3506c54719ea5a065a4a103dfe38

    SHA256

    b15308fc266caf21c4136358ee249e69a529365787133c625ff6bb7cf1d3cc57

    SHA512

    8e8bdfedd81f5daadd368f795f4266c09f7ba5a1f1f0531cc865bca6e0fca0ca49a386dabeed4553f634777404f1c84e4a9abaa6624f804fdb25d5fd50e95053

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J8SD872Q\version-5e534e6db34e447e-rbxBootstrapperPkgManifest[1].txt

    Filesize

    82B

    MD5

    917a06ea04936600c075afece257a9cf

    SHA1

    2bbba3ed2d0ef4ae76d50dacfe484f1e75b9407e

    SHA256

    30a6410adac9d05d3ab50418433331dfea63c88b842ea2d926c56c8d268b6040

    SHA512

    177db06b80ce7905a17f983dc788be547a101f11c418ee5a13981bbe664e97174eb1485f5151acf69e86ee0b0c2dc29fd89ab1c06e16273c2fad1ad1c2d5f434

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\WindowsPlayer[1].json

    Filesize

    119B

    MD5

    47fdcd015cc921ad16be93557700fa54

    SHA1

    aec51d6e7432c8a056603793b0f8ef1a065052cf

    SHA256

    54702e7c60dbd8f81ab48d22509c9029df209ace9ea65eb8b8074e65d02b3e7a

    SHA512

    d7cf7f720d3cc3e80634a016e9100cacc7948788a2bcd82fb66f067a08944b2b66dbf1de61dbbb96438bead4fdcd77664057fc6c64cc4d7848d85869e6ea1d02

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\PCClientBootstrapper[1].json

    Filesize

    6KB

    MD5

    d00d41647ae523afe66aede26614b9e6

    SHA1

    5f12131f85c225666b4158fe179aa5e4d8ba8e76

    SHA256

    90c4b0b14a47f68e24b87c9b102f0142b2eee737ccd7b8c5a64733d6475647ba

    SHA512

    0a1019d35c0a28d9891c04787fac1a924bc65396fd2942917baa040b9f6f2cd61a9ff25171404406516e1e09fe130be44a777ec7fc5209f86769355644be5902

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\version-5e534e6db34e447e-rbxInstallerPkgManifest[1].txt

    Filesize

    83B

    MD5

    5af674aa612976a5ac793579b3ff1bac

    SHA1

    2528aefbb646948c1196be86e43cde5f816c1c8e

    SHA256

    063f061f57a3a2cec6a2f9c73c5ad017ee835dad79015bb969b2a220b31e26d2

    SHA512

    6abb9193f51418e534cd94119433e7a0aa0d427e19eec9e728aa0b980fc5b4c3fe57bb103e98c18904b0e9341b3017c4e1e513850a925a0fa219f08d9ffab974

  • C:\Users\Admin\AppData\Local\Temp\Cab3564.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar35D5.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\crashpad_roblox\settings.dat

    Filesize

    40B

    MD5

    6446aa009a9fbbd6b563996f75dbd7bd

    SHA1

    720da2fc4487a9e7912adacd2f7dbccf90800315

    SHA256

    5aa36d7dbec5e3281c8436918f4f63a317119e220c8f5e5754a257da8fd6145c

    SHA512

    5adf545b0bfd89052e887c1b164d9e6a94b4aeecd32deaa6708c93d1588e81e0e664dae5e80e107dc6468b18f1eb8769df875be72cddd223496dfa3fd5682310

  • \Users\Admin\AppData\Local\Temp\RBX-0E9DFC7D\RobloxPlayerLauncher.exe

    Filesize

    5.7MB

    MD5

    84ebaa7c95efeca73a5c0f2deab6a455

    SHA1

    c072da28301354bb4c94f14bb7a70f48552a7f7e

    SHA256

    c626055a1bde4c4a28ded2d8830f8060633cae35b224903ade01c7227d74ff11

    SHA512

    500c7aa69d1b81f23c85f1f5d289958910954937d132179a71b5d0fb17d5bed64a3bc0c2c2bdfbcd739b5a290ae2fc5fe0c7ee2b91597450eddcbf92744edbdc