Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 22:11
Static task
static1
Behavioral task
behavioral1
Sample
RobloxPingOptimizer-Main-x64-NEW.zip
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
RobloxPingOptimizer-Main-x64-NEW.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
RobloxPingOptimizer-Main-x64.NEW/RobloxPingOptimizer-Main-x64/Main/README.txt
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
RobloxPingOptimizer-Main-x64.NEW/RobloxPingOptimizer-Main-x64/Main/README.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
RobloxPingOptimizer-Main-x64.NEW/RobloxPingOptimizer-Main-x64/Main/RobloxPingOptimizer.bat
Resource
win7-20240215-en
General
-
Target
RobloxPingOptimizer-Main-x64.NEW/RobloxPingOptimizer-Main-x64/Main/RobloxPingOptimizer.bat
-
Size
15.6MB
-
MD5
0e7fa38a2267f6c3c8b0afafda56ef99
-
SHA1
e116a71ae311011f1fc2697e84575990b75d96b4
-
SHA256
30800e9982e73ce9a2f315b05630225f57b6ae1d219902b8dcde6031d840a553
-
SHA512
75f5108166ac7224f5797941f57ada798a1bb760850677618770fb4aa7c9dd3d9298013afde66a0eba303852c9dfb2277b8bda61243c161b35975f1030ed9e98
-
SSDEEP
49152:Cdxc9riM4QO4C2ltO7iHK35ROUcdDvgVNfLH9QDn7OusKIV+cDBGVKKjU5ECeNNI:k
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2272 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2272 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exedescription pid process target process PID 2208 wrote to memory of 2064 2208 cmd.exe cmd.exe PID 2208 wrote to memory of 2064 2208 cmd.exe cmd.exe PID 2208 wrote to memory of 2064 2208 cmd.exe cmd.exe PID 2208 wrote to memory of 2272 2208 cmd.exe powershell.exe PID 2208 wrote to memory of 2272 2208 cmd.exe powershell.exe PID 2208 wrote to memory of 2272 2208 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\RobloxPingOptimizer-Main-x64.NEW\RobloxPingOptimizer-Main-x64\Main\RobloxPingOptimizer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Invoke-Expression $env:LdjEKqpmmB; "2⤵PID:2064
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -noprofile -windowstyle hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2572