Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
RobloxPingOptimizer-Main-x64.NEW/RobloxPingOptimizer-Main-x64/Main/RobloxPingOptimizer.bat
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
RobloxPingOptimizer-Main-x64.NEW/RobloxPingOptimizer-Main-x64/Main/RobloxPingOptimizer.bat
-
Size
15.6MB
-
MD5
0e7fa38a2267f6c3c8b0afafda56ef99
-
SHA1
e116a71ae311011f1fc2697e84575990b75d96b4
-
SHA256
30800e9982e73ce9a2f315b05630225f57b6ae1d219902b8dcde6031d840a553
-
SHA512
75f5108166ac7224f5797941f57ada798a1bb760850677618770fb4aa7c9dd3d9298013afde66a0eba303852c9dfb2277b8bda61243c161b35975f1030ed9e98
-
SSDEEP
49152:Cdxc9riM4QO4C2ltO7iHK35ROUcdDvgVNfLH9QDn7OusKIV+cDBGVKKjU5ECeNNI:k
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1780 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1780 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exedescription pid process target process PID 1736 wrote to memory of 2184 1736 cmd.exe cmd.exe PID 1736 wrote to memory of 2184 1736 cmd.exe cmd.exe PID 1736 wrote to memory of 2184 1736 cmd.exe cmd.exe PID 1736 wrote to memory of 1780 1736 cmd.exe powershell.exe PID 1736 wrote to memory of 1780 1736 cmd.exe powershell.exe PID 1736 wrote to memory of 1780 1736 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\RobloxPingOptimizer-Main-x64.NEW\RobloxPingOptimizer-Main-x64\Main\RobloxPingOptimizer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Invoke-Expression $env:LdjEKqpmmB; "2⤵PID:2184
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -noprofile -windowstyle hidden2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780