Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-06-2024 16:58
Behavioral task
behavioral1
Sample
RobloV.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
RobloV.exe
Resource
win10v2004-20240426-en
General
-
Target
RobloV.exe
-
Size
17.0MB
-
MD5
243baa64b50be7d5e1d59a04c34e13fc
-
SHA1
fc5cf99131422688aceff54d75172eb698c0795d
-
SHA256
010870f0e625544560333a18d440abdb08dce009224feb371c709e0162b005da
-
SHA512
7cd2458c68096f998936db86a81a2603cdd7324768b882bd5cdfc31369f978c6d8f02b3aa89b01837c53f08edd7b91c5c27ca9fb062faf649f1c6a3be81879b3
-
SSDEEP
393216:GEkcqv69JWQsUcR4NzK1+TtIiFYY9Z8D8Ccl6lZCE+PKSauKo:Gkk69YQFS1QtIDa8DZcIlAWSZKo
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
RobloV.exepid process 1564 RobloV.exe 1564 RobloV.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
RobloV.exedescription pid process target process PID 2748 wrote to memory of 1564 2748 RobloV.exe RobloV.exe PID 2748 wrote to memory of 1564 2748 RobloV.exe RobloV.exe PID 2748 wrote to memory of 1564 2748 RobloV.exe RobloV.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD53c388ce47c0d9117d2a50b3fa5ac981d
SHA1038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35
-
Filesize
1021KB
MD54e326feeb3ebf1e3eb21eeb224345727
SHA1f156a272dbc6695cc170b6091ef8cd41db7ba040
SHA2563c60056371f82e4744185b6f2fa0c69042b1e78804685944132974dd13f3b6d9
SHA512be9420a85c82eeee685e18913a7ff152fcead72a90ddcc2bcc8ab53a4a1743ae98f49354023c0a32b3a1d919bda64b5d455f6c3a49d4842bbba4aa37c1d05d67