C:\buildAgent\work\ci_deploy_ninja_boot-x86_git\build.ninja\common\vs2019\x86\release\Installer\Windows\RobloxPlayerInstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
42d4b6db394bf33dd4619763af46c3721d1a87ddefa07d54c0012420779ca80e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42d4b6db394bf33dd4619763af46c3721d1a87ddefa07d54c0012420779ca80e.exe
Resource
win10v2004-20240508-en
General
-
Target
42d4b6db394bf33dd4619763af46c3721d1a87ddefa07d54c0012420779ca80e.exe
-
Size
5.9MB
-
MD5
a04245a17343eb9226eb66e82f7d91b0
-
SHA1
f06cdb1b8ef077cbe2670e105f01c4369fd4e3e1
-
SHA256
42d4b6db394bf33dd4619763af46c3721d1a87ddefa07d54c0012420779ca80e
-
SHA512
74328749b15439e55f54f039e91ae5a3562fb88bba93691bdafdbe255f013548b1ac11de9be755a1fe71996aa9227e522f2fcb937925dbd08bfc97b3f57488f2
-
SSDEEP
98304:2DvBVrrsYuyzh6E1auhHgVjirlmxJLCCQa/BHA2uja/rNJ7rBs:qbrrBdb7gVrLCk/xPtzHS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42d4b6db394bf33dd4619763af46c3721d1a87ddefa07d54c0012420779ca80e.exe
Files
-
42d4b6db394bf33dd4619763af46c3721d1a87ddefa07d54c0012420779ca80e.exe.exe windows:6 windows x86 arch:x86
84dfdbf12a79f153655e14db9a4225d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
_TrackMouseEvent
InitCommonControlsEx
gdiplus
GdipFree
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipAlloc
GdipCreateHBITMAPFromBitmap
wininet
InternetReadFile
InternetConnectW
InternetQueryOptionW
HttpOpenRequestW
InternetCloseHandle
HttpAddRequestHeadersW
HttpSendRequestW
HttpQueryInfoW
InternetOpenW
InternetQueryDataAvailable
bcrypt
BCryptGenRandom
advapi32
EqualSid
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CopySid
RegDeleteTreeW
RegQueryValueExW
RegQueryInfoKeyW
RegEnumKeyExW
IsValidSid
GetTokenInformation
SystemFunction036
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
GetLengthSid
GetUserNameW
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegGetValueW
AllocateAndInitializeSid
RegOpenKeyExA
RegQueryValueExA
CryptDestroyKey
OpenProcessToken
FreeSid
shell32
SHGetFolderPathAndSubDirW
Shell_NotifyIconW
SHGetKnownFolderPath
ShellExecuteExW
iphlpapi
GetAdaptersAddresses
ws2_32
connect
__WSAFDIsSet
WSAIoctl
inet_pton
WSAGetLastError
freeaddrinfo
WSACreateEvent
WSACloseEvent
getsockopt
htonl
WSASetLastError
WSACleanup
WSAStartup
setsockopt
send
select
recv
listen
htons
getsockname
closesocket
bind
accept
inet_ntop
socket
ntohs
ntohl
ioctlsocket
getnameinfo
gethostname
getaddrinfo
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertFreeCertificateContext
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertOpenSystemStoreA
CertOpenStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
kernel32
IsProcessorFeaturePresent
GetStringTypeW
GetLocaleInfoEx
GetCPInfo
UnhandledExceptionFilter
LCMapStringEx
EncodePointer
InitOnceComplete
InitOnceBeginInitialize
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
RtlUnwind
InterlockedPushEntrySList
GetCommandLineA
CreateThread
ExitThread
FreeLibraryAndExitThread
GetConsoleOutputCP
SetStdHandle
InitializeSListHead
HeapSize
GetDriveTypeW
InitializeConditionVariable
TryEnterCriticalSection
InitializeSRWLock
GetExitCodeThread
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
SetConsoleCtrlHandler
IsDebuggerPresent
DebugBreak
OutputDebugStringW
CloseHandle
GetLastError
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
WaitForSingleObjectEx
OpenSemaphoreW
CreateMutexExW
CreateSemaphoreExW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
SetSearchPathMode
GetCommandLineW
VerSetConditionMask
GetDiskFreeSpaceExW
CreateFileMappingW
VerifyVersionInfoW
MulDiv
ExitProcess
GetUserDefaultLocaleName
Sleep
FindClose
FindFirstFileW
FindNextFileW
SetUnhandledExceptionFilter
SetEvent
CreateEventW
OpenEventW
CreateProcessW
GetSystemTime
CreateFileW
GetFileSize
MapViewOfFile
UnmapViewOfFile
DeleteFileW
TerminateProcess
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
OpenProcess
GetModuleFileNameW
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32GetModuleFileNameExW
GetCurrentProcess
GetCurrentProcessorNumber
GlobalMemoryStatusEx
GetSystemInfo
GetSystemTimeAsFileTime
GetVersionExA
IsWow64Process
LoadLibraryA
K32GetProcessMemoryInfo
GetModuleHandleA
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
CreateEventA
SwitchToThread
MultiByteToWideChar
WideCharToMultiByte
GetNativeSystemInfo
LoadLibraryExW
FileTimeToSystemTime
VirtualQuery
RaiseException
DecodePointer
InitializeCriticalSectionEx
DeleteCriticalSection
CreateSemaphoreA
DuplicateHandle
GetTickCount
WaitForMultipleObjectsEx
GetExitCodeProcess
LocalAlloc
LocalFree
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
LoadLibraryW
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalLock
CreateDirectoryW
GetFileAttributesW
GetFileSizeEx
ReadFile
RemoveDirectoryW
SetFileAttributesW
WriteFile
CopyFileW
CompareStringEx
FreeLibrary
GetEnvironmentVariableW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
MoveFileExA
CompareFileTime
GetEnvironmentVariableA
SleepEx
VirtualAlloc
ReleaseSRWLockShared
AcquireSRWLockShared
FormatMessageA
GetCurrentDirectoryW
GetFileAttributesExW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
SetEndOfFile
SetFilePointerEx
SetFileTime
GetTempPathW
DeviceIoControl
MoveFileExW
ResetEvent
SetWaitableTimer
ResumeThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateWaitableTimerA
AreFileApisANSI
InitializeCriticalSection
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
SwitchToFiber
DeleteFiber
CreateFiber
GetFileType
ConvertFiberToThread
ConvertThreadToFiber
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
GetStartupInfoW
EnumSystemLocalesW
FlushFileBuffers
HeapReAlloc
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
GetFinalPathNameByHandleW
LocaleNameToLCID
user32
GetWindowRect
InvalidateRect
EndPaint
BeginPaint
GetDC
DrawTextW
GetSystemMetrics
EnableWindow
KillTimer
GetShellWindow
GetDlgCtrlID
FillRect
ShowWindow
GetWindowLongW
GetWindowThreadProcessId
GetUserObjectInformationW
GetProcessWindowStation
SetWindowLongW
TranslateAcceleratorW
MessageBoxW
SendMessageW
DefWindowProcW
LoadAcceleratorsW
DispatchMessageW
TranslateMessage
GetMessageW
DestroyIcon
LoadBitmapW
EnumDisplayDevicesA
GetDlgItem
PostQuitMessage
CallWindowProcW
RegisterClassW
CreateWindowExW
LoadIconW
SetTimer
DestroyWindow
gdi32
CreateSolidBrush
CreatePen
DeleteDC
DeleteObject
GetDeviceCaps
GetStockObject
Rectangle
RoundRect
SelectObject
SetDCBrushColor
SetDCPenColor
SetBkMode
SetTextColor
CreateFontW
ole32
CoInitializeEx
StringFromGUID2
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
CoCreateGuid
CoTaskMemAlloc
shlwapi
PathFindExtensionW
PathFindFileNameW
ord12
powrprof
CallNtPowerInformation
winmm
timeGetDevCaps
timeBeginPeriod
timeSetEvent
timeGetTime
Sections
.text Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 917KB - Virtual size: 916KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 777KB - Virtual size: 7.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 368KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 716KB - Virtual size: 720KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE