General
-
Target
RobloxPlayerInstaller.exe
-
Size
5.5MB
-
Sample
240704-pbt4eawgqp
-
MD5
27469372591b14ff1c57654facb5e020
-
SHA1
492c166cd0e6c8d122ca4687659bf047cd48afd7
-
SHA256
3b8fcd52686095049b1563fbb6ba0bf73113a01b13c303bebcb36d8339a1519f
-
SHA512
0cfa845de57acf6f17f295f0771c2a61cd846efdee79da012def474bcaa91d9e99d3d528cf5698e6112a310c4f97e98ae74b6cfc601b2988c51e92270ebf92a2
-
SSDEEP
98304:v7v3kcOmmcMxGf3Yi4bg38mky2aB173qgDDzGxSP8R7fTA7pksuq7:70cB3djgmggDaRXAtHB
Static task
static1
Behavioral task
behavioral1
Sample
RobloxPlayerInstaller.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
RobloxPlayerInstaller.exe
-
Size
5.5MB
-
MD5
27469372591b14ff1c57654facb5e020
-
SHA1
492c166cd0e6c8d122ca4687659bf047cd48afd7
-
SHA256
3b8fcd52686095049b1563fbb6ba0bf73113a01b13c303bebcb36d8339a1519f
-
SHA512
0cfa845de57acf6f17f295f0771c2a61cd846efdee79da012def474bcaa91d9e99d3d528cf5698e6112a310c4f97e98ae74b6cfc601b2988c51e92270ebf92a2
-
SSDEEP
98304:v7v3kcOmmcMxGf3Yi4bg38mky2aB173qgDDzGxSP8R7fTA7pksuq7:70cB3djgmggDaRXAtHB
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-