General

  • Target

    ROBLOX.exe

  • Size

    923KB

  • Sample

    240706-mwj3tswgpp

  • MD5

    597c7486fccf32f369fb13dd3a175a9b

  • SHA1

    e585967d5a1013f3c123c8bdc34db294fef4c045

  • SHA256

    d12bf62c7d7e1379cf6460cf18856bfc6821038c8a9c8fd6fd787bbf794fd456

  • SHA512

    9546a3b976af08963eb68ae3f9fc5de9cf2ed009a64b3c912e10ad063137657fd1bb26f700af8a283834d84b9e1bed65afc3f1fb32c4c118fcc41f57980ce29a

  • SSDEEP

    24576:GMbB3HG2hiAPP9xQTEdu7/ImmD7SOUgX/l4LY9cUs:GI3VzPP9xQI87qD73UgPSs7s

Malware Config

Targets

    • Target

      ROBLOX.exe

    • Size

      923KB

    • MD5

      597c7486fccf32f369fb13dd3a175a9b

    • SHA1

      e585967d5a1013f3c123c8bdc34db294fef4c045

    • SHA256

      d12bf62c7d7e1379cf6460cf18856bfc6821038c8a9c8fd6fd787bbf794fd456

    • SHA512

      9546a3b976af08963eb68ae3f9fc5de9cf2ed009a64b3c912e10ad063137657fd1bb26f700af8a283834d84b9e1bed65afc3f1fb32c4c118fcc41f57980ce29a

    • SSDEEP

      24576:GMbB3HG2hiAPP9xQTEdu7/ImmD7SOUgX/l4LY9cUs:GI3VzPP9xQI87qD73UgPSs7s

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Stops running service(s)

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks