Analysis

  • max time kernel
    140s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14-07-2024 15:37

General

  • Target

    RobloxPlayerLauncher.exe

  • Size

    1.6MB

  • MD5

    df3c89248671866cfb9e0a407fad20b4

  • SHA1

    2258e20671e6aaba8ce75abb5bc5bca8c4df0035

  • SHA256

    93580834e65af2f5a83aacef47a1ec3ef45fc6ab9683ec4df771bbea713ab38f

  • SHA512

    f6658f2653aefebc573518773c97319d87d70cabeb182cd622a5722d4df0417df17318f4b25b7929ab03e982a072e914175971b96e205356c5c6a23a3fedaf01

  • SSDEEP

    49152:NmAhTN2Q5MmBRS+qYNS2+3njUrG+TvamoGXtTOgM7PMQpdAUFTHrPHHoV5N:gAhTkyZBdM2+3njUmrPHA

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RobloxPlayerLauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\RobloxPlayerLauncher.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\RobloxPlayerLauncher.exe
      C:\Users\Admin\AppData\Local\Temp\RobloxPlayerLauncher.exe --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://upload.crashes.rbxinfra.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=3b50cd7a1711a7bcc79000fcd87d819e29d4aca7 --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x5c0,0x5c4,0x5c8,0x59c,0x5d0,0x24eff4,0x24f004,0x24f014
      2⤵
      • Modifies system certificate store
      PID:2480
    • C:\Users\Admin\AppData\Local\Temp\RBX-862C4E8C\RobloxPlayerLauncher.exe
      "C:\Users\Admin\AppData\Local\Temp\RBX-862C4E8C\RobloxPlayerLauncher.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:776
      • C:\Users\Admin\AppData\Local\Temp\RBX-862C4E8C\RobloxPlayerLauncher.exe
        C:\Users\Admin\AppData\Local\Temp\RBX-862C4E8C\RobloxPlayerLauncher.exe --crashpad --no-rate-limit --database=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --metrics-dir=C:\Users\Admin\AppData\Local\Temp\crashpad_roblox --url=https://uploads.backtrace.rbx.com/post --annotation=RobloxChannel=production --annotation=RobloxGitHash=a5e1d39aa3778ca34a20893ef2072782b0d0f56d --annotation=UploadAttachmentKiloByteLimit=100 --annotation=UploadPercentage=100 --annotation=format=minidump --annotation=token=a2440b0bfdada85f34d79b43839f2b49ea6bba474bd7d126e844bc119271a1c3 --initial-client-data=0x598,0x59c,0x5a0,0x574,0x5a8,0x252ebfc,0x252ec0c,0x252ec1c
        3⤵
        • Executes dropped EXE
        PID:2456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Roblox\Versions\RobloxStudioLauncherBeta.exe

    Filesize

    5.8MB

    MD5

    62869f10fd0374a77a390084fb330ac0

    SHA1

    73738605a4ccfcf8f9d2fb5707cc375fb00dad54

    SHA256

    bc8553c377f27e0e71630a25c88da47c9eeb3be4a45676e68729567a4c429831

    SHA512

    edc403c6fa83937b5ff2b16c3e1e1b23fdea18bbc762ed23bb845abe9dd10ffd02ded50f0c2613b8f4ef9f8033dc3e0f2b50ed6f4bf2d0ac40721466fefbadf8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_BACC6CD2B29F18349081C9FD2343833B

    Filesize

    2KB

    MD5

    c6444d7e6360a90c5c87cce26908cb76

    SHA1

    2c3408ddffdafa7feafc4a98c264f76f70714dbc

    SHA256

    a378df767c03d429d264443f3bea063810f3be5b54c5ae2b874c85c51ab3d210

    SHA512

    8690f28e5a7a3a52f32f5849b755dbf01f8475b2c1f14559ae4e025b91ac2410c780b86fc3a0e2878ce7cd0911cfe164a0fbd9115e296eabebb549e4affd39af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517

    Filesize

    1KB

    MD5

    842cc833253fd0210baee4d322fda53d

    SHA1

    decb0b2f405d2d8facb83a8b20fcbe21e5db9c5c

    SHA256

    b13f34c1bb5995b5306ef514befceb6a512640327bcb4a11ec2bdd202e711a7a

    SHA512

    d8ae04e8c0f468c9bca4869cfd7d50e35cc1e0a0a24faa3dc93726ead44add5786d2317e9c9c42e1e9812e833df509461f6c958ad1208d99c9426eb41599eb0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    ec15ee27c0a7f278b69664a64d07c2b4

    SHA1

    4abbc7eca8758e69aa6c1feb78c61d7b989f6034

    SHA256

    4bd1f0a598dfb7e3f1719325fdb1fb469f3d727298408db8b49a210c774dc2a3

    SHA512

    a013bb145678038ff9ec37206b1aa06ae0db6115a1ddc6e397e40f6743a1ab47c0a49a0f1205dcffc8a3119385022e3bc8f03ecd45b1e8df57e3f2952d16fb71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

    Filesize

    471B

    MD5

    ef5c336c8cce30531825c70a34588932

    SHA1

    1cee3d2f40c401372774e9d61d85bd3d9911e1cb

    SHA256

    d63a6cf5a591bd0d7954a083669c73939ead00098550e0104529db61134ae292

    SHA512

    e5a03bb56f66c3798fe2a725d21edfa53f399645fb8d99dba9e9e8c61ac68cba1038eb7d9c6ca5ebcc715e43091a0facd1609eecb4aa3fdec5d0a747739de102

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

    Filesize

    2KB

    MD5

    93aa7a76d8288cb631db979364f67b6d

    SHA1

    bcbab4ce1885b189247a5b8212878dc8c0535bde

    SHA256

    7fb063084239792631e41b7919d888137a958da95e91e648b6690b5f090aa6e5

    SHA512

    f967fe3349ea3b2136832e8f84ea78ef98b78816cdadb1d5406232a146d20b1138beb2c29ee751697a25ca8180c0e47ec9544f3c02ed24597baabfa4ca7e5886

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

    Filesize

    1KB

    MD5

    3ccbe8a5d51699bfe65990a58e4e1e8e

    SHA1

    325ecfd1b4091b06f4862fce79193d62ee8e7083

    SHA256

    238260f2e2d889a41b2bb1856d4f9cc4ee556705a2f9995e607ff787cbe62a27

    SHA512

    883db63c6eaf0179260df6f5b6a296809a07e1c18c5b4e1ee80c99ac39e0a6d3e50d197038a04fe9822779de9a426ec473cc67f7fa8b91959f62a557ded274d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_BACC6CD2B29F18349081C9FD2343833B

    Filesize

    488B

    MD5

    d4132488396432d3332bba0b387d20b3

    SHA1

    8945efac68c37e2785291ea367e6ac3866df2f4f

    SHA256

    36be2c8efe87baf9306a2b0834b44500ebccbb9a41585623d9d9370795c17982

    SHA512

    479372e2e73fb5103e837e5a4b1ffbb52171af299f788055a5e7aeed3ab61dfe84b6fe9e1483646385fc88724d082d68310bdeea328e0d2c07862e79d0c9a419

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517

    Filesize

    434B

    MD5

    78f98c98a26a1f8925870506f687c5e0

    SHA1

    166d267a6354d6d0c0dd2596e9bbdf33e0983276

    SHA256

    fe8b920cf377cd345e23aa15d023451b8228aa415e6013f81ed2e9fe475d8032

    SHA512

    4134405ca6ce4fe0324f89ccf0a1bee51b46196a08cfce1731e859a9bbb8cea2e812f452e9aff6f5cc7df3aaa6c18e3a0bc3161207cc1e8d2086517b0dccfce2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    264e538124d72d4cd27bc28d061501b8

    SHA1

    ea4f76148ec4e9afe91b602bd429f1d32414f0a2

    SHA256

    591b65249bd5ea40f7cf4e44f3dcd387bcdfdc8b5a70152957da533e729f278f

    SHA512

    33bbb08c7301633f2742381cf9d07d4491b995c0af3d04732e5f13d3e9e74c5e89648dcc15f78d00fbff31d4aa11470912e593b807cde8386f02a0e127910262

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    99fd0fc833fd30cf11f3ca5b04b57356

    SHA1

    bccef698f06ec3ae0ca59e0577e73dcace9ce3d1

    SHA256

    f914dcfa84f34cba9fe3ebc5ab32b4fb0efb036025a548345de2e17118fc0798

    SHA512

    78b72414930e9a25f0e3d3663d42326be7d3eb30982f109dbb80f76ba8239ef7a04ec2cb727482666201d6eb9748972d50eb570be9424c9bccdb47553a50b1b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d573e5724cafbbbf23bfa0cf0fe881a1

    SHA1

    c5cf10aeee80dbdfa3d76e1ea3b26390aae21fe6

    SHA256

    6738dc8a7be0b936104260af400a5b2a624f7391315251020d69a08dd2f48da9

    SHA512

    528040e2b9305328cca19d6834fac29c95610e7417b4cd3a1e705dac460fe00c9b63cca9477300117f26e72ab6c3cc0aeda100e2998d12cb0cfb2a1d7610e0dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    fde969787a755236cb5e452cef47292f

    SHA1

    5ed03a118bd7eab35ca452dbc004344aa7c26e8d

    SHA256

    adc25a59bc4de3e4d7309b8217f4fa0b25dd5cb15c1a4c221f02732edbb1fe50

    SHA512

    438b333eeb41e7e9874550accff64efc424eef79f17f582f439eedabf83b892b4b8e76116a7116315692594869d0c1bce700f22c5bdeafa147ed8823aec0d101

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    864415211ea7c74832e4f3bbad8c4774

    SHA1

    bcd6cce1b47ea335405f97b7e0a82499048e4ac1

    SHA256

    e8eb34c6374366c2267883a51b48cf8f8eca43d0ba489494d05772e558cfbee7

    SHA512

    2586f731a4199b5ed707ffc492f3dedd0e2c53232f62182b796722841d133c5cdbd9a6e662ea119e02f60083ce40ff5d644aa2b648e2bae02c84f84a457099e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    8d1e7bc3e5e9150b5e748a3cd0c570c1

    SHA1

    aa817fb1b1801bbe24df63e274582543405929aa

    SHA256

    7c95e5468b0321c508963c7ffe7a4b84c1d3293e06294cd4222f27a73b45782b

    SHA512

    0b1f1d44c4fa18c1420fbfd419f182319a2bedbff95dd5892814ab401b33093820c5a4f16ebcdac6350d8ac5a5e7ef225ad9e5e38652f405c7a2d69512f97bed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    75ef6c84643071f0fb1dcf4784fd4dde

    SHA1

    803bb414306baad85ed2741192c35877202ef274

    SHA256

    c9242c4b34f7486f328330d6a5c245e980acdf8d28e178a7ff89ee419a39e3d4

    SHA512

    d5d71e14951590b0a92edef91df7b6473d606d6467fb674cdad4614a611b68cf41515c1d036d6996cea2aa2a56174442ad88d8e107731e1228f291accd63c22a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

    Filesize

    400B

    MD5

    f605788684acf3e21a8b41a23a1ec245

    SHA1

    4548cdc689062d5d89ccf4ff271f73f7a16189b6

    SHA256

    84255bea8d529899e3aabf8eff28c5c68d8b6cc15baa034739e73e1b23908867

    SHA512

    c7f0f2006b97ae826896511da932a74db58edad33158df79b99d6c03bdda0a7917c763bd35034a6d6bcc22018e7a054dd0c328f9b47ebb34cea337132545c351

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

    Filesize

    458B

    MD5

    0ce66da679e610f3f84db3bf2f99e00d

    SHA1

    7d873d0fd838de245d7e6fc8f14a49879e574a03

    SHA256

    7a44432bfc297674e131a2eb1739edda31dddd019699e98fb452530d72e899c7

    SHA512

    cb427c2cf778fa0ab958598ae82ed18619577782745285cecb0470115562867afe9775b146ed95839c81321e536da2fecc35a81b7917a8531dbb5b5e7f3d21fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

    Filesize

    432B

    MD5

    5dc253b5683d3d98518995db138f001b

    SHA1

    46b0e8af19e88fe9bc7f667885bce326ebb2e904

    SHA256

    eb92151d7563fffb20da9e4c7ceb1dad104b3fec182c41a7a3a55b95f2dbc929

    SHA512

    73e1cd8c9a0c436e14957032d841ce688b290c1b7a241982fc2d877979ff429d6473b81133931670dec9e3563cba73fa68e39325496b7e3ef4bd0198da72ff63

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\PCClientBootstrapper[1].json

    Filesize

    8KB

    MD5

    59cbbea87f59b48dff8bef6f2c31faa6

    SHA1

    684967f386afb0e05d984eae05c55f6eb7af156d

    SHA256

    df4255cee8e9565460f9d36cb01c76d85104a807636c08470a4c570e1ebcfea0

    SHA512

    a38530431fef91513987f1336f134ee3fe2d5a7ac78e661faf7d9286e1b3ef560c7c7ea0c4983f26c446e3d3a67c15c124dff25244ec4448fd918d2a79ecee03

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4UQ4J2DQ\BatchIncrement[1].json

    Filesize

    163B

    MD5

    bedbf7d7d69748886e9b48f45c75fbbe

    SHA1

    aa0789d89bfbd44ca1bffe83851af95b6afb012c

    SHA256

    b4a55cfd050f4a62b1c4831ca0ab6ffadde1fe1c3f583917eade12f8c6726f61

    SHA512

    7dde268af9a2c678be8ec818ea4f12619ecc010cba39b4998d833602b42de505d36371393f33709c2eca788bc8c93634a4fd6bec29452098dbb2317f4c8847f6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4UQ4J2DQ\version-3243b6d003cf4642-rbxPkgManifest[1].txt

    Filesize

    1KB

    MD5

    a5775675c5d48ab1fa2e49fc11ba8a80

    SHA1

    937d3951a1f39675987d9f0cd10129841bdd4f70

    SHA256

    b9463b7738d248d9940d84419cfc4f1ab18d915acc8258f5a91e2f03775eb166

    SHA512

    45c93c3c51fc1d01f8a77d7bb4cfdd093685a7845b5115c00bc11104907c298cf2b62731d3a4c16732e550dbd512f1adf4d111a9f8fb13db2aadbb934d4a8cfa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\WindowsPlayer[1].json

    Filesize

    119B

    MD5

    51e8712ce7b7ddbac0e5543ac9ca0f72

    SHA1

    ebbfd987f2fb89712417899fee0d098b4d5d7467

    SHA256

    9a5862afe043c2be76f6999e4ffe0567f32d03a866ddb46db55256626328d86b

    SHA512

    e18342e81f1349a9a0042570a6164d968a759914e0249a2aed0eb7ff94dd3e2e1fde284e72dc87b3a209ab376748fd04d7379ff6c3e769cb7237779ea16f8d01

  • C:\Users\Admin\AppData\Local\Temp\CabBC20.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RBX-862C4E8C\RobloxPlayerLauncher.exe

    Filesize

    5.9MB

    MD5

    c3f868876ee8c41409d1131d79db2ced

    SHA1

    ece650a2469b9c2ace7ee40f7b1104117de4bf2d

    SHA256

    9ee56c5e776c79a9d2bb21e5224b8ac0b002638aafbb7aa25167314e41fb3afc

    SHA512

    8facfc6d06f8066c4d2a68e7297f83f429fae477d33f6f319feb3211f3d37cb528b9b6d966cfa37eabc79d261d2d35ca32016f3f5b34f38a3186da3827c1950c

  • C:\Users\Admin\AppData\Local\Temp\TarBCBF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\crashpad_roblox\settings.dat

    Filesize

    40B

    MD5

    c9e7084119bb601780389f57a30b55be

    SHA1

    8ed4f4e58bc248bc058ebf89bcfc17ad315c3fa7

    SHA256

    ba6d129aaa9c492549c9ab7da59b2b18995ee4d2ddf50b11d8bbbb613a159946

    SHA512

    ec00aa2f3c08b48c243a0fe9c9097f50200e01b3d2c692c7fc35d273f4a66867746a78a8d06fe4e114ce339b978e51658db298c810921bfea685e3855191b8b1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Z0WOG1NA.txt

    Filesize

    156B

    MD5

    74ea4ad5599582dd1b714f6011d707d7

    SHA1

    1fc1f1a94b68c2fe196ecaf7457aaed69be05da8

    SHA256

    0188f23eb51e56c3f427c67ecd855be0bc63d6960409833933cf6cee6c435a75

    SHA512

    13e7703c76c1a844ee24e7dd4aa5ead82a1a4540cff84e33d764d1030496d0be72152efec043195ba79a39a46b037e18d8ba7819a0e8406605be731360bb52c6