Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 15:40

General

  • Target

    Roblox Account Manager.exe

  • Size

    5.5MB

  • MD5

    eb54116db322c49ec2faca86f725931e

  • SHA1

    c703685ac6221d7de624039d7351886b21ca53fc

  • SHA256

    5c7d96455bbb045cb3cb3726d7b4fff2d0810a21d7fdb34ad134696aa7f47d5e

  • SHA512

    ef6ea52df848bf8c7c77831ee5ca64cf337a92edbb0e8d0d38844e204157545aa3c397eeea12d05f276ce4984f519a1a05cf21bc04514fbb35beebf86d7f8e78

  • SSDEEP

    98304:8H6+2bT1Qm7d9G3s2tIfKLUXk8zdywnr5a0kqXf0Fb7WnZhP+MQuPN5Ppauz+l:5Qm59siyLU0lY9a0kSIb7aZhP+MQuPNw

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
      "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart
      2⤵
      • Checks computer location settings
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:432
      • C:\Users\Admin\AppData\Local\Temp\Auto Update.exe
        "C:\Users\Admin\AppData\Local\Temp\Auto Update.exe" -update
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5092
        • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
          "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1588
          • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
            "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart
            5⤵
            • Executes dropped EXE
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4016
            • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp
              "C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" /q /norestart
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1604
              • C:\Windows\Temp\{A0A18D1F-8A6A-4EF4-96B5-50BE88C165CE}\.cr\vcredist.tmp
                "C:\Windows\Temp\{A0A18D1F-8A6A-4EF4-96B5-50BE88C165CE}\.cr\vcredist.tmp" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" -burn.filehandle.attached=544 -burn.filehandle.self=552 /q /norestart
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:3304
                • C:\Windows\Temp\{1DEE6E36-0738-4ED7-86C6-36822627C4FA}\.be\VC_redist.x86.exe
                  "C:\Windows\Temp\{1DEE6E36-0738-4ED7-86C6-36822627C4FA}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{53B0B7E6-B766-413A-B2E1-86EE42206415} {5D663800-7198-4DE4-A032-8BBA071A9E86} 3304
                  8⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Modifies registry class
                  PID:1704
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 1564
                  8⤵
                  • Program crash
                  PID:4624
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:2900
  • C:\Windows\system32\srtasks.exe
    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3016
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3304 -ip 3304
    1⤵
      PID:4072

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Roblox Account Manager.exe.log

            Filesize

            1KB

            MD5

            a02e8a8a790f0e0861e3b6b0dbe56062

            SHA1

            a3e65805e5c78641cafebc1052906d7350da9d2e

            SHA256

            7fada0f81b63e1ecb265e9620ace8f5f0d40773626081849f5d98e668bc4e594

            SHA512

            108a81f818aa027834d621c771e427ee3f300c59d9dc10d853b94b1e8d635cf6bc06338dce31da30b08660c6fb06a39f9069c983bb585049f5fe9f50b753eb42

          • C:\Users\Admin\AppData\Local\Temp\Auto Update.exe

            Filesize

            5.5MB

            MD5

            eb54116db322c49ec2faca86f725931e

            SHA1

            c703685ac6221d7de624039d7351886b21ca53fc

            SHA256

            5c7d96455bbb045cb3cb3726d7b4fff2d0810a21d7fdb34ad134696aa7f47d5e

            SHA512

            ef6ea52df848bf8c7c77831ee5ca64cf337a92edbb0e8d0d38844e204157545aa3c397eeea12d05f276ce4984f519a1a05cf21bc04514fbb35beebf86d7f8e78

          • C:\Users\Admin\AppData\Local\Temp\RAMSettings.ini

            Filesize

            1014B

            MD5

            1d917eaf5dcc8e06dd032c33f3a3d36a

            SHA1

            1eacb4eced22393fd5140910d30070f2e054e2fe

            SHA256

            787fa9af1c32b7e198119469c0e2c02c06b34ec7c990b62b9f4fb9bc8cedaa5f

            SHA512

            3cf5bc6160262ad454477cc0fab401696a7e5dff9e6fae1cdcfa0579ded640ea8c383dfcea6194f55c914927058e2355fd661d1fa83f87c10aeffa6a91cb9fcd

          • C:\Users\Admin\AppData\Local\Temp\RAMSettings.ini

            Filesize

            942B

            MD5

            f99fcdcfd630d18e441188092a56ae6a

            SHA1

            ffda4080b708554f32cd1fe1545298b40ce456f6

            SHA256

            3596dd7a1aa6d5ea2e030b7fc1b04e0eb4e58b01b4edd8d8f6d1882cfbea37fe

            SHA512

            291d4d942f8752c8eb1dee4d6f68c2d2b15e8e426f271968eb372470faca9bb6866184a4ee2b9e0d91f38b45327440c4f18601c1a16bfda2b98cfe524db69f62

          • C:\Users\Admin\AppData\Local\Temp\RAMTheme.ini

            Filesize

            314B

            MD5

            f18fa783f4d27e35e54e54417334bfb4

            SHA1

            94511cdf37213bebdaf42a6140c9fe5be8eb07ba

            SHA256

            563eb35fd613f4298cd4dceff67652a13ba516a6244d9407c5709323c4ca4bb1

            SHA512

            602f6a68562bc89a4b3c3a71c2477377f161470bf8ae8e6925bf35691367115abfa9809925bd09c35596c6a3e5a7e9d090e5198e6a885a6658049c8732a05071

          • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe

            Filesize

            5.4MB

            MD5

            334728f32a1144c893fdffc579a7709b

            SHA1

            97d2eb634d45841c1453749acb911ce1303196c0

            SHA256

            be9ddcdedf8c36c64e6b0a32d2686b74a112913c54217ccaa46675bfd1dc82f1

            SHA512

            5df9d63136098d23918eba652b44a87e979430b2ce3e78a3eb8faef3dd4bd9599d6c31980f9eaf2bd6a071e966421bc6cec950c28b3b917f90130e8a582c2a1f

          • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe.config

            Filesize

            6KB

            MD5

            d5e4966de947333592289d70916257a9

            SHA1

            5907df0fd07df6c33926906e94f4ed08d40be017

            SHA256

            d726d47b772a70fabc777c8ed46655fe5200e672f01f11dd95c5f4994e0a71e0

            SHA512

            c618054766bee664f0605a037f065c196c35495ee993b305f0bece4738ec9f7bd632dc8fb541bcf9d156f12e115455f31dd8db2a8cceb9d7d2f0d05d501831e9

          • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe.config

            Filesize

            6KB

            MD5

            0a86fa27d09e26491dbbb4fe27f4b410

            SHA1

            63e4b5afb8bdb67fc1d6f8dddeb40be20939289e

            SHA256

            2b6d99db8369b0ff6372737d89d1c9e4101815b4168a3852c7b513f2897e7f3d

            SHA512

            fbebc4dc0925d5d67271cac04c1ed324091442ef4c9f6243d2c1c523c9aa6b338c6a594e4987fc142dd3b2a023338a267c8a3454e47fbf0b3e0dbd7b3b65cc0d

          • C:\Users\Admin\AppData\Local\Temp\log.txt

            Filesize

            158B

            MD5

            1d0f9c3513765fa657ea85d3e92ba425

            SHA1

            c564f520aac21da6fac6573bc250da20c99f90f4

            SHA256

            584948b373bad351865223cdce3d5787021d5fd36e889329f9ccb48d119f25a4

            SHA512

            350658eff814c17e608102b03f801fa24cbee7c7fcb07c539658262c5012e6d59d6af384c70a63e5589fe8c1c3f148fafad1bd530fe2968e432f5dee9f28b3ba

          • C:\Users\Admin\AppData\Local\Temp\log.txt

            Filesize

            585B

            MD5

            de84b46cd8e9b6807d849f35a60a8f7e

            SHA1

            5b0740399a9c5c7b99eff1656ed87915b36995b2

            SHA256

            6b69f9fba1cbe882971967e0fa38544c5a1443b09e76a40609ac4dffe5923cd0

            SHA512

            9d5b6555f173e560a1fa467898376cb6134eebd40e37bfe1b47cb0d88c1c16be1cfdf2d2c42106c9beab727c08eeac94a017d469fd0ecd5e1b4c4bd728c5617c

          • C:\Users\Admin\AppData\Local\Temp\log4.config

            Filesize

            936B

            MD5

            e4659ac08af3582a23f38bf6c562f841

            SHA1

            19cb4f014ba96285fa1798f008deabce632c7e76

            SHA256

            e4b10630d9ec2af508de31752fbbc6816c7426c40a3e57f0a085ce7f42c77bd5

            SHA512

            5bfa1e021cc7ee5e7a00da865d68684202b3b92d3d369b85b80c591fffa67725d434398325dc1e37c659eab62c0a4118b3e279ac0096b95790d252ceb6254249

          • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp

            Filesize

            13.2MB

            MD5

            8457542fd4be74cb2c3a92b3386ae8e9

            SHA1

            198722b4f5fc62721910569d9d926dce22730c22

            SHA256

            a32dd41eaab0c5e1eaa78be3c0bb73b48593de8d97a7510b97de3fd993538600

            SHA512

            91a6283f774f9e2338b65aa835156854e9e76aed32f821b13cfd070dd6c87e1542ce2d5845beb5e4af1ddb102314bb6e0ad6214d896bb3e387590a01eae0c182

          • C:\Windows\Temp\{1DEE6E36-0738-4ED7-86C6-36822627C4FA}\.ba\logo.png

            Filesize

            1KB

            MD5

            d6bd210f227442b3362493d046cea233

            SHA1

            ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

            SHA256

            335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

            SHA512

            464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

          • C:\Windows\Temp\{1DEE6E36-0738-4ED7-86C6-36822627C4FA}\.ba\wixstdba.dll

            Filesize

            191KB

            MD5

            eab9caf4277829abdf6223ec1efa0edd

            SHA1

            74862ecf349a9bedd32699f2a7a4e00b4727543d

            SHA256

            a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

            SHA512

            45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2

          • C:\Windows\Temp\{A0A18D1F-8A6A-4EF4-96B5-50BE88C165CE}\.cr\vcredist.tmp

            Filesize

            634KB

            MD5

            337b547d2771fdad56de13ac94e6b528

            SHA1

            3aeecc5933e7d8977e7a3623e8e44d4c3d0b4286

            SHA256

            81873c2f6c8bc4acaad66423a1b4d90e70214e59710ea7f11c8aeb069acd4cd0

            SHA512

            0d0102fafb7f471a6836708d81952f2c90c2b126ad1b575f2e2e996540c99f7275ebd1f570cafcc945d26700debb1e86b19b090ae5cdec2326dd0a6a918b7a36

          • memory/432-34-0x000000000DEB0000-0x000000000DF86000-memory.dmp

            Filesize

            856KB

          • memory/432-36-0x000000000DFA0000-0x000000000DFA8000-memory.dmp

            Filesize

            32KB

          • memory/432-23-0x0000000074F30000-0x00000000756E0000-memory.dmp

            Filesize

            7.7MB

          • memory/432-24-0x000000000C380000-0x000000000C420000-memory.dmp

            Filesize

            640KB

          • memory/432-25-0x000000000BC60000-0x000000000BC6A000-memory.dmp

            Filesize

            40KB

          • memory/432-30-0x000000000C8F0000-0x000000000C948000-memory.dmp

            Filesize

            352KB

          • memory/432-32-0x000000000DC80000-0x000000000DD32000-memory.dmp

            Filesize

            712KB

          • memory/432-33-0x000000000DE80000-0x000000000DEA2000-memory.dmp

            Filesize

            136KB

          • memory/432-22-0x000000000B810000-0x000000000B844000-memory.dmp

            Filesize

            208KB

          • memory/432-19-0x00000000069B0000-0x00000000069BA000-memory.dmp

            Filesize

            40KB

          • memory/432-35-0x000000000DF80000-0x000000000DF9A000-memory.dmp

            Filesize

            104KB

          • memory/432-21-0x0000000074F30000-0x00000000756E0000-memory.dmp

            Filesize

            7.7MB

          • memory/432-50-0x0000000074F30000-0x00000000756E0000-memory.dmp

            Filesize

            7.7MB

          • memory/432-14-0x0000000074F30000-0x00000000756E0000-memory.dmp

            Filesize

            7.7MB

          • memory/432-16-0x0000000074F30000-0x00000000756E0000-memory.dmp

            Filesize

            7.7MB

          • memory/432-18-0x0000000006810000-0x0000000006884000-memory.dmp

            Filesize

            464KB

          • memory/1588-70-0x0000000005490000-0x00000000054D6000-memory.dmp

            Filesize

            280KB

          • memory/1588-69-0x00000000006E0000-0x0000000000C4C000-memory.dmp

            Filesize

            5.4MB

          • memory/4016-80-0x000000000B870000-0x000000000B8AA000-memory.dmp

            Filesize

            232KB

          • memory/4016-81-0x000000000BC70000-0x000000000BD10000-memory.dmp

            Filesize

            640KB

          • memory/4016-87-0x000000000D970000-0x000000000DA64000-memory.dmp

            Filesize

            976KB

          • memory/4636-0-0x0000000074F3E000-0x0000000074F3F000-memory.dmp

            Filesize

            4KB

          • memory/4636-7-0x0000000005150000-0x000000000516E000-memory.dmp

            Filesize

            120KB

          • memory/4636-61-0x0000000074F30000-0x00000000756E0000-memory.dmp

            Filesize

            7.7MB

          • memory/4636-6-0x0000000005110000-0x0000000005136000-memory.dmp

            Filesize

            152KB

          • memory/4636-5-0x0000000005240000-0x00000000052D2000-memory.dmp

            Filesize

            584KB

          • memory/4636-4-0x0000000005080000-0x00000000050C6000-memory.dmp

            Filesize

            280KB

          • memory/4636-3-0x0000000074F30000-0x00000000756E0000-memory.dmp

            Filesize

            7.7MB

          • memory/4636-2-0x0000000005750000-0x0000000005CF4000-memory.dmp

            Filesize

            5.6MB

          • memory/4636-1-0x0000000000180000-0x00000000006FA000-memory.dmp

            Filesize

            5.5MB

          • memory/5092-53-0x0000000009EE0000-0x0000000009EF2000-memory.dmp

            Filesize

            72KB

          • memory/5092-52-0x0000000009EB0000-0x0000000009EBA000-memory.dmp

            Filesize

            40KB

          • memory/5092-54-0x0000000009F80000-0x0000000009FF6000-memory.dmp

            Filesize

            472KB

          • memory/5092-60-0x000000000B800000-0x000000000B81E000-memory.dmp

            Filesize

            120KB