Analysis

  • max time kernel
    442s
  • max time network
    444s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-07-2024 19:03

General

  • Target

    Roblox Account Manager.exe

  • Size

    5.4MB

  • MD5

    334728f32a1144c893fdffc579a7709b

  • SHA1

    97d2eb634d45841c1453749acb911ce1303196c0

  • SHA256

    be9ddcdedf8c36c64e6b0a32d2686b74a112913c54217ccaa46675bfd1dc82f1

  • SHA512

    5df9d63136098d23918eba652b44a87e979430b2ce3e78a3eb8faef3dd4bd9599d6c31980f9eaf2bd6a071e966421bc6cec950c28b3b917f90130e8a582c2a1f

  • SSDEEP

    98304:42bT1Qm7d9G4/Ml61KO9bjRxMLywnrmYa0kqXf0FJ7WLhrBzcgPgL6b:/Qm59RMowO9bjRmmYiYa0kSIJ7zgPE

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:544
    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
      "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp
        "C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" /q /norestart
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4076
        • C:\Windows\Temp\{9A7B5354-ED7C-46AA-8C5D-51AAEE66E23C}\.cr\vcredist.tmp
          "C:\Windows\Temp\{9A7B5354-ED7C-46AA-8C5D-51AAEE66E23C}\.cr\vcredist.tmp" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" -burn.filehandle.attached=544 -burn.filehandle.self=552 /q /norestart
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:3612
          • C:\Windows\Temp\{7EE583D2-C94D-4199-9484-DB2BF80C35FF}\.be\VC_redist.x86.exe
            "C:\Windows\Temp\{7EE583D2-C94D-4199-9484-DB2BF80C35FF}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{0F4CE891-E3EB-4C19-B2C7-C1232B86D7D1} {D0D71CA5-D9DD-4BF9-BF3F-FABFB6B1E50F} 3612
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Modifies registry class
            PID:3632
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 1552
            5⤵
            • Program crash
            PID:4964
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:2172
  • C:\Windows\system32\srtasks.exe
    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4840
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3612 -ip 3612
    1⤵
      PID:3532

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Roblox Account Manager.exe.log

      Filesize

      1KB

      MD5

      a02e8a8a790f0e0861e3b6b0dbe56062

      SHA1

      a3e65805e5c78641cafebc1052906d7350da9d2e

      SHA256

      7fada0f81b63e1ecb265e9620ace8f5f0d40773626081849f5d98e668bc4e594

      SHA512

      108a81f818aa027834d621c771e427ee3f300c59d9dc10d853b94b1e8d635cf6bc06338dce31da30b08660c6fb06a39f9069c983bb585049f5fe9f50b753eb42

    • C:\Users\Admin\AppData\Local\Temp\RAMTheme.ini

      Filesize

      314B

      MD5

      f18fa783f4d27e35e54e54417334bfb4

      SHA1

      94511cdf37213bebdaf42a6140c9fe5be8eb07ba

      SHA256

      563eb35fd613f4298cd4dceff67652a13ba516a6244d9407c5709323c4ca4bb1

      SHA512

      602f6a68562bc89a4b3c3a71c2477377f161470bf8ae8e6925bf35691367115abfa9809925bd09c35596c6a3e5a7e9d090e5198e6a885a6658049c8732a05071

    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe.config

      Filesize

      6KB

      MD5

      0a86fa27d09e26491dbbb4fe27f4b410

      SHA1

      63e4b5afb8bdb67fc1d6f8dddeb40be20939289e

      SHA256

      2b6d99db8369b0ff6372737d89d1c9e4101815b4168a3852c7b513f2897e7f3d

      SHA512

      fbebc4dc0925d5d67271cac04c1ed324091442ef4c9f6243d2c1c523c9aa6b338c6a594e4987fc142dd3b2a023338a267c8a3454e47fbf0b3e0dbd7b3b65cc0d

    • C:\Users\Admin\AppData\Local\Temp\log4.config

      Filesize

      936B

      MD5

      e4659ac08af3582a23f38bf6c562f841

      SHA1

      19cb4f014ba96285fa1798f008deabce632c7e76

      SHA256

      e4b10630d9ec2af508de31752fbbc6816c7426c40a3e57f0a085ce7f42c77bd5

      SHA512

      5bfa1e021cc7ee5e7a00da865d68684202b3b92d3d369b85b80c591fffa67725d434398325dc1e37c659eab62c0a4118b3e279ac0096b95790d252ceb6254249

    • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp

      Filesize

      13.2MB

      MD5

      8457542fd4be74cb2c3a92b3386ae8e9

      SHA1

      198722b4f5fc62721910569d9d926dce22730c22

      SHA256

      a32dd41eaab0c5e1eaa78be3c0bb73b48593de8d97a7510b97de3fd993538600

      SHA512

      91a6283f774f9e2338b65aa835156854e9e76aed32f821b13cfd070dd6c87e1542ce2d5845beb5e4af1ddb102314bb6e0ad6214d896bb3e387590a01eae0c182

    • C:\Windows\Temp\{7EE583D2-C94D-4199-9484-DB2BF80C35FF}\.ba\logo.png

      Filesize

      1KB

      MD5

      d6bd210f227442b3362493d046cea233

      SHA1

      ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

      SHA256

      335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

      SHA512

      464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

    • C:\Windows\Temp\{7EE583D2-C94D-4199-9484-DB2BF80C35FF}\.ba\wixstdba.dll

      Filesize

      191KB

      MD5

      eab9caf4277829abdf6223ec1efa0edd

      SHA1

      74862ecf349a9bedd32699f2a7a4e00b4727543d

      SHA256

      a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

      SHA512

      45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2

    • C:\Windows\Temp\{9A7B5354-ED7C-46AA-8C5D-51AAEE66E23C}\.cr\vcredist.tmp

      Filesize

      634KB

      MD5

      337b547d2771fdad56de13ac94e6b528

      SHA1

      3aeecc5933e7d8977e7a3623e8e44d4c3d0b4286

      SHA256

      81873c2f6c8bc4acaad66423a1b4d90e70214e59710ea7f11c8aeb069acd4cd0

      SHA512

      0d0102fafb7f471a6836708d81952f2c90c2b126ad1b575f2e2e996540c99f7275ebd1f570cafcc945d26700debb1e86b19b090ae5cdec2326dd0a6a918b7a36

    • memory/544-7-0x0000000005E50000-0x0000000005E6E000-memory.dmp

      Filesize

      120KB

    • memory/544-6-0x0000000005E20000-0x0000000005E46000-memory.dmp

      Filesize

      152KB

    • memory/544-5-0x0000000005EC0000-0x0000000005F52000-memory.dmp

      Filesize

      584KB

    • memory/544-14-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/544-4-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/544-0-0x00000000750FE000-0x00000000750FF000-memory.dmp

      Filesize

      4KB

    • memory/544-3-0x0000000005D20000-0x0000000005D66000-memory.dmp

      Filesize

      280KB

    • memory/544-2-0x00000000063D0000-0x0000000006974000-memory.dmp

      Filesize

      5.6MB

    • memory/544-1-0x0000000000FC0000-0x000000000152C000-memory.dmp

      Filesize

      5.4MB

    • memory/2680-23-0x000000000B2C0000-0x000000000B2FA000-memory.dmp

      Filesize

      232KB

    • memory/2680-20-0x0000000006460000-0x000000000646A000-memory.dmp

      Filesize

      40KB

    • memory/2680-24-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2680-25-0x000000000BF60000-0x000000000BF6A000-memory.dmp

      Filesize

      40KB

    • memory/2680-26-0x000000000BF80000-0x000000000C020000-memory.dmp

      Filesize

      640KB

    • memory/2680-31-0x000000000C4B0000-0x000000000C508000-memory.dmp

      Filesize

      352KB

    • memory/2680-33-0x000000000D880000-0x000000000D932000-memory.dmp

      Filesize

      712KB

    • memory/2680-34-0x000000000DA80000-0x000000000DAA2000-memory.dmp

      Filesize

      136KB

    • memory/2680-35-0x000000000DAB0000-0x000000000DBA4000-memory.dmp

      Filesize

      976KB

    • memory/2680-37-0x000000000DBD0000-0x000000000DBD8000-memory.dmp

      Filesize

      32KB

    • memory/2680-36-0x000000000DBA0000-0x000000000DBBA000-memory.dmp

      Filesize

      104KB

    • memory/2680-22-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2680-19-0x00000000062B0000-0x0000000006324000-memory.dmp

      Filesize

      464KB

    • memory/2680-16-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2680-15-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2680-100-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2680-105-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2680-107-0x0000000002F40000-0x0000000002F4A000-memory.dmp

      Filesize

      40KB

    • memory/2680-108-0x000000000C7B0000-0x000000000C7C2000-memory.dmp

      Filesize

      72KB

    • memory/2680-275-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2680-276-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB