Overview
overview
7Static
static
3Roflection.exe
windows7-x64
7Roflection.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
3Roflection.exe
windows7-x64
7Roflection.exe
windows10-2004-x64
7d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1resources/elevate.exe
windows7-x64
3resources/elevate.exe
windows10-2004-x64
3swiftshade...GL.dll
windows7-x64
1swiftshade...GL.dll
windows10-2004-x64
1swiftshade...v2.dll
windows7-x64
1swiftshade...v2.dll
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...ec.dll
windows7-x64
3Analysis
-
max time kernel
134s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
Roflection.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Roflection.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Roflection.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Roflection.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20240704-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win7-20240708-en
Behavioral task
behavioral19
Sample
libEGL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win7-20240708-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral22
Sample
resources/elevate.exe
Resource
win7-20240705-en
Behavioral task
behavioral23
Sample
resources/elevate.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
swiftshader/libEGL.dll
Resource
win7-20240705-en
Behavioral task
behavioral25
Sample
swiftshader/libEGL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
swiftshader/libGLESv2.dll
Resource
win7-20240704-en
Behavioral task
behavioral27
Sample
swiftshader/libGLESv2.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral28
Sample
vk_swiftshader.dll
Resource
win7-20240708-en
Behavioral task
behavioral29
Sample
vk_swiftshader.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral30
Sample
vulkan-1.dll
Resource
win7-20240705-en
Behavioral task
behavioral31
Sample
vulkan-1.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240708-en
General
-
Target
Roflection.exe
-
Size
129.8MB
-
MD5
77e73e6ad584def493fda2130eef776e
-
SHA1
a41e44b19945cd8473aec091efb6fd2e177e582d
-
SHA256
d4a2c6052852ee4106cb895a9dfc6caedf3a889a371ce3478e8ff9272bfe358e
-
SHA512
bdecd5fe6dd372284ff62439bfb60f0de161d32ca9430e507466cd6ad9dad1993f50afee3b3e8d7ad886c53f42b20020db7ab652f8f582fd8e5f0fd6f80097db
-
SSDEEP
1572864:7mYWQRWtJ65M7a2iu4Rywh9hJyO9N+oJOTU8f/kmgZ2sI:K4M7a2H4Ryu+dNgI
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2232 Roflection.exe 2232 Roflection.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2404 Roflection.exe 2232 Roflection.exe 2232 Roflection.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2104 WMIC.exe Token: SeSecurityPrivilege 2104 WMIC.exe Token: SeTakeOwnershipPrivilege 2104 WMIC.exe Token: SeLoadDriverPrivilege 2104 WMIC.exe Token: SeSystemProfilePrivilege 2104 WMIC.exe Token: SeSystemtimePrivilege 2104 WMIC.exe Token: SeProfSingleProcessPrivilege 2104 WMIC.exe Token: SeIncBasePriorityPrivilege 2104 WMIC.exe Token: SeCreatePagefilePrivilege 2104 WMIC.exe Token: SeBackupPrivilege 2104 WMIC.exe Token: SeRestorePrivilege 2104 WMIC.exe Token: SeShutdownPrivilege 2104 WMIC.exe Token: SeDebugPrivilege 2104 WMIC.exe Token: SeSystemEnvironmentPrivilege 2104 WMIC.exe Token: SeRemoteShutdownPrivilege 2104 WMIC.exe Token: SeUndockPrivilege 2104 WMIC.exe Token: SeManageVolumePrivilege 2104 WMIC.exe Token: 33 2104 WMIC.exe Token: 34 2104 WMIC.exe Token: 35 2104 WMIC.exe Token: SeIncreaseQuotaPrivilege 2104 WMIC.exe Token: SeSecurityPrivilege 2104 WMIC.exe Token: SeTakeOwnershipPrivilege 2104 WMIC.exe Token: SeLoadDriverPrivilege 2104 WMIC.exe Token: SeSystemProfilePrivilege 2104 WMIC.exe Token: SeSystemtimePrivilege 2104 WMIC.exe Token: SeProfSingleProcessPrivilege 2104 WMIC.exe Token: SeIncBasePriorityPrivilege 2104 WMIC.exe Token: SeCreatePagefilePrivilege 2104 WMIC.exe Token: SeBackupPrivilege 2104 WMIC.exe Token: SeRestorePrivilege 2104 WMIC.exe Token: SeShutdownPrivilege 2104 WMIC.exe Token: SeDebugPrivilege 2104 WMIC.exe Token: SeSystemEnvironmentPrivilege 2104 WMIC.exe Token: SeRemoteShutdownPrivilege 2104 WMIC.exe Token: SeUndockPrivilege 2104 WMIC.exe Token: SeManageVolumePrivilege 2104 WMIC.exe Token: 33 2104 WMIC.exe Token: 34 2104 WMIC.exe Token: 35 2104 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2508 2232 Roflection.exe 31 PID 2232 wrote to memory of 2508 2232 Roflection.exe 31 PID 2232 wrote to memory of 2508 2232 Roflection.exe 31 PID 2508 wrote to memory of 2104 2508 cmd.exe 33 PID 2508 wrote to memory of 2104 2508 cmd.exe 33 PID 2508 wrote to memory of 2104 2508 cmd.exe 33 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2756 2232 Roflection.exe 35 PID 2232 wrote to memory of 2404 2232 Roflection.exe 36 PID 2232 wrote to memory of 2404 2232 Roflection.exe 36 PID 2232 wrote to memory of 2404 2232 Roflection.exe 36 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37 PID 2232 wrote to memory of 2216 2232 Roflection.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Roflection.exe"C:\Users\Admin\AppData\Local\Temp\Roflection.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Roflection.exe"C:\Users\Admin\AppData\Local\Temp\Roflection.exe" --type=gpu-process --field-trial-handle=1152,9000666802385754140,16217708494475289051,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1164 /prefetch:22⤵PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\Roflection.exe"C:\Users\Admin\AppData\Local\Temp\Roflection.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1152,9000666802385754140,16217708494475289051,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\Roflection.exe"C:\Users\Admin\AppData\Local\Temp\Roflection.exe" --type=gpu-process --field-trial-handle=1152,9000666802385754140,16217708494475289051,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1248 /prefetch:22⤵PID:2216
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD504bfbfec8db966420fe4c7b85ebb506a
SHA1939bb742a354a92e1dcd3661a62d69e48030a335
SHA256da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd
SHA5124ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65
-
Filesize
1.8MB
MD53072b68e3c226aff39e6782d025f25a8
SHA1cf559196d74fa490ac8ce192db222c9f5c5a006a
SHA2567fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01
SHA51261ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61