Analysis
-
max time kernel
54s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
roblox account manager.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
roblox account manager.exe
Resource
win10v2004-20240802-en
General
-
Target
roblox account manager.exe
-
Size
5.4MB
-
MD5
334728f32a1144c893fdffc579a7709b
-
SHA1
97d2eb634d45841c1453749acb911ce1303196c0
-
SHA256
be9ddcdedf8c36c64e6b0a32d2686b74a112913c54217ccaa46675bfd1dc82f1
-
SHA512
5df9d63136098d23918eba652b44a87e979430b2ce3e78a3eb8faef3dd4bd9599d6c31980f9eaf2bd6a071e966421bc6cec950c28b3b917f90130e8a582c2a1f
-
SSDEEP
98304:42bT1Qm7d9G4/Ml61KO9bjRxMLywnrmYa0kqXf0FJ7WLhrBzcgPgL6b:/Qm59RMowO9bjRmmYiYa0kSIJ7zgPE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language roblox account manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language roblox account manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000af71d3de4d25a8f3a8b11a7b6797938a8ccb445b7dcc16d9fae608eaf836f43b000000000e8000000002000020000000a30f3294feaf43c8fc08faed6e9ac916de2ca759f1c0e4f423ee0d60950b9eee20000000949203f186d27a56779db96711b2aec1692d673c572c5bc6f5393d44e4b85de54000000019dc7e41ebd73b7f52277ca6870e37c992398fa973c98ae7394854649d21ae5514b3a45fb1be26ae8e51a7a8094fec22e81452b205637502480d93526dc12b74 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a6d7d027e5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F94C3F51-511A-11EF-B4D0-D238DC34531D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "21" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000c503e955a7045224769f60e996b6c2fdae3bb1d114487ab0063ac0cff149f7ce000000000e800000000200002000000026e24493c95b76fb648f4b11867561115c47497c88d479efe6a6a6ba8d2b54a590000000c23aa59a50c77eaa7d54425c60ce9ee184b43e64056fff2c760cdc7e2b293aeef38917b32f5eb08966ab06844472d252f51ff2f237aae888a6bb09e81b1a72ee3c5db2966174fc958e311c950ac621119aa9f9ac85dafd6ac4862bbdc26037a973ea98bc568ad6f9887a70d0d6fb0d30c770f69bf66b7ab662420cc68e50d9f191d90bfd25ed8ec5fe6bcc6c33e913e8400000007264681eae55312251766a93c64de5af99003a42c8cb852bf61e4809ae28c8205e7a1a628f01995008d9cf91ea6ff7610b03ca2534a09209cbf8212d97a9d7d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2152 2116 roblox account manager.exe 31 PID 2116 wrote to memory of 2152 2116 roblox account manager.exe 31 PID 2116 wrote to memory of 2152 2116 roblox account manager.exe 31 PID 2116 wrote to memory of 2152 2116 roblox account manager.exe 31 PID 2152 wrote to memory of 2296 2152 roblox account manager.exe 32 PID 2152 wrote to memory of 2296 2152 roblox account manager.exe 32 PID 2152 wrote to memory of 2296 2152 roblox account manager.exe 32 PID 2152 wrote to memory of 2296 2152 roblox account manager.exe 32 PID 2296 wrote to memory of 2868 2296 iexplore.exe 33 PID 2296 wrote to memory of 2868 2296 iexplore.exe 33 PID 2296 wrote to memory of 2868 2296 iexplore.exe 33 PID 2296 wrote to memory of 2868 2296 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\roblox account manager.exe"C:\Users\Admin\AppData\Local\Temp\roblox account manager.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\roblox account manager.exe"C:\Users\Admin\AppData\Local\Temp\roblox account manager.exe" -restart2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=roblox account manager.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d3ea20be5004f68b53ecf438088bfe2
SHA1eae22c04d239cdc5e8ef68bb66509478f2464b0c
SHA256976e4d15064a984750bba4c2456889c56ab6f1f409dcb33ec5825dd486ed6de3
SHA512a02c422a038153099fec2a6ea2f8b231488cfb79c0cc829289c491b4018c22d1ec34a64f4d18a54f78add5f3beae78cf76cac938dbbf7dcdebcd3f82ed62f546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05488b9dc17b031aaca35be14e4dc27
SHA18d677176379bea6302ef7fe89d81c01ced8ced1b
SHA2564c066c9f32ffff5f44c8e4447d50bf104dd98f1c4649aff17ea192a53b860568
SHA51249aee9e02a38c83554ad6c453cea856e3f447a50a5067f4ae47fe4fda358c133fc60b13fb8110f00c819c8a65e1ae8934a560b2fa884ca4ad2d65e562f61bcf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549bff3729ed81ce91aa63a80e68e1e08
SHA1357c92d9c0b1c18264675f971df9143551aab610
SHA25642f3bc59ae2ad2222a2d66d038195c7e36ddd076017c188886364b424b416604
SHA51235823fd87a470c016769cfbfd409a469e1c29a6807f98f0d25c3670eae8576d30e2830a244ac7a68eb822f588af70330f0de649531d1a61d5363a4b49eb5239b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56144dfd523925223722708fa3d019da9
SHA1be27529d2bf875a34d9389fdf12ca8e5ed1b531b
SHA256a2235800cbc66fbe5ca134bea10820b2516c31dea7fce5a69efc8b4492a0e0b7
SHA512f0cd37788dd1f1696956d0d5826772d02304881b0550f3188fbac8510cb4a0d5a51668e0baba476958d8513b1bc447c27219721f371943ec7b0d6903501d332d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554bdf07349b1d0fc46926f8c98c20141
SHA1ec14b0da99f172e09b7c475c2c2bc4d9999e763c
SHA256cca6b88dcd27f071f7b7ad15b2d4d8db7769d4eade5bfa4cdc7ce08b0783baeb
SHA5126d70016550aaf29766a5c659f7f87bb5671966415a56830bc4d7413e89bd61bb1d7cfc7719f401b8b6e602844d7761cd15c3f1f6cdc93ae3860d9f2576c31b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bb585962439edb0033e16bdc161d822
SHA14fa20789b1dd8d85047a17d33474c21387746f34
SHA2563d0774229cc152eefc51e9408aea79dccd81de887fdc47a02b2155a7429fa1e5
SHA512d63ec24dd15c5f8a96073a0d44939b360b492cf857ac494d65e3e84cbdd0e842e238ab16561d15f514d75bfcb13a51663671a37a0646ee7203207e30b7c33904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd118d271f2322311ca9f63b4e91fcb
SHA1212845dfac1ad119fd3f423d775a5b1a27ce461f
SHA256a5b1a286b801ca13ff878dcdc2b649e8096dfaac1b08df633522134ffa0eafb6
SHA512fe385d45276bd6cd926051722fd8d845e3c0a42a8a884c54a979df04cd3d909c8f411f8ed5ed0be1263c27203c87645375a09cbad5e73238e77cfb1e5d88d4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22bca77f9519857e17e11b644180d40
SHA1279059be3212086bc5a250b441ce9dd4c4379803
SHA256b5647c5ea95bff4fd6f4f8687f4d666069c57ba559ec3ca615d19189164a3b76
SHA512eeb41d1a64ba364a691ac00b81517144bc9def8f3d81f5166fd80dd8259a679d7f604f876a2957b52d682990a95156e9a43cabb4dc383723e0e2504c3aabb18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a04d8c133a2ba568bba5ef8d893972
SHA1eaa3a688d2fd1bfd13fce2fd27fff2741fa67c93
SHA2562792423a853e3a14d082d561602d3ad3683bbde24cff4ea3db6a8b8775923907
SHA512dc22cdf98fa299918e1a173d7cc1d3e69141652190c768289dca42da480a1355a82b78576ab9a40a52c76b116bb130e0c23b94205e43047ed1bd024c9f08c674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1a5f78ed2343f1ab98d949029fe459
SHA1dba55aceec209da607ce4daa119dde10cd5d3644
SHA2561c5d4ed248bc1cc0762c41a73bb0bbed34ce21a0299ebd0ccddf6d366ee35d5f
SHA512b0c4350f2d360e50518eba0ef14a067ffa3c10c06521976be1811703c61c6fbc208a4eee94de8610f40cb23b1977a56f30dbf3a92a612b110ea473df500be6dd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
6KB
MD50a86fa27d09e26491dbbb4fe27f4b410
SHA163e4b5afb8bdb67fc1d6f8dddeb40be20939289e
SHA2562b6d99db8369b0ff6372737d89d1c9e4101815b4168a3852c7b513f2897e7f3d
SHA512fbebc4dc0925d5d67271cac04c1ed324091442ef4c9f6243d2c1c523c9aa6b338c6a594e4987fc142dd3b2a023338a267c8a3454e47fbf0b3e0dbd7b3b65cc0d