Analysis

  • max time kernel
    143s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02/08/2024, 18:59

General

  • Target

    Roflection.exe

  • Size

    129.8MB

  • MD5

    77e73e6ad584def493fda2130eef776e

  • SHA1

    a41e44b19945cd8473aec091efb6fd2e177e582d

  • SHA256

    d4a2c6052852ee4106cb895a9dfc6caedf3a889a371ce3478e8ff9272bfe358e

  • SHA512

    bdecd5fe6dd372284ff62439bfb60f0de161d32ca9430e507466cd6ad9dad1993f50afee3b3e8d7ad886c53f42b20020db7ab652f8f582fd8e5f0fd6f80097db

  • SSDEEP

    1572864:7mYWQRWtJ65M7a2iu4Rywh9hJyO9N+oJOTU8f/kmgZ2sI:K4M7a2H4Ryu+dNgI

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roflection.exe
    "C:\Users\Admin\AppData\Local\Temp\Roflection.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4288
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2092
    • C:\Users\Admin\AppData\Local\Temp\Roflection.exe
      "C:\Users\Admin\AppData\Local\Temp\Roflection.exe" --type=gpu-process --field-trial-handle=1740,11789198850623393841,15556746955359359900,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1748 /prefetch:2
      2⤵
        PID:4416
      • C:\Users\Admin\AppData\Local\Temp\Roflection.exe
        "C:\Users\Admin\AppData\Local\Temp\Roflection.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1740,11789198850623393841,15556746955359359900,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1996 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2692
      • C:\Users\Admin\AppData\Local\Temp\Roflection.exe
        "C:\Users\Admin\AppData\Local\Temp\Roflection.exe" --type=gpu-process --field-trial-handle=1740,11789198850623393841,15556746955359359900,131072 --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2116 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2344
    • C:\Windows\System32\CompPkgSrv.exe
      C:\Windows\System32\CompPkgSrv.exe -Embedding
      1⤵
        PID:1128

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\96ff0c8a-9cf2-465f-aaef-dcd3024cba49.tmp.node

              Filesize

              137KB

              MD5

              04bfbfec8db966420fe4c7b85ebb506a

              SHA1

              939bb742a354a92e1dcd3661a62d69e48030a335

              SHA256

              da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd

              SHA512

              4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65

            • C:\Users\Admin\AppData\Local\Temp\eb264515-a8b9-4fb9-831f-1388a0878dd5.tmp.node

              Filesize

              1.8MB

              MD5

              3072b68e3c226aff39e6782d025f25a8

              SHA1

              cf559196d74fa490ac8ce192db222c9f5c5a006a

              SHA256

              7fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01

              SHA512

              61ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61

            • memory/4416-12-0x00007FFE32EC0000-0x00007FFE32EC1000-memory.dmp

              Filesize

              4KB

            • memory/4416-13-0x00000183AABA0000-0x00000183AAC0F000-memory.dmp

              Filesize

              444KB