Resubmissions

02-08-2024 20:14

240802-y1f3hstcnb 3

02-08-2024 20:12

240802-yzbreaybqm 3

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 20:14

General

  • Target

    MultiRoblox.exe

  • Size

    385KB

  • MD5

    71e0e5934fac9fd05f128260c44f2bfe

  • SHA1

    3a4961008dae57c1ff152d9409e5972978c71e1a

  • SHA256

    a70d57d1b4f58d32da1f318e768c86b57e83a856f8731d3bf19e3105f71f8ed0

  • SHA512

    0827c7d0a6b7198b6c2bb644871161c7134596ff0fe171094a9362782172f8ceb015ab16c1f096cee9bd284954dac0907c1a42ab26cd4accfd54a33f9dc3cc91

  • SSDEEP

    3072:RO1d4Nlu6sJ49X8JdQkM0GLkXkgPksD8P9uztuNx8vNP5N6:ReHJ5JWb0CkXkg4UzQyvB

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MultiRoblox.exe
    "C:\Users\Admin\AppData\Local\Temp\MultiRoblox.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2524
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\StepHide.mpeg"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3044
  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\ConvertToStep.js"
    1⤵
      PID:2648
    • C:\Windows\system32\SndVol.exe
      SndVol.exe -f 46072987 28169
      1⤵
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:576

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2524-0-0x0000000074E3E000-0x0000000074E3F000-memory.dmp

      Filesize

      4KB

    • memory/2524-1-0x0000000001140000-0x00000000011A8000-memory.dmp

      Filesize

      416KB

    • memory/2524-2-0x0000000074E30000-0x000000007551E000-memory.dmp

      Filesize

      6.9MB

    • memory/2524-8-0x0000000074E3E000-0x0000000074E3F000-memory.dmp

      Filesize

      4KB

    • memory/2524-9-0x0000000074E30000-0x000000007551E000-memory.dmp

      Filesize

      6.9MB

    • memory/3044-11-0x000007FEF74B0000-0x000007FEF74E4000-memory.dmp

      Filesize

      208KB

    • memory/3044-10-0x000000013FAD0000-0x000000013FBC8000-memory.dmp

      Filesize

      992KB

    • memory/3044-13-0x000007FEFBF20000-0x000007FEFBF38000-memory.dmp

      Filesize

      96KB

    • memory/3044-14-0x000007FEFB940000-0x000007FEFB957000-memory.dmp

      Filesize

      92KB

    • memory/3044-15-0x000007FEF8020000-0x000007FEF8031000-memory.dmp

      Filesize

      68KB

    • memory/3044-16-0x000007FEF7360000-0x000007FEF7377000-memory.dmp

      Filesize

      92KB

    • memory/3044-17-0x000007FEF7340000-0x000007FEF7351000-memory.dmp

      Filesize

      68KB

    • memory/3044-18-0x000007FEF6D70000-0x000007FEF6D8D000-memory.dmp

      Filesize

      116KB

    • memory/3044-19-0x000007FEF6D50000-0x000007FEF6D61000-memory.dmp

      Filesize

      68KB

    • memory/3044-12-0x000007FEF6710000-0x000007FEF69C6000-memory.dmp

      Filesize

      2.7MB

    • memory/3044-21-0x000007FEF5450000-0x000007FEF565B000-memory.dmp

      Filesize

      2.0MB

    • memory/3044-29-0x000007FEF5430000-0x000007FEF5441000-memory.dmp

      Filesize

      68KB

    • memory/3044-31-0x000007FEF53E0000-0x000007FEF5410000-memory.dmp

      Filesize

      192KB

    • memory/3044-28-0x000007FEF6C30000-0x000007FEF6C4B000-memory.dmp

      Filesize

      108KB

    • memory/3044-35-0x000007FEF5270000-0x000007FEF52C7000-memory.dmp

      Filesize

      348KB

    • memory/3044-22-0x000007FEF6D00000-0x000007FEF6D41000-memory.dmp

      Filesize

      260KB

    • memory/3044-42-0x000007FEF4430000-0x000007FEF4441000-memory.dmp

      Filesize

      68KB

    • memory/3044-41-0x000007FEF5180000-0x000007FEF5192000-memory.dmp

      Filesize

      72KB

    • memory/3044-40-0x000007FEF51A0000-0x000007FEF51B1000-memory.dmp

      Filesize

      68KB

    • memory/3044-39-0x000007FEF51C0000-0x000007FEF51E3000-memory.dmp

      Filesize

      140KB

    • memory/3044-38-0x000007FEF51F0000-0x000007FEF5208000-memory.dmp

      Filesize

      96KB

    • memory/3044-37-0x000007FEF5210000-0x000007FEF5234000-memory.dmp

      Filesize

      144KB

    • memory/3044-20-0x000007FEF5660000-0x000007FEF6710000-memory.dmp

      Filesize

      16.7MB

    • memory/3044-36-0x000007FEF5240000-0x000007FEF5268000-memory.dmp

      Filesize

      160KB

    • memory/3044-34-0x000007FEF52D0000-0x000007FEF52E1000-memory.dmp

      Filesize

      68KB

    • memory/3044-33-0x000007FEF52F0000-0x000007FEF536C000-memory.dmp

      Filesize

      496KB

    • memory/3044-32-0x000007FEF5370000-0x000007FEF53D7000-memory.dmp

      Filesize

      412KB

    • memory/3044-30-0x000007FEF5410000-0x000007FEF5428000-memory.dmp

      Filesize

      96KB

    • memory/3044-27-0x000007FEF6C50000-0x000007FEF6C61000-memory.dmp

      Filesize

      68KB

    • memory/3044-26-0x000007FEF6C70000-0x000007FEF6C81000-memory.dmp

      Filesize

      68KB

    • memory/3044-25-0x000007FEF6C90000-0x000007FEF6CA1000-memory.dmp

      Filesize

      68KB

    • memory/3044-24-0x000007FEF6CB0000-0x000007FEF6CC8000-memory.dmp

      Filesize

      96KB

    • memory/3044-23-0x000007FEF6CD0000-0x000007FEF6CF1000-memory.dmp

      Filesize

      132KB

    • memory/3044-43-0x000007FEF2B60000-0x000007FEF43CF000-memory.dmp

      Filesize

      24.4MB

    • memory/3044-52-0x000007FEF74B0000-0x000007FEF74E4000-memory.dmp

      Filesize

      208KB

    • memory/3044-51-0x000000013FAD0000-0x000000013FBC8000-memory.dmp

      Filesize

      992KB

    • memory/3044-53-0x000007FEF6710000-0x000007FEF69C6000-memory.dmp

      Filesize

      2.7MB

    • memory/3044-54-0x000007FEF5660000-0x000007FEF6710000-memory.dmp

      Filesize

      16.7MB