Resubmissions

06/08/2024, 16:24

240806-twpfwateql 7

06/08/2024, 16:19

240806-tszsfatekq 7

Analysis

  • max time kernel
    1158s
  • max time network
    1160s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/08/2024, 16:24

General

  • Target

    Roblox Account Manager.exe

  • Size

    5.4MB

  • MD5

    334728f32a1144c893fdffc579a7709b

  • SHA1

    97d2eb634d45841c1453749acb911ce1303196c0

  • SHA256

    be9ddcdedf8c36c64e6b0a32d2686b74a112913c54217ccaa46675bfd1dc82f1

  • SHA512

    5df9d63136098d23918eba652b44a87e979430b2ce3e78a3eb8faef3dd4bd9599d6c31980f9eaf2bd6a071e966421bc6cec950c28b3b917f90130e8a582c2a1f

  • SSDEEP

    98304:42bT1Qm7d9G4/Ml61KO9bjRxMLywnrmYa0kqXf0FJ7WLhrBzcgPgL6b:/Qm59RMowO9bjRmmYiYa0kSIJ7zgPE

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 49 IoCs
  • Drops file in Windows directory 23 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
      "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4184
      • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp
        "C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" /q /norestart
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Windows\Temp\{93427065-3ED7-4A88-88B7-E230599DFA08}\.cr\vcredist.tmp
          "C:\Windows\Temp\{93427065-3ED7-4A88-88B7-E230599DFA08}\.cr\vcredist.tmp" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" -burn.filehandle.attached=568 -burn.filehandle.self=576 /q /norestart
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2184
          • C:\Windows\Temp\{41DC4270-9827-43E4-8C35-8526DA50568F}\.be\VC_redist.x86.exe
            "C:\Windows\Temp\{41DC4270-9827-43E4-8C35-8526DA50568F}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{3E8B69A7-8F52-4213-9335-6244327DFB6A} {F13C6C87-5157-4414-911C-F6C62FA01781} 2184
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2240
            • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
              "C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={47109d57-d746-4f8b-9618-ed6a17cc922b} -burn.filehandle.self=948 -burn.embedded BurnPipe.{3F810EED-79C7-44B5-931F-E24C2DE57F24} {4BD4B9FF-0C3B-46F6-AAA5-B6F29B337204} 2240
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4908
              • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
                "C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -burn.clean.room="C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -burn.filehandle.attached=544 -burn.filehandle.self=560 -uninstall -quiet -burn.related.upgrade -burn.ancestors={47109d57-d746-4f8b-9618-ed6a17cc922b} -burn.filehandle.self=948 -burn.embedded BurnPipe.{3F810EED-79C7-44B5-931F-E24C2DE57F24} {4BD4B9FF-0C3B-46F6-AAA5-B6F29B337204} 2240
                7⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:752
                • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
                  "C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{2848DC7B-B203-43F7-A67C-8728EA01AE0D} {37B2E83B-8A28-4ED5-BB7E-DDA8BADA2C5A} 752
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  PID:2712
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:2148
  • C:\Windows\system32\srtasks.exe
    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4852
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1968
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2152

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\e580b89.rbs

            Filesize

            16KB

            MD5

            2c9cc55702829b400fa981f293ef4200

            SHA1

            76a3918c0abb79d5fd57335b724a85af414009d2

            SHA256

            9f2c979fd35720ff7da7653b36ffcb99655140b004219dac08f5d2d4996f9377

            SHA512

            cfc177cf5f2c2c63637aa41f437e8ddea67c13a5c6268f1303b8f5af915690452d3899a2ea7a27b889ab693d8269c031f14d7570687830be27aa3819a7086013

          • C:\Config.Msi\e580b8e.rbs

            Filesize

            18KB

            MD5

            dd26cfc139c868f4cbb15594d1d507bc

            SHA1

            bf01d191983075202bfd4d069090722988f631d0

            SHA256

            3e96ff83c777c8b89844df7b63aff55a942a6246dea22957034d57c0c371b49a

            SHA512

            574db66af5b2927040955df278ffbfd637b8adff0723387c4da5d46556904afe2cb3c969af00aa7bf2d97952f136b79ff33dd219bf7f83b0cc4a599d72417e06

          • C:\Config.Msi\e580b9b.rbs

            Filesize

            20KB

            MD5

            a3c6aabd7b02a150a90515687c48759a

            SHA1

            c0f7436b36fef08e3b24f20aa687972fa2776e95

            SHA256

            22952a12b74cfad0fb3fb6b84ffa8f0031aa19efbe9654b037f09c5811878799

            SHA512

            d1fa8ae88484629092bca0e161a96aef7efd21a04322f9400ee0f598a79f2eaad2fdc0d3c7ed49fac9f3d9dda75811430f2fabf4ff53104586be23fd697f3aba

          • C:\Config.Msi\e580baa.rbs

            Filesize

            19KB

            MD5

            879967372b99c80896433f9de80365cd

            SHA1

            d36a829b8909d573a8c3ec44011ed6ab332d07a5

            SHA256

            e2f6cdc491063eefd8d32e3e2a76ddbcc134a3640e979083135fa772ca741e3e

            SHA512

            d1e0215da9d9dc36888551ef499e506440119eca319ffd43becce4453743416654ee863b7565c6cbcd24b82742fdca431e1390fa2f46a4483ededc4e602e4a1d

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Roblox Account Manager.exe.log

            Filesize

            1KB

            MD5

            72c442c0ee7dde7b3455bb315289bcf2

            SHA1

            d33367411ce01348f531e098495885b9d2ea110b

            SHA256

            180f825c19263ae06fc891efcde51f993b720a27bd6e563742a110b40cb3fe41

            SHA512

            b66e975424f17e3b4dce2d2746d78b8a05001ee17a7208c1f5f81ed8530aa2e3d4b10f4c64b33ba7c05a5e9e2afc548abf6bdfaffd6015c2cb7d624a688dc018

          • C:\Users\Admin\AppData\Local\Temp\RAMSettings.ini

            Filesize

            1014B

            MD5

            1d917eaf5dcc8e06dd032c33f3a3d36a

            SHA1

            1eacb4eced22393fd5140910d30070f2e054e2fe

            SHA256

            787fa9af1c32b7e198119469c0e2c02c06b34ec7c990b62b9f4fb9bc8cedaa5f

            SHA512

            3cf5bc6160262ad454477cc0fab401696a7e5dff9e6fae1cdcfa0579ded640ea8c383dfcea6194f55c914927058e2355fd661d1fa83f87c10aeffa6a91cb9fcd

          • C:\Users\Admin\AppData\Local\Temp\RAMTheme.ini

            Filesize

            314B

            MD5

            f18fa783f4d27e35e54e54417334bfb4

            SHA1

            94511cdf37213bebdaf42a6140c9fe5be8eb07ba

            SHA256

            563eb35fd613f4298cd4dceff67652a13ba516a6244d9407c5709323c4ca4bb1

            SHA512

            602f6a68562bc89a4b3c3a71c2477377f161470bf8ae8e6925bf35691367115abfa9809925bd09c35596c6a3e5a7e9d090e5198e6a885a6658049c8732a05071

          • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe.config

            Filesize

            6KB

            MD5

            0a86fa27d09e26491dbbb4fe27f4b410

            SHA1

            63e4b5afb8bdb67fc1d6f8dddeb40be20939289e

            SHA256

            2b6d99db8369b0ff6372737d89d1c9e4101815b4168a3852c7b513f2897e7f3d

            SHA512

            fbebc4dc0925d5d67271cac04c1ed324091442ef4c9f6243d2c1c523c9aa6b338c6a594e4987fc142dd3b2a023338a267c8a3454e47fbf0b3e0dbd7b3b65cc0d

          • C:\Users\Admin\AppData\Local\Temp\dd_vcredist_x86_20240806162507_000_vcRuntimeMinimum_x86.log

            Filesize

            2KB

            MD5

            4a10b5bf03b283282b5c9c4acd6db5a4

            SHA1

            68fe24d137c3cc2582b4da3af821c0d6d73aa65b

            SHA256

            5a652510de11f425d22fc111453e80631e0947cfcb64bbb4b85da6be86be6109

            SHA512

            9327b9c001a7b07e41d5a1c6acc2d512fd4e8000edc0bc880eca453e52cf6d60a2f2c7ce91d84696cbd9df47094b157548d45672f082e056c70f2ce8ad2e764d

          • C:\Users\Admin\AppData\Local\Temp\dd_vcredist_x86_20240806162507_001_vcRuntimeAdditional_x86.log

            Filesize

            2KB

            MD5

            aba48f7ad917525695d88e186111de63

            SHA1

            bb4983f24d64e743cf0c1ce19e0705629aa50ed9

            SHA256

            215e460a2d3a9ec40e57e05a37e8b57df8ba6ab5842c12b5a7b633d16fe5de67

            SHA512

            654edcdf829b46e125a1d39c78afbde52d2e610da80d9fbc857a82050955f0b84b1f7e35e16fc6b9b797e70df1f1555f17bd2ea7891eb57093fd242f0fb607bb

          • C:\Users\Admin\AppData\Local\Temp\log4.config

            Filesize

            936B

            MD5

            e4659ac08af3582a23f38bf6c562f841

            SHA1

            19cb4f014ba96285fa1798f008deabce632c7e76

            SHA256

            e4b10630d9ec2af508de31752fbbc6816c7426c40a3e57f0a085ce7f42c77bd5

            SHA512

            5bfa1e021cc7ee5e7a00da865d68684202b3b92d3d369b85b80c591fffa67725d434398325dc1e37c659eab62c0a4118b3e279ac0096b95790d252ceb6254249

          • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp

            Filesize

            13.2MB

            MD5

            8457542fd4be74cb2c3a92b3386ae8e9

            SHA1

            198722b4f5fc62721910569d9d926dce22730c22

            SHA256

            a32dd41eaab0c5e1eaa78be3c0bb73b48593de8d97a7510b97de3fd993538600

            SHA512

            91a6283f774f9e2338b65aa835156854e9e76aed32f821b13cfd070dd6c87e1542ce2d5845beb5e4af1ddb102314bb6e0ad6214d896bb3e387590a01eae0c182

          • C:\Windows\Temp\{41DC4270-9827-43E4-8C35-8526DA50568F}\.ba\logo.png

            Filesize

            1KB

            MD5

            d6bd210f227442b3362493d046cea233

            SHA1

            ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

            SHA256

            335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

            SHA512

            464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

          • C:\Windows\Temp\{41DC4270-9827-43E4-8C35-8526DA50568F}\.ba\wixstdba.dll

            Filesize

            191KB

            MD5

            eab9caf4277829abdf6223ec1efa0edd

            SHA1

            74862ecf349a9bedd32699f2a7a4e00b4727543d

            SHA256

            a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

            SHA512

            45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2

          • C:\Windows\Temp\{41DC4270-9827-43E4-8C35-8526DA50568F}\cab54A5CABBE7274D8A22EB58060AAB7623

            Filesize

            822KB

            MD5

            25bd21af44d3968a692e9b8a85f5c11d

            SHA1

            d805d1624553199529a82151f23a1330ac596888

            SHA256

            f4576ef2e843c282d2a932f7c55d71cc3fcbb35b0a17a0a640eb5f21731cc809

            SHA512

            ed3660183bf4e0d39e4f43a643007afc143b1d4ec0b45f0fdce28d8e896f646ec24a2a7a5429e8b10f4379cb4ffd1572adba10fc426990d05c0cafefdd87a4fb

          • C:\Windows\Temp\{41DC4270-9827-43E4-8C35-8526DA50568F}\cabB3E1576D1FEFBB979E13B1A5379E0B16

            Filesize

            4.9MB

            MD5

            3a7979fbe74502ddc0a9087ee9ca0bdf

            SHA1

            3c63238363807c2f254163769d0a582528e115af

            SHA256

            7327d37634cc8e966342f478168b8850bea36a126d002c38c7438a7bd557c4ca

            SHA512

            6435db0f210ad317f4cd00bb3300eb41fb86649f7a0e3a05e0f64f8d0163ab53dbdb3c98f99a15102ce09fcd437a148347bab7bfd4afe4c90ff2ea05bb4febff

          • C:\Windows\Temp\{41DC4270-9827-43E4-8C35-8526DA50568F}\vcRuntimeAdditional_x86

            Filesize

            180KB

            MD5

            2ba51e907b5ee6b2aef6dfe5914ae3e3

            SHA1

            6cc2c49734bf9965fe0f3977705a417ed8548718

            SHA256

            be137dc2b1ec7e85ae7a003a09537d3706605e34059361404ea3110874895e3a

            SHA512

            e3ba5aa8f366e3b1a92d8258daa74f327248fb21f168b7472b035f8d38f549f5f556eb9093eb8483ca51b78e9a77ee6e5b6e52378381cce50918d81e8e982d47

          • C:\Windows\Temp\{41DC4270-9827-43E4-8C35-8526DA50568F}\vcRuntimeMinimum_x86

            Filesize

            180KB

            MD5

            828f217e9513cfff708ffe62d238cfc5

            SHA1

            9fb65d4edb892bf940399d5fd6ae3a4b15c2e4ba

            SHA256

            a2ad58d741be5d40af708e15bf0dd5e488187bf28f0b699d391a9ef96f899886

            SHA512

            ffc72b92f1431bbd07889e28b55d14ea11f8401e2d0b180e43a898914209893941affacc0a4ea34eeefc9b0ca4bc84a3045591cd98aae6bdb11ae831dc6bb121

          • C:\Windows\Temp\{93427065-3ED7-4A88-88B7-E230599DFA08}\.cr\vcredist.tmp

            Filesize

            634KB

            MD5

            337b547d2771fdad56de13ac94e6b528

            SHA1

            3aeecc5933e7d8977e7a3623e8e44d4c3d0b4286

            SHA256

            81873c2f6c8bc4acaad66423a1b4d90e70214e59710ea7f11c8aeb069acd4cd0

            SHA512

            0d0102fafb7f471a6836708d81952f2c90c2b126ad1b575f2e2e996540c99f7275ebd1f570cafcc945d26700debb1e86b19b090ae5cdec2326dd0a6a918b7a36

          • memory/752-280-0x0000000000BF0000-0x0000000000C67000-memory.dmp

            Filesize

            476KB

          • memory/2180-7-0x0000000074570000-0x0000000074D21000-memory.dmp

            Filesize

            7.7MB

          • memory/2180-0-0x000000007457E000-0x000000007457F000-memory.dmp

            Filesize

            4KB

          • memory/2180-15-0x0000000074570000-0x0000000074D21000-memory.dmp

            Filesize

            7.7MB

          • memory/2180-6-0x0000000005D50000-0x0000000005D6E000-memory.dmp

            Filesize

            120KB

          • memory/2180-5-0x0000000005D10000-0x0000000005D36000-memory.dmp

            Filesize

            152KB

          • memory/2180-4-0x0000000005E40000-0x0000000005ED2000-memory.dmp

            Filesize

            584KB

          • memory/2180-3-0x0000000005CB0000-0x0000000005CF6000-memory.dmp

            Filesize

            280KB

          • memory/2180-2-0x0000000006350000-0x00000000068F6000-memory.dmp

            Filesize

            5.6MB

          • memory/2180-1-0x0000000000C90000-0x00000000011FC000-memory.dmp

            Filesize

            5.4MB

          • memory/2712-243-0x0000000000BF0000-0x0000000000C67000-memory.dmp

            Filesize

            476KB

          • memory/4184-16-0x0000000074570000-0x0000000074D21000-memory.dmp

            Filesize

            7.7MB

          • memory/4184-155-0x0000000074570000-0x0000000074D21000-memory.dmp

            Filesize

            7.7MB

          • memory/4184-36-0x000000000D8F0000-0x000000000D90A000-memory.dmp

            Filesize

            104KB

          • memory/4184-37-0x000000000D920000-0x000000000D928000-memory.dmp

            Filesize

            32KB

          • memory/4184-34-0x000000000D7D0000-0x000000000D7F2000-memory.dmp

            Filesize

            136KB

          • memory/4184-33-0x000000000D5D0000-0x000000000D682000-memory.dmp

            Filesize

            712KB

          • memory/4184-31-0x000000000D4F0000-0x000000000D548000-memory.dmp

            Filesize

            352KB

          • memory/4184-26-0x000000000B870000-0x000000000B910000-memory.dmp

            Filesize

            640KB

          • memory/4184-25-0x000000000B710000-0x000000000B71A000-memory.dmp

            Filesize

            40KB

          • memory/4184-24-0x0000000074570000-0x0000000074D21000-memory.dmp

            Filesize

            7.7MB

          • memory/4184-23-0x000000000B0E0000-0x000000000B11A000-memory.dmp

            Filesize

            232KB

          • memory/4184-35-0x000000000D800000-0x000000000D8F4000-memory.dmp

            Filesize

            976KB

          • memory/4184-22-0x0000000074570000-0x0000000074D21000-memory.dmp

            Filesize

            7.7MB

          • memory/4184-20-0x0000000006BA0000-0x0000000006BAA000-memory.dmp

            Filesize

            40KB

          • memory/4184-19-0x0000000006B30000-0x0000000006BA4000-memory.dmp

            Filesize

            464KB

          • memory/4184-492-0x0000000074570000-0x0000000074D21000-memory.dmp

            Filesize

            7.7MB

          • memory/4184-14-0x0000000074570000-0x0000000074D21000-memory.dmp

            Filesize

            7.7MB

          • memory/4184-321-0x0000000074570000-0x0000000074D21000-memory.dmp

            Filesize

            7.7MB

          • memory/4184-323-0x00000000077B0000-0x00000000077BA000-memory.dmp

            Filesize

            40KB

          • memory/4184-324-0x00000000077E0000-0x00000000077F2000-memory.dmp

            Filesize

            72KB

          • memory/4184-491-0x0000000074570000-0x0000000074D21000-memory.dmp

            Filesize

            7.7MB

          • memory/4908-281-0x0000000000BF0000-0x0000000000C67000-memory.dmp

            Filesize

            476KB