Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/08/2024, 01:08

240811-bg9t6asaqe 7

11/08/2024, 01:05

240811-bftfsasakf 7

Analysis

  • max time kernel
    18s
  • max time network
    29s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11/08/2024, 01:08

General

  • Target

    Roblox Account Manager.exe

  • Size

    5.2MB

  • MD5

    a057fae0c8c97ee6cf2c12fb7bcf034d

  • SHA1

    64fe0eb242b5c3f9c42f4f2c1685e4a36708e4f6

  • SHA256

    cdb0a360cca7a5099c2d2357be1a833e032ffdeb3f467a6fac845f6bb77031c9

  • SHA512

    447cf69cf39ef19d098f4ab223d6ad9d760efb1eabb1bb0dac27fd2e55ac14c5a6502f2edd00b199d2db702e38551065bcc087c8df931360e769443908a4d200

  • SSDEEP

    98304:b2bT1Qm7d9GP4i7q0LTWgtUmWzmSyZs9S8Z/LywnrSkqXf0Fb7WnhNMYkj7:4Qm59q/tUhzmS9zZ/mY+kSIb7ahNMYk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3768
    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
      "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Users\Admin\AppData\Local\Temp\Auto Update.exe
        "C:\Users\Admin\AppData\Local\Temp\Auto Update.exe" -update
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Roblox Account Manager.exe.log

    Filesize

    1KB

    MD5

    72c442c0ee7dde7b3455bb315289bcf2

    SHA1

    d33367411ce01348f531e098495885b9d2ea110b

    SHA256

    180f825c19263ae06fc891efcde51f993b720a27bd6e563742a110b40cb3fe41

    SHA512

    b66e975424f17e3b4dce2d2746d78b8a05001ee17a7208c1f5f81ed8530aa2e3d4b10f4c64b33ba7c05a5e9e2afc548abf6bdfaffd6015c2cb7d624a688dc018

  • C:\Users\Admin\AppData\Local\Temp\Auto Update.exe

    Filesize

    5.2MB

    MD5

    a057fae0c8c97ee6cf2c12fb7bcf034d

    SHA1

    64fe0eb242b5c3f9c42f4f2c1685e4a36708e4f6

    SHA256

    cdb0a360cca7a5099c2d2357be1a833e032ffdeb3f467a6fac845f6bb77031c9

    SHA512

    447cf69cf39ef19d098f4ab223d6ad9d760efb1eabb1bb0dac27fd2e55ac14c5a6502f2edd00b199d2db702e38551065bcc087c8df931360e769443908a4d200

  • C:\Users\Admin\AppData\Local\Temp\RAMSettings.ini

    Filesize

    1KB

    MD5

    5369e83203a8972ee844ac973efd985a

    SHA1

    d91909ad9be3a67f66687a5cc58258fe2b715986

    SHA256

    fbbf21c6c6a3594b126ad1e48a06e315478022b6fa54ab0dc54b9ddaf30089ee

    SHA512

    af7fbb21b3ff7a32b34c72a303f380edda527a0f4273237f3c9a9f8804e83eb2bbbc1300135d094f64888227d72fdd832616dc2e18797398ad3df6db0d6b16f6

  • C:\Users\Admin\AppData\Local\Temp\RAMTheme.ini

    Filesize

    314B

    MD5

    f18fa783f4d27e35e54e54417334bfb4

    SHA1

    94511cdf37213bebdaf42a6140c9fe5be8eb07ba

    SHA256

    563eb35fd613f4298cd4dceff67652a13ba516a6244d9407c5709323c4ca4bb1

    SHA512

    602f6a68562bc89a4b3c3a71c2477377f161470bf8ae8e6925bf35691367115abfa9809925bd09c35596c6a3e5a7e9d090e5198e6a885a6658049c8732a05071

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe.config

    Filesize

    5KB

    MD5

    7e067afe7c779870c370c40240e2ce1f

    SHA1

    71d59901ee26810c2b2cfdeca176cec9a54fdb48

    SHA256

    5e0ba1895cf088e6d6907b8abbd8cd41c86f39cc642351a9ab0bf458bf1f5b31

    SHA512

    7ae4e81cd7a06aca5c363e1009d898aa8b42236d6796c38a8ba07adb52eae45f69cd446d008a0e1d12c60c02a43bee1c813231d58884c6dd69a2967e243c9cc6

  • C:\Users\Admin\AppData\Local\Temp\log4.config

    Filesize

    936B

    MD5

    e4659ac08af3582a23f38bf6c562f841

    SHA1

    19cb4f014ba96285fa1798f008deabce632c7e76

    SHA256

    e4b10630d9ec2af508de31752fbbc6816c7426c40a3e57f0a085ce7f42c77bd5

    SHA512

    5bfa1e021cc7ee5e7a00da865d68684202b3b92d3d369b85b80c591fffa67725d434398325dc1e37c659eab62c0a4118b3e279ac0096b95790d252ceb6254249

  • memory/1952-24-0x0000000074D40000-0x00000000754F1000-memory.dmp

    Filesize

    7.7MB

  • memory/1952-39-0x000000000C160000-0x000000000C16A000-memory.dmp

    Filesize

    40KB

  • memory/1952-53-0x0000000074D40000-0x00000000754F1000-memory.dmp

    Filesize

    7.7MB

  • memory/1952-34-0x000000000B800000-0x000000000B822000-memory.dmp

    Filesize

    136KB

  • memory/1952-35-0x000000000B970000-0x000000000BA2E000-memory.dmp

    Filesize

    760KB

  • memory/1952-15-0x0000000074D40000-0x00000000754F1000-memory.dmp

    Filesize

    7.7MB

  • memory/1952-38-0x000000000BA70000-0x000000000BA78000-memory.dmp

    Filesize

    32KB

  • memory/1952-17-0x0000000074D40000-0x00000000754F1000-memory.dmp

    Filesize

    7.7MB

  • memory/1952-19-0x00000000065D0000-0x0000000006644000-memory.dmp

    Filesize

    464KB

  • memory/1952-20-0x0000000005E10000-0x0000000005E1A000-memory.dmp

    Filesize

    40KB

  • memory/1952-36-0x000000000BA30000-0x000000000BA4A000-memory.dmp

    Filesize

    104KB

  • memory/1952-25-0x000000000A980000-0x000000000AA12000-memory.dmp

    Filesize

    584KB

  • memory/1952-37-0x000000000BA60000-0x000000000BA68000-memory.dmp

    Filesize

    32KB

  • memory/1952-23-0x000000000A870000-0x000000000A8A4000-memory.dmp

    Filesize

    208KB

  • memory/1952-22-0x0000000074D40000-0x00000000754F1000-memory.dmp

    Filesize

    7.7MB

  • memory/1952-26-0x000000000AF20000-0x000000000AF2A000-memory.dmp

    Filesize

    40KB

  • memory/1952-31-0x000000000B560000-0x000000000B5B8000-memory.dmp

    Filesize

    352KB

  • memory/1952-33-0x000000000B5F0000-0x000000000B6A2000-memory.dmp

    Filesize

    712KB

  • memory/3768-2-0x00000000060E0000-0x0000000006686000-memory.dmp

    Filesize

    5.6MB

  • memory/3768-7-0x00000000059D0000-0x00000000059EE000-memory.dmp

    Filesize

    120KB

  • memory/3768-3-0x00000000058F0000-0x0000000005936000-memory.dmp

    Filesize

    280KB

  • memory/3768-6-0x00000000059A0000-0x00000000059C6000-memory.dmp

    Filesize

    152KB

  • memory/3768-14-0x0000000074D40000-0x00000000754F1000-memory.dmp

    Filesize

    7.7MB

  • memory/3768-4-0x0000000074D40000-0x00000000754F1000-memory.dmp

    Filesize

    7.7MB

  • memory/3768-5-0x0000000005A40000-0x0000000005AD2000-memory.dmp

    Filesize

    584KB

  • memory/3768-1-0x0000000000940000-0x0000000000E7E000-memory.dmp

    Filesize

    5.2MB

  • memory/3768-0-0x0000000074D4E000-0x0000000074D4F000-memory.dmp

    Filesize

    4KB