Analysis

  • max time kernel
    122s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 16:45

General

  • Target

    Roblox Account Manager.exe

  • Size

    5.4MB

  • MD5

    334728f32a1144c893fdffc579a7709b

  • SHA1

    97d2eb634d45841c1453749acb911ce1303196c0

  • SHA256

    be9ddcdedf8c36c64e6b0a32d2686b74a112913c54217ccaa46675bfd1dc82f1

  • SHA512

    5df9d63136098d23918eba652b44a87e979430b2ce3e78a3eb8faef3dd4bd9599d6c31980f9eaf2bd6a071e966421bc6cec950c28b3b917f90130e8a582c2a1f

  • SSDEEP

    98304:42bT1Qm7d9G4/Ml61KO9bjRxMLywnrmYa0kqXf0FJ7WLhrBzcgPgL6b:/Qm59RMowO9bjRmmYiYa0kSIJ7zgPE

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
      "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=Roblox Account Manager.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1128
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1128 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7d43e3eb1d3f8ea171c3ff17e09e482

    SHA1

    ddf2d6d64d523b06eaa50c3c6cb7724f8b33f69c

    SHA256

    1b29f3f23781475fd2c3cd3235f1128ef278aec0d8a0b4e3e4f8a46a34469ccb

    SHA512

    1dd8995b9d63bb93bb88622141d5660a05ec6a99ddc2b2e414b3794b87fe863a1ef8dec61793f97254d256bdddb554a7638fd168dc91c736b08d61e451de3745

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4930b06bfeeb1287d0c4564bb8f924cc

    SHA1

    6f63489513152907f08c351282776ddad177b8a0

    SHA256

    8ac39e23496831784c4c2fc9cf4a3f2bd6e0cb4f6e3a25be9804ad3be1d5b06c

    SHA512

    cbb527e0226eaf975b4ed9862233817e106552b7640d015372635ccefc8e63c7673b090bddecf412b245ad70bb896ed59c894272197625817b3d57f926f73afb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64fba707bc75e5a9e8b3a95c9563f52b

    SHA1

    b84c3abd8aaa8587a854af2aaba9e7a12d6c1fd6

    SHA256

    204134091fb78511a2935e569effb04603c9f0f61c6efe04479995203a4788c8

    SHA512

    f2ddbaca6edf0cd4513f453f88f087406b7294651f093b4240e0cb5a343d3aaef582fd57d7ab2db9db77d66889e2bc7020f4f1bbbdcb40f4de48683545ef4394

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2cf44e137b8771dd641bc7f8b830de5

    SHA1

    f0567b5ce531f6fde09d5573217a7130e0e7ea48

    SHA256

    e6dd95180b370cb2f0e896e6773943ebd4544a350bb7ebeeb01d16b9229c21e6

    SHA512

    49118f869ad62a29bbdec2456fd5e2a990a98e552ae27c12ea18fc02bf7d6b99aec5aecb28d9fd31dac59a625e26d9751f8952f51f9d9e70ae409cedfb303e66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a94bed033284f9d1ebc5dca1534f3885

    SHA1

    e86f59eab6f63c4a37e595609ad41b12f354e17c

    SHA256

    239ce8ddececc985cab57634df8738d26416d7f1f1c4f97c47256b8ec69b3e39

    SHA512

    6a816b9f06634db11d8864099816fcd753d6733e630403af89681d270cb4e8759d5b44fcb5fad53d827b41b1d6dbca6818c7fda5a2c944d17da1877ac9b55ebf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4b27d41041664584543411681ac7ac6

    SHA1

    290264f3a4ac4cde686cbe6e56a33ed065721ce7

    SHA256

    17ad1e2785996a2b23d1b9676d385858783b82c42d520095d4a72e488cb8fe29

    SHA512

    baabe7e224cf352c659aa83e04ae32941b6d800c6d017aa9d2766c64923c38f534794fb60036ade51385398589f0d148959abac4fdfe5d119a20ae8ee5b3de18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    554b24c9b4f878b7c843812e130946fb

    SHA1

    5588c7de51494c4cfa9bb6d38edc57c82c6790d4

    SHA256

    67efe02165d04f44abae15e1ef2449cb5595bb7804bdc33ac548dc04ecb6ddc9

    SHA512

    c3ab9bbb699a2c6febbcaeb9c8364d9dc1f91e06dfb68238a3c0343478813ab3612f972f14a19acc105d200b497189159d039aa4e8470cd44c2a29391c54b1e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13e8530e564f1aa2c687f1fb0cbde035

    SHA1

    e6948491bc2b2ed5e2ddfed6c61de15206dfd741

    SHA256

    4ee420dbaad9f2f4f3ff079fdb22c1837ede740206d8b892198ee9cc3fc0d6fe

    SHA512

    df2619f30a1bd83f3adfead852710a279fd18afcb0439cf72233bcc0f816ef38f680902b1073280311f4cbe1d4af2bd41dd8287f301ac4ab886df7e49d1f2677

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d25fd9ef0918aeb1a2fef5ee66b565e

    SHA1

    6e378c9d92928e4831a4f228bb31c1331e97af0f

    SHA256

    965e12615fe98d59082357dc4dad639c531abd51234dab8c01aee2aa4a95de3b

    SHA512

    7a4d8dcec2d646b9fb17e04425e67a514d4daa5cbe47479d248bb18415d1b471176b383b4ab5d561495f8d4fcbf12660026e98d1e661afc5c6c1431759259b4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25d32dcbd520c8e3568b89ec5220df53

    SHA1

    06b1b79398ceddfff4a9e1e3ab3a7ae00fc5e5e6

    SHA256

    c8c782b0051e289c70b29cb27083bf3ed654aeb53c5ead579ccf3203b1dec48b

    SHA512

    d6bd4f0dd725189b5c1ef243b768b42578f3d7dc9838864dd51263b13cc8bd86edce57ff817e69e476342b7d083fe1d67cf82518b44e0b603b1a42281fb43dc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a171d55fcbe37b2c80e68d22641b8684

    SHA1

    9c00fa982acaab33424540b064e5a57a3ab70e33

    SHA256

    25c2de9c7b1a2bc9a0f911359835a1059ee8081964f4a09bac25bae8b25c9f6d

    SHA512

    75da90365c9ab15a01e194529dbb7fa5b2553c13b4ee291f5dc3af7eab7e3f6061bd3ffb1439f802166a3527189cee4649b8e602f21c33e37657fdb927f6206d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d72a12d694eb368e9afca7d5ddd654d

    SHA1

    7bbd3060f9ab3489be8d62aed70ee6e8dc3e6960

    SHA256

    e369abb5b76c82d65bca3b764e9a63e8a0380012eac09d421fd3b7a9916a3656

    SHA512

    63ed3e8f1cabf74704a14e7d8afb862ed2ab8b1d802a048bdbcc0e92629ee354b2992d2e92e56223c3a6b54fd37eabc0e3d170a8f3a67874e855014487052625

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3aa3f2ac3f5425253ac535bda90fe424

    SHA1

    cba61ada9dcdf395e4c65b9f543b1eb6adb497ee

    SHA256

    2899c86211d13483d7a0f24341c5efa8506586cb7a6c0cbf6d2bf5bbc6173549

    SHA512

    05228eb2d84cdbc4fda8f4e1cae83711371e4ec9a371701921aaeefc50cd7def9ac0253e2dd0099f8d52dfdceb5011863fc0e97a6f27f789715cdea9f3e3a5b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5601e333239237f202756683c030e82

    SHA1

    16884e310c1b83ffbba78f99c739ac89cc743aaa

    SHA256

    9ab706636f52bb052a8f62a3860fe6859d9de27152fb731ebaaf6f40287b3779

    SHA512

    f8db8fc3613c000f037fc40ccde6c99c1b554cf7aabc7a57ee6cfe177485663627fb109f4ea14725dfa61ea2fcb29b1ccdcef9a75083af417325aeed0f0a59e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0fa82fa87395b43856a250d254386743

    SHA1

    12a6b3bee48ad01fe536876ba266a9e7c6e53f12

    SHA256

    e39287ea858ba466187d0d52bd2f21bdb0ef0747265d3dd36c50d8ff0be8b97d

    SHA512

    451dd208741fe3df5d3be840d951a80774df8fcbff81496281c016f114cb417dab7d282e50fd8de5e06877460bab202bed16630c07d93f3bb3a4dcf35508cca6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    299784b452ff7bb6119cc75a686921a8

    SHA1

    bdf2f1406303c520c01168abad6abe1edf9b8be9

    SHA256

    30d9491366177de1fcaa23b898e01452716ee54c0d8839ab5d6fb4ff30af899a

    SHA512

    38749a8d6c8bb24ee5f3ac8220a774122687f7a0ee792e58bf3ae7952a6301a1497759f417599d319c6a84a714c87090e1784090cffd67a1b9b9db766c9d77cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f082780548e0399101fe80145a98b93a

    SHA1

    64a6e5847fc56123f6ebdf5741a86a5518de6507

    SHA256

    b836658ecdd2daf89f0ec42a5ba52ed8f7a6d32a4df8ca6ad69b34bbaeedc2f7

    SHA512

    f47bc669f98bfd3e64c85a358991c8e9b270b3c7c056b3fbb006832cde66a9776e64c37668e4925a77bf97d1221be3db7ac0d7ee4fcd1ac26fe7dbc69808209d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f792761937e1e7799a78200af402710c

    SHA1

    a408f4e735adfd4064a755eef53e1081fb0837b7

    SHA256

    a7c7abd845a2541e6d1e7ab0b11da36566c3c7428c1825344d1f75db32394629

    SHA512

    be6ea92bbeee971b91238337b2a09df36e48f1b1fe5a41c1ea579bcf6b818eb3451a86d31e764582e872ef441c56660a823d336c209518cde71209199e4c8988

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57dc936c272dac5550c0a4323d8f9144

    SHA1

    543425446a851364128eb5f2189fd251b5301d9a

    SHA256

    a106f8aafb0897290a03208f7664e0a21fade9eb0a24a741fc8926eb199bfdea

    SHA512

    e7ab03e571c5d5e9bead2102762bef3b1eb3700fddf3656f3d29422175681efabd9e9738a032353f4c859a65f844a342423f04eab322bc8f10faabca3a037e99

  • C:\Users\Admin\AppData\Local\Temp\Cab1C7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe.config

    Filesize

    6KB

    MD5

    0a86fa27d09e26491dbbb4fe27f4b410

    SHA1

    63e4b5afb8bdb67fc1d6f8dddeb40be20939289e

    SHA256

    2b6d99db8369b0ff6372737d89d1c9e4101815b4168a3852c7b513f2897e7f3d

    SHA512

    fbebc4dc0925d5d67271cac04c1ed324091442ef4c9f6243d2c1c523c9aa6b338c6a594e4987fc142dd3b2a023338a267c8a3454e47fbf0b3e0dbd7b3b65cc0d

  • C:\Users\Admin\AppData\Local\Temp\Tar1DA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2496-5-0x0000000000D50000-0x0000000000D6E000-memory.dmp

    Filesize

    120KB

  • memory/2496-4-0x0000000000F40000-0x0000000000F66000-memory.dmp

    Filesize

    152KB

  • memory/2496-0-0x0000000074AAE000-0x0000000074AAF000-memory.dmp

    Filesize

    4KB

  • memory/2496-6-0x0000000074AA0000-0x000000007518E000-memory.dmp

    Filesize

    6.9MB

  • memory/2496-11-0x0000000074AA0000-0x000000007518E000-memory.dmp

    Filesize

    6.9MB

  • memory/2496-3-0x0000000074AA0000-0x000000007518E000-memory.dmp

    Filesize

    6.9MB

  • memory/2496-2-0x00000000008F0000-0x0000000000936000-memory.dmp

    Filesize

    280KB

  • memory/2496-1-0x00000000001F0000-0x000000000075C000-memory.dmp

    Filesize

    5.4MB