Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
18/08/2024, 13:17
Static task
static1
General
-
Target
roblox_4130559591.exe
-
Size
1.1MB
-
MD5
9c35ad75619d515b0d4872c3c4b81a73
-
SHA1
62a84bd0a15fed90cdbfb1c4acc7eb9664da9ef2
-
SHA256
dd2737407bc080167bfb7d79d7c98c29de1680b83e566364843460834596798a
-
SHA512
b87fea3adc7a752cb59e8ed83cdc8f8fd349f4787836cfc7716cc9204ef7531a3e32f940176136fd3086d788866fa8a876bc154a00051ca8cafcdf9c8a0ec6a2
-
SSDEEP
24576:1c1FhNtjH3rOGHnI5FYHq0YshKZhtTgqZpnDgLxE0MAugux2TrhbICm:1urPXaQBqVfZzgUMq0MAvq2TdbICm
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion roblox_4130559591.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/3608-13-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-14-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-10-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-15-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-163-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-169-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-174-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-173-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-165-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-164-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-176-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-175-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-177-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-178-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-179-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-180-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-194-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-193-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-196-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3608-197-0x00000000027C0000-0x000000000294C000-memory.dmp upx behavioral1/memory/3160-209-0x0000000002890000-0x0000000002A1C000-memory.dmp upx behavioral1/memory/3160-210-0x0000000002890000-0x0000000002A1C000-memory.dmp upx behavioral1/memory/3160-206-0x0000000002890000-0x0000000002A1C000-memory.dmp upx behavioral1/memory/3160-211-0x0000000002890000-0x0000000002A1C000-memory.dmp upx behavioral1/memory/3160-212-0x0000000002890000-0x0000000002A1C000-memory.dmp upx behavioral1/memory/3608-214-0x00000000027C0000-0x000000000294C000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA roblox_4130559591.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language roblox_4130559591.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language roblox_4130559591.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 roblox_4130559591.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString roblox_4130559591.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor roblox_4130559591.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor roblox_4130559591.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName roblox_4130559591.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS roblox_4130559591.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer roblox_4130559591.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3608 roblox_4130559591.exe 3608 roblox_4130559591.exe 3608 roblox_4130559591.exe 3608 roblox_4130559591.exe 3160 roblox_4130559591.exe 3160 roblox_4130559591.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3608 roblox_4130559591.exe Token: SeCreatePagefilePrivilege 3608 roblox_4130559591.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3608 roblox_4130559591.exe 3608 roblox_4130559591.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3608 wrote to memory of 3160 3608 roblox_4130559591.exe 71 PID 3608 wrote to memory of 3160 3608 roblox_4130559591.exe 71 PID 3608 wrote to memory of 3160 3608 roblox_4130559591.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\roblox_4130559591.exe"C:\Users\Admin\AppData\Local\Temp\roblox_4130559591.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\roblox_4130559591.exe"C:\Users\Admin\AppData\Local\Temp\roblox_4130559591.exe" /_ShowProgress2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b2b464997f4db222765a07f8ba7909b2
SHA1848b1b499e1ea1a9c3b3b4fdc94416fe450ae64a
SHA25638de61d53651a817708fff0552aac6f9122e722b92da9ab1a455b547fae91123
SHA512fbfd16e3dc5c1dd5d2fb692cb5edd5f6a66ca2c3715b3ca0ec74d81c3a3c796aeddcd1410507f7400b270ff12867186da5d55cdfc3b2562ca7b3e99515f005c9
-
Filesize
1KB
MD55cd7a897da3d92981e4733b20750bba1
SHA1d9309ef665065444e114e2743250307c87c98853
SHA2564c10c9ab2b9efe61916b89d0d256d7c1ea53a618d970a04eb0bb89dfe8628822
SHA5121d687c808e913fcbaac61df5bedd227c3efa4449fd713a565dae30ef11c2a1da2dacae56f5adac786d667764d7021d7d08d24440880404825a0e2979d9ea314f
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
8KB
MD55996c85da09d7c527cb954e5fa3d91b1
SHA196cc5f4cd2234ce274337bfc7a751eed4c3a2a5c
SHA25654f48f4ddce0216024efe18ad670f786b02ab53e5e4f53ce0abd8566e311e2df
SHA5120965fe57960f191235eba208ae65ba97a5a6c79d23835b288a83c57f94b4f3941e0f166908dd3d97cb112d961d1eb71c835d0f37989b784f3c9fba63334b0406
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df