Overview
overview
3Static
static
3RobloxExecutor.zip
windows7-x64
1RobloxExecutor.zip
windows10-2004-x64
1Executor/Executor.exe
windows7-x64
1Executor/Executor.exe
windows10-2004-x64
1Executor/Solara.dll
windows7-x64
1Executor/Solara.dll
windows10-2004-x64
1Executor/c...10.dll
windows7-x64
1Executor/c...10.dll
windows10-2004-x64
1Executor/libcurl.dll
windows7-x64
1Executor/libcurl.dll
windows10-2004-x64
1Executor/sqlite3.dll
windows7-x64
1Executor/sqlite3.dll
windows10-2004-x64
1Resubmissions
20/08/2024, 20:56
240820-zq7cdswhnj 320/08/2024, 20:55
240820-zqvctswhlr 320/08/2024, 20:55
240820-zqgrqssgqe 3Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
RobloxExecutor.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RobloxExecutor.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Executor/Executor.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Executor/Executor.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Executor/Solara.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Executor/Solara.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Executor/cpprest_2_10.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Executor/cpprest_2_10.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Executor/libcurl.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Executor/libcurl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Executor/sqlite3.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Executor/sqlite3.dll
Resource
win10v2004-20240802-en
General
-
Target
Executor/cpprest_2_10.dll
-
Size
950KB
-
MD5
f517b79251a9f9fc33b9e7c44771c5c8
-
SHA1
a919251abf2c02b4815828a434bcef9f43b8c3d5
-
SHA256
e1b087aae2411f97c06df984b769c08ea797e171722b3ef853b266203292a58d
-
SHA512
6dcc5947e29eb73c86419afed2aa435b9a5284da7934ac00bcb5743f6dd96643d7af2741136a4e45d69d13b6dc34fe31949cad91423b3a43621dcc534edc1a74
-
SSDEEP
24576:m0eE8Uexrrwz3mZBc2CGaqyN/fzWMDBJocWoHI+VK28xDdBLIjIBwkOBFRWUdE4:m0ebwz3mZBcCUlm4zp
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2960 2684 rundll32.exe 30 PID 2684 wrote to memory of 2960 2684 rundll32.exe 30 PID 2684 wrote to memory of 2960 2684 rundll32.exe 30