Resubmissions

22/08/2024, 11:06

240822-m7psfswerl 8

22/08/2024, 11:03

240822-m5ybtawekq 8

Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 11:03

General

  • Target

    Roblox.Account.Manager.3.7.2.zip

  • Size

    4.2MB

  • MD5

    d58b79cb3d3635ba963427362f75d075

  • SHA1

    0e33eeff9b625fceb2d2d0195e6f32523d57db79

  • SHA256

    49b2c015da0851a2ed43820799a7bcda08e1bc5f315e107598f87f4b1bd36dac

  • SHA512

    176de76618d0dc43f17e2971787666b737d7308a67f40bd2bb82ab4f0d3276f877fbeb7cc987f797e6572ec736c29d8568f441194a45cb5ba8d751bf139ab79a

  • SSDEEP

    98304:gYRAasq6wh5OiduKi0yAlWNYrsmekq13pgOtleGlci1D7VaMV:7y5haDbyAMNY4mekmCOtQi1laa

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Roblox.Account.Manager.3.7.2.zip
    1⤵
      PID:1260
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1448

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1448-0-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/1448-1-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB