Resubmissions

22-08-2024 11:06

240822-m7psfswerl 8

22-08-2024 11:03

240822-m5ybtawekq 8

Analysis

  • max time kernel
    120s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 11:03

General

  • Target

    Roblox Account Manager.exe

  • Size

    5.4MB

  • MD5

    334728f32a1144c893fdffc579a7709b

  • SHA1

    97d2eb634d45841c1453749acb911ce1303196c0

  • SHA256

    be9ddcdedf8c36c64e6b0a32d2686b74a112913c54217ccaa46675bfd1dc82f1

  • SHA512

    5df9d63136098d23918eba652b44a87e979430b2ce3e78a3eb8faef3dd4bd9599d6c31980f9eaf2bd6a071e966421bc6cec950c28b3b917f90130e8a582c2a1f

  • SSDEEP

    98304:42bT1Qm7d9G4/Ml61KO9bjRxMLywnrmYa0kqXf0FJ7WLhrBzcgPgL6b:/Qm59RMowO9bjRmmYiYa0kSIJ7zgPE

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
      "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=Roblox Account Manager.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d8c6db2eda74a92260e4c2734eabbee6

    SHA1

    ff9f2e5019a2d25b07aee79649f53009b3d3c4b8

    SHA256

    10b1799765c0ca24b552fce234e88d8a7b85ebff87b58604f564842e7148f018

    SHA512

    967af51058e780026ed389145ed3071e2aec3e3e3a14d025486e24f6bec5e409184742d145a00885502590aa14b4ba450165919e3ce0efc64f96d3f21959ed35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2026cf90c24faae6a75784d345ace388

    SHA1

    6cf874d8206b3ed2e53e673f80a85983fe553cc4

    SHA256

    180d170699ffc21ad797ed8095446e5d399e0ede7d215f6786dc05172beaaf40

    SHA512

    6873ff42ccc56d9e3675279832d611a1f02595a24f513ae2bf25fb0e1300c30d287068dc45d9867f6e13bed4dd471fef79e9bc1c02ab28a28d34f12a23d2f2b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8f5fa044891ba6f515bf7c57e76b69f5

    SHA1

    2063c0eea91e1bd29f42d775fac6707ebf4fdd24

    SHA256

    51a4d6ab2822f26e98452a80cc7a73c6652c27d11ea2df555644f13640f33c95

    SHA512

    2c8ec5201e518bc9e7817bc0d9cc4d1731a9c578095cd67c6d0d769b5dfad9421c549ce712a70795aec4d9f8b5bf72c00ffa8bc85e689f8835b42908b251e35a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9569a5d39bbc145b7aaab6874ff36f6f

    SHA1

    6fcd5fdae26dbc0c407b032c8eecd643aabd5b3e

    SHA256

    c8774aa11c850a3b964412235433efe7b2b4f0eb433df08a166706636ab67e03

    SHA512

    0cf922a789760ee82db92ab20196cb1f829c63f82b82cc1bd99f1b3be9d802547a0f1f63e7ed02f40753374b4d27851634a53d9250de54dd3d8ef33cffaacb1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    87f07145d4ce1208953baab5b9c252ea

    SHA1

    057036a319b240de83c1f4bb1f3828a5abc38d67

    SHA256

    96a8ab5c2ab7fe587fc9515bbdb5aba5fc74bcfeb8c8cc2029adff547218eda1

    SHA512

    e787191ef38a2beeb9f2a6b67144e523ce0caf0fd1d71785ed938c1be288f3cb0f76bfe23841492c218ad315502d3eb1185b078598857f4f17449a924e46efca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c3340412ee2308c83a43702e5e752652

    SHA1

    9d06dbe89fb982d3c6184578e1b1d1989d7e5e5d

    SHA256

    d4d3817d02a77ee8063295d7a56c403dae6b8021b61967d0c15e45debadd4937

    SHA512

    d490783fa2e9c9a62f206ba36737135d83ec150a401cd348718d95b06a80be33c2bad13f58b2048fc433b6ba37db69c32c311e5925c7892b31d89d73ce5ae4c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4f85658a649f6440c972022abeeec5d6

    SHA1

    15ff3e6ca99b5cff812d5a7db2e760671a97e16d

    SHA256

    c90bdce792cb5cadd89bdbd2cf01b957d9f4613384358acada171554cf1d3481

    SHA512

    85bd13939c41669905661048d5832880d6bfffc0fb0d48ba2bb6fdead2f75a80a1b4489ec61fb5cb6a3e7d27cbf2208bb47746be4c96dfaa05e2f811479e9e7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    aac065a5b095dcb25d5c1485642e1b71

    SHA1

    6213bb22d61e1da648612200b36baa0692345ab2

    SHA256

    6af6529e2dec8f16faac36e5c61ce3289c2e80ad1257ff686bd4fd1d3a088a47

    SHA512

    43e9cdef11e49daa734e46e09d0d6a0038b03a42e2e816714ff136fafb8126e574586f84951528837a3a069f552854710871dc77f46279cadf556147b443892f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    cead75b9e8453bf86711044308eb2011

    SHA1

    877c5064294225eb53cfaa40ce6bea582591ddd8

    SHA256

    3b0ef6c59ba6ce2d3abfa9c72de53d15e9eb43d7fd658f92feccee8189233795

    SHA512

    4d5ec363116c4a4ace82aff8513df797311df856024cdd27de5e23885a3bf454de2ab462d06f0e93359dcce0c1d573703171ca81cfaad84b7d8a108cc83cc040

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    937001a76bbe971fd76e0107df5aa9d8

    SHA1

    92e6629c9a5cd6bfb882ab4df33d310949952c62

    SHA256

    c4cc9fad86ff84884c0c7e069a47652c038527a53ee4093cfb16bf117023e24a

    SHA512

    b366fe9dcf6e13748f90651a7788f2571ef70d6bcba7e01737dbf66895598bad98fe46d29ca29595e55ecff79057ce58b58f1769a5f8b113ab5cf81056b80d30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ca3e2962742c994c9effeeaf5739260e

    SHA1

    860f690134221cb0c3a3c0deef6b7cc6316d04de

    SHA256

    1b9f83951a33cc3b0ff0d6a52729e461e6420bb6cc3b19af02d747308b2fdd05

    SHA512

    06871917be3baa41694c66a3c63937bb8b0513c12f6dc52006fb4514ae49aba765c0983bf42644111a3289e9f4ae32d1ec48badbd6a18e2af46db73c92d59c18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    30917a3f7a1ffa11e9b57ef7bebee4ce

    SHA1

    5c2efd4f1ddaf5b0faa263ba0fd4dc717738f66a

    SHA256

    20eefd28e8deeaa8806402511bb689bdfbb65a4714b44010fb67b3a8b0f2ec4e

    SHA512

    acf51daa79daf2c1ec02f01441595b25fe701bf4e914ab4313a979c6b0201f613941ab570e4f9cd16f03e790d9eb6cf4bcbcab3bbed24f5914fad551db0b0926

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    161a14a593c88fba8b531643dcf278cf

    SHA1

    38f252a38a6c3e03fecd809849a4615f170c623a

    SHA256

    609ba5ef006989942a19f8d3cf1de3c8046c43b7bf702e77d6aa324be22d6595

    SHA512

    d37148640e21c448bb33858fea13df9048afd117030b5896970ed6793070ec1248bb14c62d02a04346e28aefc0b55c71b6d8e87a5eccec79045516892b1b04bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ebbf8f6658d1279261d0e28c2fb91877

    SHA1

    4841b984aaa84088a646c7eff681aa287a91e487

    SHA256

    b536653b2948573c76bf512912b685d2e9afa72e03bec5fbe65527d0a2d121d6

    SHA512

    6c32ddf6915e1273e9f07310561ce86848dcac12d8f86fc637155daf53b6efd8801c558e069a65d58258cd5535baa24819c861b770b661177bce9893524decc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9eae79b88baf837980372e2330231d42

    SHA1

    a69c0a64861609b18da0929e3e3316e211b83b31

    SHA256

    c7abe328e888ef30786ff3d6cded28e6d4cb4cce43b68c952c0981b0e8aace7f

    SHA512

    e599f5374927f7014a70a0cf646dbb75f84ab633bb22ac28dd8de8ef6610fd98ba36732ea6e86eb651028547a12ca6bd9158d8f8f0d94011c35dcd97cba661e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f5275be8e74e66a39bee81de37b351c1

    SHA1

    0693d148fde278b1d8ee0803d4b0d28858564c9a

    SHA256

    4e54e38083053daafa1dd81074bc90c68b50b772877f1d3ac20c4a293b97f041

    SHA512

    9762186b3824b2b8cd42986cac3a6d5c22172ad4879d15395cef9dc8fde000c08e0459e5d9eef0676b49d7974cf28dc3e49c2f2572137a5022002ce17a42e0e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4ecb5606acfab40db54f711dc76926ea

    SHA1

    7e8960631d56fae406a94723fbc581891b48af05

    SHA256

    3e197804db4d80938ecb7ad5735436c81f4a05b6fac2479508a6bb51a57d5857

    SHA512

    18976eb0f6494528fe0a667581ae41e88df55028e232ac2002e3fd671b11d084ab301c4b58952ded45037c4d194a7dbbfeae2ba819000095853b3df5704557fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    69bab463741a1c2e01444392951cc228

    SHA1

    748e966b25187edd6f9b3e9545bc03df3b3a8fc5

    SHA256

    d0a95dcbb06d884f9b01f214a63d3fb3612b5263afcb818130836cc2ff91454d

    SHA512

    55ff1d62504734ba01e24df5117e311940529c3b631e972e92674cdf82458c9045776f53b3528d21deee8af46ea0e2aeb04d3e16a3b23b63872e5ce5996422a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6f97cf007d80756359cee79195495e45

    SHA1

    304995a668a860a7b8c76193fb875bee66687628

    SHA256

    8eac2e04831ecdcdffbc7ca5f67f5085d96efe86b034de3f36ddcb08061b7720

    SHA512

    07dc8fb35919a090752af3194dbcb2cc62ddefd243f5b508491ed5c0182c84c1395d7d058e193982d8c2ad3ad663786f48cc32866cde2558e57ab006c9cfa8ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    aa4a29dd5ba71378d8c6a9facdfc4ab5

    SHA1

    fd2a0900479c425d137c2e2fca46a49da862de49

    SHA256

    37aa116b696726f0fb768576ff4b36e86bc74f1e74aee864af90916bf622add4

    SHA512

    76a593142ed0775892c336cd2da9e34d0b1f7271512386eb3ca2adcc5f87eee3cc47b23bf313f14824d2ab5b20cd2076ae50e12cfc5fb1315b6da3abd207bf95

  • C:\Users\Admin\AppData\Local\Temp\Cab5AE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe.config

    Filesize

    6KB

    MD5

    0a86fa27d09e26491dbbb4fe27f4b410

    SHA1

    63e4b5afb8bdb67fc1d6f8dddeb40be20939289e

    SHA256

    2b6d99db8369b0ff6372737d89d1c9e4101815b4168a3852c7b513f2897e7f3d

    SHA512

    fbebc4dc0925d5d67271cac04c1ed324091442ef4c9f6243d2c1c523c9aa6b338c6a594e4987fc142dd3b2a023338a267c8a3454e47fbf0b3e0dbd7b3b65cc0d

  • C:\Users\Admin\AppData\Local\Temp\Tar5C0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2092-6-0x0000000073EE0000-0x00000000745CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2092-0-0x0000000073EEE000-0x0000000073EEF000-memory.dmp

    Filesize

    4KB

  • memory/2092-2-0x0000000000820000-0x0000000000866000-memory.dmp

    Filesize

    280KB

  • memory/2092-3-0x0000000073EE0000-0x00000000745CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2092-4-0x0000000002430000-0x0000000002456000-memory.dmp

    Filesize

    152KB

  • memory/2092-5-0x0000000000BD0000-0x0000000000BEE000-memory.dmp

    Filesize

    120KB

  • memory/2092-11-0x0000000073EE0000-0x00000000745CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2092-1-0x00000000002B0000-0x000000000081C000-memory.dmp

    Filesize

    5.4MB