Resubmissions

22/08/2024, 11:06

240822-m7psfswerl 8

22/08/2024, 11:03

240822-m5ybtawekq 8

Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 11:03

General

  • Target

    Roblox Account Manager.exe

  • Size

    5.4MB

  • MD5

    334728f32a1144c893fdffc579a7709b

  • SHA1

    97d2eb634d45841c1453749acb911ce1303196c0

  • SHA256

    be9ddcdedf8c36c64e6b0a32d2686b74a112913c54217ccaa46675bfd1dc82f1

  • SHA512

    5df9d63136098d23918eba652b44a87e979430b2ce3e78a3eb8faef3dd4bd9599d6c31980f9eaf2bd6a071e966421bc6cec950c28b3b917f90130e8a582c2a1f

  • SSDEEP

    98304:42bT1Qm7d9G4/Ml61KO9bjRxMLywnrmYa0kqXf0FJ7WLhrBzcgPgL6b:/Qm59RMowO9bjRmmYiYa0kSIJ7zgPE

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
      "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3104
      • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp
        "C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" /q /norestart
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Windows\Temp\{8BA78502-AC47-4944-B808-545E2672478C}\.cr\vcredist.tmp
          "C:\Windows\Temp\{8BA78502-AC47-4944-B808-545E2672478C}\.cr\vcredist.tmp" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" -burn.filehandle.attached=544 -burn.filehandle.self=552 /q /norestart
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3584
          • C:\Windows\Temp\{8E2446E5-7C3F-4B53-8642-A26C264EBD67}\.be\VC_redist.x86.exe
            "C:\Windows\Temp\{8E2446E5-7C3F-4B53-8642-A26C264EBD67}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{048F1740-16EF-4B79-B4FD-4451AD8DBB5C} {6F11D433-F5A1-43F6-92EB-CF8709DE6566} 3584
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:4780
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 1556
            5⤵
            • Program crash
            PID:2800
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4456
  • C:\Windows\system32\srtasks.exe
    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5056
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3584 -ip 3584
    1⤵
      PID:2096

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Roblox Account Manager.exe.log

            Filesize

            1KB

            MD5

            a02e8a8a790f0e0861e3b6b0dbe56062

            SHA1

            a3e65805e5c78641cafebc1052906d7350da9d2e

            SHA256

            7fada0f81b63e1ecb265e9620ace8f5f0d40773626081849f5d98e668bc4e594

            SHA512

            108a81f818aa027834d621c771e427ee3f300c59d9dc10d853b94b1e8d635cf6bc06338dce31da30b08660c6fb06a39f9069c983bb585049f5fe9f50b753eb42

          • C:\Users\Admin\AppData\Local\Temp\RAMSettings.ini

            Filesize

            1014B

            MD5

            1d917eaf5dcc8e06dd032c33f3a3d36a

            SHA1

            1eacb4eced22393fd5140910d30070f2e054e2fe

            SHA256

            787fa9af1c32b7e198119469c0e2c02c06b34ec7c990b62b9f4fb9bc8cedaa5f

            SHA512

            3cf5bc6160262ad454477cc0fab401696a7e5dff9e6fae1cdcfa0579ded640ea8c383dfcea6194f55c914927058e2355fd661d1fa83f87c10aeffa6a91cb9fcd

          • C:\Users\Admin\AppData\Local\Temp\RAMTheme.ini

            Filesize

            314B

            MD5

            f18fa783f4d27e35e54e54417334bfb4

            SHA1

            94511cdf37213bebdaf42a6140c9fe5be8eb07ba

            SHA256

            563eb35fd613f4298cd4dceff67652a13ba516a6244d9407c5709323c4ca4bb1

            SHA512

            602f6a68562bc89a4b3c3a71c2477377f161470bf8ae8e6925bf35691367115abfa9809925bd09c35596c6a3e5a7e9d090e5198e6a885a6658049c8732a05071

          • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe.config

            Filesize

            6KB

            MD5

            0a86fa27d09e26491dbbb4fe27f4b410

            SHA1

            63e4b5afb8bdb67fc1d6f8dddeb40be20939289e

            SHA256

            2b6d99db8369b0ff6372737d89d1c9e4101815b4168a3852c7b513f2897e7f3d

            SHA512

            fbebc4dc0925d5d67271cac04c1ed324091442ef4c9f6243d2c1c523c9aa6b338c6a594e4987fc142dd3b2a023338a267c8a3454e47fbf0b3e0dbd7b3b65cc0d

          • C:\Users\Admin\AppData\Local\Temp\log4.config

            Filesize

            936B

            MD5

            e4659ac08af3582a23f38bf6c562f841

            SHA1

            19cb4f014ba96285fa1798f008deabce632c7e76

            SHA256

            e4b10630d9ec2af508de31752fbbc6816c7426c40a3e57f0a085ce7f42c77bd5

            SHA512

            5bfa1e021cc7ee5e7a00da865d68684202b3b92d3d369b85b80c591fffa67725d434398325dc1e37c659eab62c0a4118b3e279ac0096b95790d252ceb6254249

          • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp

            Filesize

            13.2MB

            MD5

            8457542fd4be74cb2c3a92b3386ae8e9

            SHA1

            198722b4f5fc62721910569d9d926dce22730c22

            SHA256

            a32dd41eaab0c5e1eaa78be3c0bb73b48593de8d97a7510b97de3fd993538600

            SHA512

            91a6283f774f9e2338b65aa835156854e9e76aed32f821b13cfd070dd6c87e1542ce2d5845beb5e4af1ddb102314bb6e0ad6214d896bb3e387590a01eae0c182

          • C:\Windows\Temp\{8BA78502-AC47-4944-B808-545E2672478C}\.cr\vcredist.tmp

            Filesize

            634KB

            MD5

            337b547d2771fdad56de13ac94e6b528

            SHA1

            3aeecc5933e7d8977e7a3623e8e44d4c3d0b4286

            SHA256

            81873c2f6c8bc4acaad66423a1b4d90e70214e59710ea7f11c8aeb069acd4cd0

            SHA512

            0d0102fafb7f471a6836708d81952f2c90c2b126ad1b575f2e2e996540c99f7275ebd1f570cafcc945d26700debb1e86b19b090ae5cdec2326dd0a6a918b7a36

          • C:\Windows\Temp\{8E2446E5-7C3F-4B53-8642-A26C264EBD67}\.ba\logo.png

            Filesize

            1KB

            MD5

            d6bd210f227442b3362493d046cea233

            SHA1

            ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

            SHA256

            335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

            SHA512

            464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

          • C:\Windows\Temp\{8E2446E5-7C3F-4B53-8642-A26C264EBD67}\.ba\wixstdba.dll

            Filesize

            191KB

            MD5

            eab9caf4277829abdf6223ec1efa0edd

            SHA1

            74862ecf349a9bedd32699f2a7a4e00b4727543d

            SHA256

            a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

            SHA512

            45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2

          • memory/3104-23-0x000000000AC80000-0x000000000ACBA000-memory.dmp

            Filesize

            232KB

          • memory/3104-40-0x0000000074E40000-0x00000000755F0000-memory.dmp

            Filesize

            7.7MB

          • memory/3104-15-0x0000000074E40000-0x00000000755F0000-memory.dmp

            Filesize

            7.7MB

          • memory/3104-16-0x0000000074E40000-0x00000000755F0000-memory.dmp

            Filesize

            7.7MB

          • memory/3104-110-0x0000000006A40000-0x0000000006A52000-memory.dmp

            Filesize

            72KB

          • memory/3104-19-0x0000000005D00000-0x0000000005D74000-memory.dmp

            Filesize

            464KB

          • memory/3104-20-0x0000000005EA0000-0x0000000005EAA000-memory.dmp

            Filesize

            40KB

          • memory/3104-109-0x0000000006A10000-0x0000000006A1A000-memory.dmp

            Filesize

            40KB

          • memory/3104-22-0x0000000074E40000-0x00000000755F0000-memory.dmp

            Filesize

            7.7MB

          • memory/3104-41-0x0000000074E40000-0x00000000755F0000-memory.dmp

            Filesize

            7.7MB

          • memory/3104-24-0x0000000074E40000-0x00000000755F0000-memory.dmp

            Filesize

            7.7MB

          • memory/3104-25-0x000000000B140000-0x000000000B14A000-memory.dmp

            Filesize

            40KB

          • memory/3104-26-0x000000000B680000-0x000000000B720000-memory.dmp

            Filesize

            640KB

          • memory/3104-31-0x000000000BF40000-0x000000000BF98000-memory.dmp

            Filesize

            352KB

          • memory/3104-33-0x000000000D2D0000-0x000000000D382000-memory.dmp

            Filesize

            712KB

          • memory/3104-39-0x0000000074E40000-0x00000000755F0000-memory.dmp

            Filesize

            7.7MB

          • memory/3104-34-0x000000000D4C0000-0x000000000D4E2000-memory.dmp

            Filesize

            136KB

          • memory/3104-35-0x000000000D4F0000-0x000000000D5E4000-memory.dmp

            Filesize

            976KB

          • memory/3104-37-0x000000000D610000-0x000000000D618000-memory.dmp

            Filesize

            32KB

          • memory/3104-36-0x000000000D5E0000-0x000000000D5FA000-memory.dmp

            Filesize

            104KB

          • memory/3104-38-0x0000000074E40000-0x00000000755F0000-memory.dmp

            Filesize

            7.7MB

          • memory/4264-5-0x00000000058E0000-0x0000000005972000-memory.dmp

            Filesize

            584KB

          • memory/4264-14-0x0000000074E40000-0x00000000755F0000-memory.dmp

            Filesize

            7.7MB

          • memory/4264-0-0x0000000074E4E000-0x0000000074E4F000-memory.dmp

            Filesize

            4KB

          • memory/4264-4-0x0000000005750000-0x0000000005796000-memory.dmp

            Filesize

            280KB

          • memory/4264-3-0x0000000074E40000-0x00000000755F0000-memory.dmp

            Filesize

            7.7MB

          • memory/4264-2-0x0000000005DF0000-0x0000000006394000-memory.dmp

            Filesize

            5.6MB

          • memory/4264-1-0x0000000000850000-0x0000000000DBC000-memory.dmp

            Filesize

            5.4MB

          • memory/4264-6-0x00000000057D0000-0x00000000057F6000-memory.dmp

            Filesize

            152KB

          • memory/4264-7-0x0000000005810000-0x000000000582E000-memory.dmp

            Filesize

            120KB