Resubmissions

22/08/2024, 11:06

240822-m7psfswerl 8

22/08/2024, 11:03

240822-m5ybtawekq 8

Analysis

  • max time kernel
    147s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 11:06

General

  • Target

    Roblox Account Manager.exe

  • Size

    5.4MB

  • MD5

    334728f32a1144c893fdffc579a7709b

  • SHA1

    97d2eb634d45841c1453749acb911ce1303196c0

  • SHA256

    be9ddcdedf8c36c64e6b0a32d2686b74a112913c54217ccaa46675bfd1dc82f1

  • SHA512

    5df9d63136098d23918eba652b44a87e979430b2ce3e78a3eb8faef3dd4bd9599d6c31980f9eaf2bd6a071e966421bc6cec950c28b3b917f90130e8a582c2a1f

  • SSDEEP

    98304:42bT1Qm7d9G4/Ml61KO9bjRxMLywnrmYa0kqXf0FJ7WLhrBzcgPgL6b:/Qm59RMowO9bjRmmYiYa0kSIJ7zgPE

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
      "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=Roblox Account Manager.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3533ddd5a9cc753ecb544917b197ca9b

    SHA1

    cb00d40c9ccd4af12d6dc1e90883a499b962ab9f

    SHA256

    a8500c632cc601d573c8dd8b6077d53a2ac55bd50d65860aa578c7ab4a2f7e67

    SHA512

    5430cd2dc8691b33a984c3c2035582b24f2b4da53795108349eaa194a7b49ccd080147c8ca0b7c2703e3c04a09e61d74f01f4e4b15fdf2dd3e8e442804d4562a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5cf0c74c8ba5f16fc444eeeb156124fe

    SHA1

    fb3e24e6964e6db0704c09daea76ecaa60840b48

    SHA256

    d74e5933e4135ae7ee2122bc8f8af3294a233f6efa3d06a15265ba2da19556a4

    SHA512

    a33e665bc54af28de13b01a41bed2610aa8b94f02d6db95005d9c96a1b6c56f3351894444fe377df3412f21de257c01295b6dd60cfc33e96f87eeb5337b75d61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    799d79ead456087b6e57c313798f42a3

    SHA1

    d0a06dd134dd42c1b9c6a223cb99979551e46a30

    SHA256

    c99667e1c7aff8f9ecc7f8b131a403320eace1e1ac9b3b32dcdfdcea784d6e1b

    SHA512

    e83ede86fca9ee6610aada79a30f5180880297d180c6c6898573aad226eae38ec3826ef0ba3538fdb1a6b9538d331177690afaab15c2c566d6ad4eed91871ff3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c899731964ebb0c174293b366b4f8ec4

    SHA1

    b6694cdf6c18f86a3e1fbf0a654da3c6e6767d08

    SHA256

    dd9765b9b15d836dfe49df167126a40747924b759b5adb52985dd4aa6f9c342a

    SHA512

    acdcff5dbba35c1076079d186d3490cce93bde5326cf930e3925bd9afef1b9aad8ea7b3a183303ce4c53bcb3690618c1db12f0e05c0bd30789b29185b03f4e99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    050b9609e8fa58bba47dfc3a9462dc41

    SHA1

    4b7c575a423c7651d7938b4498281d39f65479a9

    SHA256

    5430757101c4457efb85cf315a70ddfcb4abbfb8e3b74fed98da7d0fc6ba37f7

    SHA512

    c952d8ecb2d804b8815f73b9850083f186a03291e4423f8378434b9a9e7044d3f1e02a6cb3b3c529cd2c03bb216572c6504c86d8d12e7568d85b7d07dcf5617e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    785aa03aace0477be2aba1949f241818

    SHA1

    bb4250115aa3d869236395a3353f9d7ec898eb04

    SHA256

    4ca2027a587b7d50ee208c11db71a289015ca2d665c4678c3de8034fa30c4178

    SHA512

    2e64946d77b3c1f4c90e5586ca6492e0e2a62afb26b6914a616ab68696a35cbaf1bcfc3ad97ad97d92f2b6cef7a3f6eab1d1fcf5febe7e6302e079a40ad0eeb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41d150a00b0f132f9598d9a1aa1bb30f

    SHA1

    8eb593c531d807f612f06124495170ca0662e0d7

    SHA256

    850bbc801155b47e5a32c3013fc5f55091bf4cba16a8166fc62a669a839f8a2d

    SHA512

    f0713fef16358d714f02cc4481a5bb5818eb9fd2d594524551afe2417f51b1c25a3c813ada7158c2c17f25a478f03efe2ee30ff8ab0ca9e323fde3243b3ed3f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c412483a5ea6f043e392951a8fa5cc9

    SHA1

    2d31a62b8d18d2a041a38b1cff1e21fd3125a8ca

    SHA256

    bf49d0578d2fe1c633586669223811d3e954c41d81fc597a623363e6d9922a37

    SHA512

    bd7ac8103f1a5a053e66d1cb24223efbb312b85e05451a70e078b40d6b2b28c51c6a7d15b9f6ba8c9b7410c173e41272cdb954ca6e2133d94d86b0d8497bcae0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8b1755614b16ba3544b6bbbac08a06d

    SHA1

    24efa9f5598400363e319f0375c821fc92cf83a1

    SHA256

    205ecf553c09bb381a1c3a5b8cad4daed9136361a1475a1020429a48e270666c

    SHA512

    e631e014bd53675d846f72dc67123c58aa86bfe165421aca5f32676456420c27b106cab7d2b771f68d5e9b879058433cbd2b0d545c3095b65df13f7a7891b148

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    951fe84ae07ef715d21f98d810ace0b5

    SHA1

    f5173be45d3e5d1c11e60eb60604e2d2fb4f5810

    SHA256

    a0e3e09dd355aa65dc32bf0dbfd19bce62116bcd317508ca238c8f968ae75e09

    SHA512

    b4e2d0eec48e9db0a7465e1b29e95f27eb3bb3f2f6ad25f44e59412f9b292b52ddeb7b4737f4221df4e01910f68753daaec47f501c5c7e013a60560db2c6c474

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6989e9248741717c1cb53c3af4c17498

    SHA1

    05a81ceaed8a591a1c25ed194cee75957b34f67f

    SHA256

    3d11a30c3e86e6937e284d89dc60747906d0cb060cfbb76434086844b996bb7b

    SHA512

    4a06f403c225f5a97a8d511d2f5a0527af0975b24aec10527ee14b8e198060306f4c5b55210b9954aa45a2cc9a016c0c15cecea8ce515888a41e899ca52c8b93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc8f24fd27764c1b8e3cdde24419a390

    SHA1

    69efbb520c5a8ff935bf5608c490c3b8f84d7f9d

    SHA256

    821fca9940650cfc842eda7909efbcf8714a68be106a3756d20748d7ba817e2a

    SHA512

    0154c4fb5caf08ad6eebb239198edf48151c5fe35998540c2e2440f544660e9fa61c786a1fb09f1d57b1999b24bbfb10083faa7c4f16d8a0c28aa2e68c3ebe03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4ee2f6329c7df108ba4086360826ba7

    SHA1

    99734603398cb354211180077cec675dad509713

    SHA256

    fdfc57c857ba8148ba533fa245d3997edec4a39a9d5dae92bfafccec8302b6a7

    SHA512

    0121a11825a516d0382f67c20d9dfdc1a76328c15cccd4bd50ce0e8ae1c522bfbc237f763574d9043c059249d55bde0f41baeb515b57bf963467a68f80b3ac19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    385ec7d17ef930a25e9f5aabab5a43ce

    SHA1

    30c2b5c3317ece7b2d38abf9e123b8048df6b369

    SHA256

    b7ecfa3d1fc60e611aa651cd6bb98b6e881914ad6cc7016d5fb6b4bcabd1b10e

    SHA512

    85c975d27374502c003e9af9f52d7b8c652128c2e400c46a804499324ca1dfa9cd475ae2cbc0edf15b733beb7458159effc908237a3fab41d980519f8c410958

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89710fafe399e72927d282af118ebc1a

    SHA1

    2baff723a3c5e3a1fad1ab34874a3682521aae06

    SHA256

    31ad2f4cc4c9925bcfa6839e88a70348ffdda1265d585579be1ebe210e7a56e9

    SHA512

    d433f23083dc93fcf9b97fcca577338275c663c88204c8a641d26ee56d2a6f8795b4e0a5d8fdc4ec22d8d6c5d72b2258303bf98254063d08c73fe72c5001c645

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94cb99198d61747f3e93bc5558035614

    SHA1

    a72a796f0f432cb27d98011a5582b320ee577c61

    SHA256

    8016527ff5fa1116136432a81f6d9160756fd492cd842ee500fa790365056767

    SHA512

    a4eab1bcdf7e1ff6a4394ed20c40c87d46641989167da1a2e8c38b576852ef622c2f39bdbbef5c5205e2e2beb571003b1202b47ff2887e59dd1e72f8acab83c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f32643e65296f1c2a75b90be53ae8da

    SHA1

    7d30b72df0749bb9193b41fd604c8fd82cd08b9c

    SHA256

    9a8905134d74ab0136e9e0298fd18cc799c7790118e66cdbb84f653dd457de7d

    SHA512

    03fb2ac7c095ce9577555f88e6e6605832090570f94293b1dec09dcfef38ad2622068374ae4b4376673ba4197677b475af25cae65f088dfd1288666de7af948e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3972ca9b9381a66a3886f0a92b8ce476

    SHA1

    4398c05d7f3f8cbebbc3dda52b94c6727e2c271e

    SHA256

    069fa38357b3856047b9bfaddb6f9afb5c476bbff586a79bc89b5e6d2ce88ae3

    SHA512

    71a08e80bd2019d8f4656b187fad6701f3849060adbc8bb74615e3a37bca68e42c187a3678e6b13f22df1371b96aa6071407c28531cd0366d52fe209d135d120

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ef6c85f616afbbfd2b0de66661e560a

    SHA1

    221c2a48b1888fa47b5b7a88986946ee7b0a7dcf

    SHA256

    bf5fa16334924c8a377fecea078eef30b68eaf811983ad9e908ba9025f5b0ffd

    SHA512

    ad9e4b037b07031f00961a115ce435dc8b7a84215f44a5128bc779c4f7998dbbf2c0682b636d8853676d47260b85559884bd90d7763cc3da8a9cf1e74d5e68ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1527668d3afaeb564900723e05b6fe90

    SHA1

    6633d77454588916846768df1940955d7ac57b96

    SHA256

    1e6a826f814b81a3a57ede745e497f08623c73d27e06278223fa14240dd845c8

    SHA512

    102f466b8de7fd0b2b76074add12007cbd4812836346f01b0e3c23d4bb3396cbe4f475e8f47fde9941a0bc979d5b698b2c69db9f24c1e113800b674358b146dc

  • C:\Users\Admin\AppData\Local\Temp\Cab7679.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe.config

    Filesize

    6KB

    MD5

    0a86fa27d09e26491dbbb4fe27f4b410

    SHA1

    63e4b5afb8bdb67fc1d6f8dddeb40be20939289e

    SHA256

    2b6d99db8369b0ff6372737d89d1c9e4101815b4168a3852c7b513f2897e7f3d

    SHA512

    fbebc4dc0925d5d67271cac04c1ed324091442ef4c9f6243d2c1c523c9aa6b338c6a594e4987fc142dd3b2a023338a267c8a3454e47fbf0b3e0dbd7b3b65cc0d

  • C:\Users\Admin\AppData\Local\Temp\Tar769C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2652-6-0x00000000743C0000-0x0000000074AAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2652-0-0x00000000743CE000-0x00000000743CF000-memory.dmp

    Filesize

    4KB

  • memory/2652-3-0x00000000743C0000-0x0000000074AAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2652-2-0x0000000000230000-0x0000000000276000-memory.dmp

    Filesize

    280KB

  • memory/2652-4-0x00000000004C0000-0x00000000004E6000-memory.dmp

    Filesize

    152KB

  • memory/2652-5-0x0000000000620000-0x000000000063E000-memory.dmp

    Filesize

    120KB

  • memory/2652-11-0x00000000743C0000-0x0000000074AAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2652-1-0x0000000000D70000-0x00000000012DC000-memory.dmp

    Filesize

    5.4MB