Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

24/08/2024, 13:34

240824-qvctxasdre 7

24/08/2024, 13:25

240824-qnxwhatfnl 7

Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24/08/2024, 13:25

General

  • Target

    Roblox Account Manager.exe

  • Size

    5.5MB

  • MD5

    eb54116db322c49ec2faca86f725931e

  • SHA1

    c703685ac6221d7de624039d7351886b21ca53fc

  • SHA256

    5c7d96455bbb045cb3cb3726d7b4fff2d0810a21d7fdb34ad134696aa7f47d5e

  • SHA512

    ef6ea52df848bf8c7c77831ee5ca64cf337a92edbb0e8d0d38844e204157545aa3c397eeea12d05f276ce4984f519a1a05cf21bc04514fbb35beebf86d7f8e78

  • SSDEEP

    98304:8H6+2bT1Qm7d9G3s2tIfKLUXk8zdywnr5a0kqXf0Fb7WnZhP+MQuPN5Ppauz+l:5Qm59siyLU0lY9a0kSIb7aZhP+MQuPNw

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 49 IoCs
  • Drops file in Windows directory 23 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
      "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp
        "C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" /q /norestart
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1964
        • C:\Windows\Temp\{E28E0FAE-F6A1-4349-A7EA-A0A4280184A2}\.cr\vcredist.tmp
          "C:\Windows\Temp\{E28E0FAE-F6A1-4349-A7EA-A0A4280184A2}\.cr\vcredist.tmp" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" -burn.filehandle.attached=568 -burn.filehandle.self=576 /q /norestart
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3960
          • C:\Windows\Temp\{B6E66B19-F7E8-4B57-90C5-2C8F64D17CD8}\.be\VC_redist.x86.exe
            "C:\Windows\Temp\{B6E66B19-F7E8-4B57-90C5-2C8F64D17CD8}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{DAA72D75-36F9-4E5E-9D7E-B76596D29B19} {6FBA7F2C-4AE0-427A-8183-80D3352062DF} 3960
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2132
            • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
              "C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={47109d57-d746-4f8b-9618-ed6a17cc922b} -burn.filehandle.self=996 -burn.embedded BurnPipe.{020F7F9C-3182-4302-B52A-2B6EAB4BF5B2} {9AC537CB-DDCE-4AE3-A6A0-0836411230EC} 2132
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1708
              • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
                "C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -burn.clean.room="C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -burn.filehandle.attached=548 -burn.filehandle.self=564 -uninstall -quiet -burn.related.upgrade -burn.ancestors={47109d57-d746-4f8b-9618-ed6a17cc922b} -burn.filehandle.self=996 -burn.embedded BurnPipe.{020F7F9C-3182-4302-B52A-2B6EAB4BF5B2} {9AC537CB-DDCE-4AE3-A6A0-0836411230EC} 2132
                7⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:932
                • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
                  "C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{203E322A-D53B-4648-A061-1600016F6842} {C1F4DD5D-AE50-4138-A75F-4FE80869C557} 932
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  PID:900
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:1004
  • C:\Windows\system32\srtasks.exe
    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
    1⤵
      PID:3044
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1584

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e58322c.rbs

      Filesize

      16KB

      MD5

      7de9baf8f0305fe952aafe4decf6a229

      SHA1

      c8e147fbc9362f54aa4c06b1df44c9dfea2d7593

      SHA256

      dd1cdbc06943c76d8ef8fa4542a582e62f7f16f77cb4d99fc7f1a0fdc087561a

      SHA512

      586c1e7133e73a23f72934f1dec75c7318df86abb6cfff2cfbee597bcf053c3747f7ca5b67bb05d5d6e769d97bdf1b8cad057dff8568d8a49adece12d2a14410

    • C:\Config.Msi\e583231.rbs

      Filesize

      18KB

      MD5

      e67388c68cd1eab7a9964fe89c7e376b

      SHA1

      03ee57ba8ebb8416b86e1f889692d25adf8161d0

      SHA256

      a07059004a5e7972e61fbb9f08aa019aa25bc6b49ea581220f32a1577ae5da24

      SHA512

      fbd6131d8c722bfb25d1a1b348f4be7d6d2448882324e45c171c5bdac252b111285e3b53aed20808005d89229d0e28cbb5a868abee5b59e19f9ac8a7a87da736

    • C:\Config.Msi\e58323e.rbs

      Filesize

      20KB

      MD5

      a866fc2d693868403e936131229041c8

      SHA1

      0df2c6f4a9d8ddaf63da18626b1d69876c16a617

      SHA256

      94019b783094fe59aded923e569dc229d8bfc0ff3ed99ee2683dd9d8a91ccb7b

      SHA512

      794c4f34909b123ee5f0d8f2c8a64fac4b93556cd9386a07c70230ef9d4c5e96184f1949504d8704a84552a35e76b7815d2f03106ed7cf4f8281ae6a0cd39d25

    • C:\Config.Msi\e58324d.rbs

      Filesize

      19KB

      MD5

      2a95e8e6a310e50b1c6ea4359bbf9a9e

      SHA1

      54939d9458c75611e92ce6967958f7dd9bcdd3c1

      SHA256

      c1baf8d8342c453a272171a098d49aa64a242fc8c2cb3a3da843b737ac6dac78

      SHA512

      5c1147015856ad8140bd2d7503618c773351b403050a5ec471b22fb8b574a963b9bdc763343c5961add1518f6e88b57ac1250a972707b2d90bcb256385058003

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Roblox Account Manager.exe.log

      Filesize

      1KB

      MD5

      72c442c0ee7dde7b3455bb315289bcf2

      SHA1

      d33367411ce01348f531e098495885b9d2ea110b

      SHA256

      180f825c19263ae06fc891efcde51f993b720a27bd6e563742a110b40cb3fe41

      SHA512

      b66e975424f17e3b4dce2d2746d78b8a05001ee17a7208c1f5f81ed8530aa2e3d4b10f4c64b33ba7c05a5e9e2afc548abf6bdfaffd6015c2cb7d624a688dc018

    • C:\Users\Admin\AppData\Local\Temp\RAMSettings.ini

      Filesize

      1014B

      MD5

      1d917eaf5dcc8e06dd032c33f3a3d36a

      SHA1

      1eacb4eced22393fd5140910d30070f2e054e2fe

      SHA256

      787fa9af1c32b7e198119469c0e2c02c06b34ec7c990b62b9f4fb9bc8cedaa5f

      SHA512

      3cf5bc6160262ad454477cc0fab401696a7e5dff9e6fae1cdcfa0579ded640ea8c383dfcea6194f55c914927058e2355fd661d1fa83f87c10aeffa6a91cb9fcd

    • C:\Users\Admin\AppData\Local\Temp\RAMTheme.ini

      Filesize

      314B

      MD5

      f18fa783f4d27e35e54e54417334bfb4

      SHA1

      94511cdf37213bebdaf42a6140c9fe5be8eb07ba

      SHA256

      563eb35fd613f4298cd4dceff67652a13ba516a6244d9407c5709323c4ca4bb1

      SHA512

      602f6a68562bc89a4b3c3a71c2477377f161470bf8ae8e6925bf35691367115abfa9809925bd09c35596c6a3e5a7e9d090e5198e6a885a6658049c8732a05071

    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe.config

      Filesize

      6KB

      MD5

      d5e4966de947333592289d70916257a9

      SHA1

      5907df0fd07df6c33926906e94f4ed08d40be017

      SHA256

      d726d47b772a70fabc777c8ed46655fe5200e672f01f11dd95c5f4994e0a71e0

      SHA512

      c618054766bee664f0605a037f065c196c35495ee993b305f0bece4738ec9f7bd632dc8fb541bcf9d156f12e115455f31dd8db2a8cceb9d7d2f0d05d501831e9

    • C:\Users\Admin\AppData\Local\Temp\dd_vcredist_x86_20240824132549_000_vcRuntimeMinimum_x86.log

      Filesize

      4KB

      MD5

      81b7f82709fd7a4c8510c9ce5bf84403

      SHA1

      e87c5bca0583d4cc521549195f82e57f6f1a58fe

      SHA256

      0cce88a3a5703854bcb80f257d14600944ddfcdd8ba72c4f11e9fee52a0900c0

      SHA512

      fe5ffd359b7f1f158f3febeb7e1e2c7210af13c0e35f0c26787df77ca23574271373052e96321a1ea7f95509da4c7042775918e77e7515f021d8d58063563777

    • C:\Users\Admin\AppData\Local\Temp\dd_vcredist_x86_20240824132549_001_vcRuntimeAdditional_x86.log

      Filesize

      2KB

      MD5

      91d538af869f4f1a343d0ac0715a279e

      SHA1

      51670fb76ea67a65c8d042bf5eb2c6bb6d379af7

      SHA256

      bec7455d9e84df2f66d3495f411aea50388d9c2c71383fbf1257b35b6c6fd9c5

      SHA512

      102bfa4586e6371a449e49344f9963ad96021fbbe913429aa42efd82bea1ee548d5352b1f30cb421074fe19f8d9e95129ae7faee4a2f9573290e28e366c7232a

    • C:\Users\Admin\AppData\Local\Temp\log4.config

      Filesize

      936B

      MD5

      e4659ac08af3582a23f38bf6c562f841

      SHA1

      19cb4f014ba96285fa1798f008deabce632c7e76

      SHA256

      e4b10630d9ec2af508de31752fbbc6816c7426c40a3e57f0a085ce7f42c77bd5

      SHA512

      5bfa1e021cc7ee5e7a00da865d68684202b3b92d3d369b85b80c591fffa67725d434398325dc1e37c659eab62c0a4118b3e279ac0096b95790d252ceb6254249

    • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp

      Filesize

      13.2MB

      MD5

      8457542fd4be74cb2c3a92b3386ae8e9

      SHA1

      198722b4f5fc62721910569d9d926dce22730c22

      SHA256

      a32dd41eaab0c5e1eaa78be3c0bb73b48593de8d97a7510b97de3fd993538600

      SHA512

      91a6283f774f9e2338b65aa835156854e9e76aed32f821b13cfd070dd6c87e1542ce2d5845beb5e4af1ddb102314bb6e0ad6214d896bb3e387590a01eae0c182

    • C:\Windows\Temp\{B6E66B19-F7E8-4B57-90C5-2C8F64D17CD8}\.ba\logo.png

      Filesize

      1KB

      MD5

      d6bd210f227442b3362493d046cea233

      SHA1

      ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

      SHA256

      335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

      SHA512

      464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

    • C:\Windows\Temp\{B6E66B19-F7E8-4B57-90C5-2C8F64D17CD8}\.ba\wixstdba.dll

      Filesize

      191KB

      MD5

      eab9caf4277829abdf6223ec1efa0edd

      SHA1

      74862ecf349a9bedd32699f2a7a4e00b4727543d

      SHA256

      a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

      SHA512

      45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2

    • C:\Windows\Temp\{B6E66B19-F7E8-4B57-90C5-2C8F64D17CD8}\cab54A5CABBE7274D8A22EB58060AAB7623

      Filesize

      822KB

      MD5

      25bd21af44d3968a692e9b8a85f5c11d

      SHA1

      d805d1624553199529a82151f23a1330ac596888

      SHA256

      f4576ef2e843c282d2a932f7c55d71cc3fcbb35b0a17a0a640eb5f21731cc809

      SHA512

      ed3660183bf4e0d39e4f43a643007afc143b1d4ec0b45f0fdce28d8e896f646ec24a2a7a5429e8b10f4379cb4ffd1572adba10fc426990d05c0cafefdd87a4fb

    • C:\Windows\Temp\{B6E66B19-F7E8-4B57-90C5-2C8F64D17CD8}\cabB3E1576D1FEFBB979E13B1A5379E0B16

      Filesize

      4.9MB

      MD5

      3a7979fbe74502ddc0a9087ee9ca0bdf

      SHA1

      3c63238363807c2f254163769d0a582528e115af

      SHA256

      7327d37634cc8e966342f478168b8850bea36a126d002c38c7438a7bd557c4ca

      SHA512

      6435db0f210ad317f4cd00bb3300eb41fb86649f7a0e3a05e0f64f8d0163ab53dbdb3c98f99a15102ce09fcd437a148347bab7bfd4afe4c90ff2ea05bb4febff

    • C:\Windows\Temp\{B6E66B19-F7E8-4B57-90C5-2C8F64D17CD8}\vcRuntimeAdditional_x86

      Filesize

      180KB

      MD5

      2ba51e907b5ee6b2aef6dfe5914ae3e3

      SHA1

      6cc2c49734bf9965fe0f3977705a417ed8548718

      SHA256

      be137dc2b1ec7e85ae7a003a09537d3706605e34059361404ea3110874895e3a

      SHA512

      e3ba5aa8f366e3b1a92d8258daa74f327248fb21f168b7472b035f8d38f549f5f556eb9093eb8483ca51b78e9a77ee6e5b6e52378381cce50918d81e8e982d47

    • C:\Windows\Temp\{B6E66B19-F7E8-4B57-90C5-2C8F64D17CD8}\vcRuntimeMinimum_x86

      Filesize

      180KB

      MD5

      828f217e9513cfff708ffe62d238cfc5

      SHA1

      9fb65d4edb892bf940399d5fd6ae3a4b15c2e4ba

      SHA256

      a2ad58d741be5d40af708e15bf0dd5e488187bf28f0b699d391a9ef96f899886

      SHA512

      ffc72b92f1431bbd07889e28b55d14ea11f8401e2d0b180e43a898914209893941affacc0a4ea34eeefc9b0ca4bc84a3045591cd98aae6bdb11ae831dc6bb121

    • C:\Windows\Temp\{E28E0FAE-F6A1-4349-A7EA-A0A4280184A2}\.cr\vcredist.tmp

      Filesize

      634KB

      MD5

      337b547d2771fdad56de13ac94e6b528

      SHA1

      3aeecc5933e7d8977e7a3623e8e44d4c3d0b4286

      SHA256

      81873c2f6c8bc4acaad66423a1b4d90e70214e59710ea7f11c8aeb069acd4cd0

      SHA512

      0d0102fafb7f471a6836708d81952f2c90c2b126ad1b575f2e2e996540c99f7275ebd1f570cafcc945d26700debb1e86b19b090ae5cdec2326dd0a6a918b7a36

    • memory/900-320-0x0000000000760000-0x00000000007D7000-memory.dmp

      Filesize

      476KB

    • memory/932-379-0x0000000000760000-0x00000000007D7000-memory.dmp

      Filesize

      476KB

    • memory/1184-0-0x000000007490E000-0x000000007490F000-memory.dmp

      Filesize

      4KB

    • memory/1184-15-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/1184-7-0x0000000005650000-0x000000000566E000-memory.dmp

      Filesize

      120KB

    • memory/1184-5-0x00000000056E0000-0x0000000005772000-memory.dmp

      Filesize

      584KB

    • memory/1184-6-0x0000000005600000-0x0000000005626000-memory.dmp

      Filesize

      152KB

    • memory/1184-4-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/1184-3-0x00000000055A0000-0x00000000055E6000-memory.dmp

      Filesize

      280KB

    • memory/1184-2-0x0000000005BF0000-0x0000000006196000-memory.dmp

      Filesize

      5.6MB

    • memory/1184-1-0x0000000000570000-0x0000000000AEA000-memory.dmp

      Filesize

      5.5MB

    • memory/1708-394-0x0000000000760000-0x00000000007D7000-memory.dmp

      Filesize

      476KB

    • memory/3004-16-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/3004-42-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/3004-41-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/3004-40-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/3004-38-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/3004-37-0x000000000D640000-0x000000000D648000-memory.dmp

      Filesize

      32KB

    • memory/3004-36-0x000000000D610000-0x000000000D62A000-memory.dmp

      Filesize

      104KB

    • memory/3004-35-0x000000000D540000-0x000000000D616000-memory.dmp

      Filesize

      856KB

    • memory/3004-34-0x000000000D510000-0x000000000D532000-memory.dmp

      Filesize

      136KB

    • memory/3004-33-0x000000000D300000-0x000000000D3B2000-memory.dmp

      Filesize

      712KB

    • memory/3004-31-0x000000000D280000-0x000000000D2D8000-memory.dmp

      Filesize

      352KB

    • memory/3004-124-0x0000000007620000-0x000000000762A000-memory.dmp

      Filesize

      40KB

    • memory/3004-125-0x0000000007650000-0x0000000007662000-memory.dmp

      Filesize

      72KB

    • memory/3004-26-0x000000000B640000-0x000000000B64A000-memory.dmp

      Filesize

      40KB

    • memory/3004-25-0x000000000B1E0000-0x000000000B280000-memory.dmp

      Filesize

      640KB

    • memory/3004-24-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/3004-23-0x000000000AE40000-0x000000000AE74000-memory.dmp

      Filesize

      208KB

    • memory/3004-22-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB

    • memory/3004-20-0x0000000006900000-0x000000000690A000-memory.dmp

      Filesize

      40KB

    • memory/3004-19-0x0000000006750000-0x00000000067C4000-memory.dmp

      Filesize

      464KB

    • memory/3004-14-0x0000000074900000-0x00000000750B1000-memory.dmp

      Filesize

      7.7MB