Analysis

  • max time kernel
    62s
  • max time network
    65s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 08:41

General

  • Target

    Roblox Account Manager.exe

  • Size

    5.4MB

  • MD5

    334728f32a1144c893fdffc579a7709b

  • SHA1

    97d2eb634d45841c1453749acb911ce1303196c0

  • SHA256

    be9ddcdedf8c36c64e6b0a32d2686b74a112913c54217ccaa46675bfd1dc82f1

  • SHA512

    5df9d63136098d23918eba652b44a87e979430b2ce3e78a3eb8faef3dd4bd9599d6c31980f9eaf2bd6a071e966421bc6cec950c28b3b917f90130e8a582c2a1f

  • SSDEEP

    98304:42bT1Qm7d9G4/Ml61KO9bjRxMLywnrmYa0kqXf0FJ7WLhrBzcgPgL6b:/Qm59RMowO9bjRmmYiYa0kSIJ7zgPE

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3948
    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
      "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp
        "C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" /q /norestart
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4368
        • C:\Windows\Temp\{2C762058-C613-4DCB-985F-6FD7FF938043}\.cr\vcredist.tmp
          "C:\Windows\Temp\{2C762058-C613-4DCB-985F-6FD7FF938043}\.cr\vcredist.tmp" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vcredist.tmp" -burn.filehandle.attached=544 -burn.filehandle.self=692 /q /norestart
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:848
          • C:\Windows\Temp\{83670BCB-68A1-4995-BD8C-0E22B6B5D2D1}\.be\VC_redist.x86.exe
            "C:\Windows\Temp\{83670BCB-68A1-4995-BD8C-0E22B6B5D2D1}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{D937F936-8B8B-4FA0-A753-41F851686736} {83C6FDB1-BCEF-4D80-940F-AEC04F5EC74D} 848
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:3948
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 960
            5⤵
            • Program crash
            PID:5040
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4076,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=3940 /prefetch:8
    1⤵
      PID:2516
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:456
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4280
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 848 -ip 848
      1⤵
        PID:3616

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Roblox Account Manager.exe.log

        Filesize

        1KB

        MD5

        a02e8a8a790f0e0861e3b6b0dbe56062

        SHA1

        a3e65805e5c78641cafebc1052906d7350da9d2e

        SHA256

        7fada0f81b63e1ecb265e9620ace8f5f0d40773626081849f5d98e668bc4e594

        SHA512

        108a81f818aa027834d621c771e427ee3f300c59d9dc10d853b94b1e8d635cf6bc06338dce31da30b08660c6fb06a39f9069c983bb585049f5fe9f50b753eb42

      • C:\Users\Admin\AppData\Local\Temp\RAMTheme.ini

        Filesize

        314B

        MD5

        f18fa783f4d27e35e54e54417334bfb4

        SHA1

        94511cdf37213bebdaf42a6140c9fe5be8eb07ba

        SHA256

        563eb35fd613f4298cd4dceff67652a13ba516a6244d9407c5709323c4ca4bb1

        SHA512

        602f6a68562bc89a4b3c3a71c2477377f161470bf8ae8e6925bf35691367115abfa9809925bd09c35596c6a3e5a7e9d090e5198e6a885a6658049c8732a05071

      • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe.config

        Filesize

        6KB

        MD5

        0a86fa27d09e26491dbbb4fe27f4b410

        SHA1

        63e4b5afb8bdb67fc1d6f8dddeb40be20939289e

        SHA256

        2b6d99db8369b0ff6372737d89d1c9e4101815b4168a3852c7b513f2897e7f3d

        SHA512

        fbebc4dc0925d5d67271cac04c1ed324091442ef4c9f6243d2c1c523c9aa6b338c6a594e4987fc142dd3b2a023338a267c8a3454e47fbf0b3e0dbd7b3b65cc0d

      • C:\Users\Admin\AppData\Local\Temp\log4.config

        Filesize

        936B

        MD5

        e4659ac08af3582a23f38bf6c562f841

        SHA1

        19cb4f014ba96285fa1798f008deabce632c7e76

        SHA256

        e4b10630d9ec2af508de31752fbbc6816c7426c40a3e57f0a085ce7f42c77bd5

        SHA512

        5bfa1e021cc7ee5e7a00da865d68684202b3b92d3d369b85b80c591fffa67725d434398325dc1e37c659eab62c0a4118b3e279ac0096b95790d252ceb6254249

      • C:\Users\Admin\AppData\Local\Temp\vcredist.tmp

        Filesize

        13.2MB

        MD5

        8457542fd4be74cb2c3a92b3386ae8e9

        SHA1

        198722b4f5fc62721910569d9d926dce22730c22

        SHA256

        a32dd41eaab0c5e1eaa78be3c0bb73b48593de8d97a7510b97de3fd993538600

        SHA512

        91a6283f774f9e2338b65aa835156854e9e76aed32f821b13cfd070dd6c87e1542ce2d5845beb5e4af1ddb102314bb6e0ad6214d896bb3e387590a01eae0c182

      • C:\Windows\Temp\{2C762058-C613-4DCB-985F-6FD7FF938043}\.cr\vcredist.tmp

        Filesize

        634KB

        MD5

        337b547d2771fdad56de13ac94e6b528

        SHA1

        3aeecc5933e7d8977e7a3623e8e44d4c3d0b4286

        SHA256

        81873c2f6c8bc4acaad66423a1b4d90e70214e59710ea7f11c8aeb069acd4cd0

        SHA512

        0d0102fafb7f471a6836708d81952f2c90c2b126ad1b575f2e2e996540c99f7275ebd1f570cafcc945d26700debb1e86b19b090ae5cdec2326dd0a6a918b7a36

      • C:\Windows\Temp\{83670BCB-68A1-4995-BD8C-0E22B6B5D2D1}\.ba\logo.png

        Filesize

        1KB

        MD5

        d6bd210f227442b3362493d046cea233

        SHA1

        ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

        SHA256

        335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

        SHA512

        464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

      • C:\Windows\Temp\{83670BCB-68A1-4995-BD8C-0E22B6B5D2D1}\.ba\wixstdba.dll

        Filesize

        191KB

        MD5

        eab9caf4277829abdf6223ec1efa0edd

        SHA1

        74862ecf349a9bedd32699f2a7a4e00b4727543d

        SHA256

        a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

        SHA512

        45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2

      • memory/3948-7-0x0000000004FD0000-0x0000000004FEE000-memory.dmp

        Filesize

        120KB

      • memory/3948-4-0x0000000005080000-0x0000000005112000-memory.dmp

        Filesize

        584KB

      • memory/3948-5-0x0000000074470000-0x0000000074C20000-memory.dmp

        Filesize

        7.7MB

      • memory/3948-0-0x000000007447E000-0x000000007447F000-memory.dmp

        Filesize

        4KB

      • memory/3948-15-0x0000000074470000-0x0000000074C20000-memory.dmp

        Filesize

        7.7MB

      • memory/3948-6-0x0000000004F90000-0x0000000004FB6000-memory.dmp

        Filesize

        152KB

      • memory/3948-3-0x0000000004F20000-0x0000000004F66000-memory.dmp

        Filesize

        280KB

      • memory/3948-2-0x0000000005630000-0x0000000005BD4000-memory.dmp

        Filesize

        5.6MB

      • memory/3948-1-0x0000000000150000-0x00000000006BC000-memory.dmp

        Filesize

        5.4MB

      • memory/4228-14-0x0000000074470000-0x0000000074C20000-memory.dmp

        Filesize

        7.7MB

      • memory/4228-22-0x0000000074470000-0x0000000074C20000-memory.dmp

        Filesize

        7.7MB

      • memory/4228-24-0x0000000074470000-0x0000000074C20000-memory.dmp

        Filesize

        7.7MB

      • memory/4228-25-0x000000000BF30000-0x000000000BF3A000-memory.dmp

        Filesize

        40KB

      • memory/4228-26-0x000000000BF40000-0x000000000BFE0000-memory.dmp

        Filesize

        640KB

      • memory/4228-31-0x000000000C480000-0x000000000C4D8000-memory.dmp

        Filesize

        352KB

      • memory/4228-33-0x000000000D9A0000-0x000000000DA52000-memory.dmp

        Filesize

        712KB

      • memory/4228-34-0x000000000DB90000-0x000000000DBB2000-memory.dmp

        Filesize

        136KB

      • memory/4228-35-0x000000000F1B0000-0x000000000F2A4000-memory.dmp

        Filesize

        976KB

      • memory/4228-36-0x000000000F2A0000-0x000000000F2BA000-memory.dmp

        Filesize

        104KB

      • memory/4228-37-0x000000000F2D0000-0x000000000F2D8000-memory.dmp

        Filesize

        32KB

      • memory/4228-23-0x000000000B200000-0x000000000B23A000-memory.dmp

        Filesize

        232KB

      • memory/4228-20-0x0000000006420000-0x000000000642A000-memory.dmp

        Filesize

        40KB

      • memory/4228-19-0x0000000005BF0000-0x0000000005C64000-memory.dmp

        Filesize

        464KB

      • memory/4228-16-0x0000000074470000-0x0000000074C20000-memory.dmp

        Filesize

        7.7MB

      • memory/4228-100-0x0000000074470000-0x0000000074C20000-memory.dmp

        Filesize

        7.7MB

      • memory/4228-101-0x0000000074470000-0x0000000074C20000-memory.dmp

        Filesize

        7.7MB

      • memory/4228-102-0x0000000074470000-0x0000000074C20000-memory.dmp

        Filesize

        7.7MB

      • memory/4228-103-0x0000000074470000-0x0000000074C20000-memory.dmp

        Filesize

        7.7MB

      • memory/4228-105-0x0000000002D70000-0x0000000002D7A000-memory.dmp

        Filesize

        40KB

      • memory/4228-106-0x00000000071D0000-0x00000000071E2000-memory.dmp

        Filesize

        72KB

      • memory/4228-304-0x0000000005530000-0x0000000005580000-memory.dmp

        Filesize

        320KB

      • memory/4228-305-0x0000000005500000-0x0000000005508000-memory.dmp

        Filesize

        32KB

      • memory/4228-306-0x000000000DBC0000-0x000000000DF14000-memory.dmp

        Filesize

        3.3MB