Analysis

  • max time kernel
    120s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 05:38

General

  • Target

    Roblox Account Manager.exe

  • Size

    5.4MB

  • MD5

    334728f32a1144c893fdffc579a7709b

  • SHA1

    97d2eb634d45841c1453749acb911ce1303196c0

  • SHA256

    be9ddcdedf8c36c64e6b0a32d2686b74a112913c54217ccaa46675bfd1dc82f1

  • SHA512

    5df9d63136098d23918eba652b44a87e979430b2ce3e78a3eb8faef3dd4bd9599d6c31980f9eaf2bd6a071e966421bc6cec950c28b3b917f90130e8a582c2a1f

  • SSDEEP

    98304:42bT1Qm7d9G4/Ml61KO9bjRxMLywnrmYa0kqXf0FJ7WLhrBzcgPgL6b:/Qm59RMowO9bjRmmYiYa0kSIJ7zgPE

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
      "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=Roblox Account Manager.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1072
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1072 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c331e2784a344ba37477fd4e17b8e346

    SHA1

    3d01e3506a70549ef235c65c73f34216b40a72d0

    SHA256

    2e74b48130ae8cc3c26352e9a48f993b3e1512254c6ca0585f3a4432c61206b4

    SHA512

    26f90b8fe0142f4b0004a940ddcb833ed3d67b436b6f454043a12048b4d11ee9ce80242a4f642683f523a03976d413b9c1a6e57aafba77e71bfd7d3419625920

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a042676c8ad438d9502d549ff0d0324

    SHA1

    58630442b6bd32fced2cd1424fef9faab6f992ea

    SHA256

    c37eef2be506612acce3a6b0396407f1893eec03fbe7f3278c18ef3c555020fb

    SHA512

    95a2ec8752eabc5fe81bb5fde152cdb7fcf4402e64e7da28d863bac1c4a3b96515bcb831b58042a9a284e1f57c04e33dbcf7033504531a948a964ddff1a17eab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8327f543cb20e5866c81da2268de3ad

    SHA1

    d230a19106892b78dfe6669a7ee8f4e4760f375c

    SHA256

    8debd213135330fcdbf5c6947aa6b63b711df845fbbcde76ddcb8986d71007f3

    SHA512

    eed08588a80959e0549768e0c490cb9b2ed9a7c0cf6e4242ae4f8f25b1fd6c1a20131461e2aa114b76d21b5a1492b14412f2d1303c39c798e36b4ef46aa7fa21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ba2a6e373de01421e449530df69c819

    SHA1

    204bb8aa3491cff4e65883ff14bc8f89c10b10f8

    SHA256

    775c58b68e8354d46693396cf7e952063c4108eefc8caa434ca8568a220d4539

    SHA512

    2a7e780b912afe3513a6166807b74285ecec83a5662b390d6371c181ff948fb7fa06055d5b77d7c247356bfc5bfc1cbc50bf546311d7b5636663c68a34519a22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f406047ec73293fde44fba19497d2ca

    SHA1

    c74b14b386c5d23c489c54dfa3eeaa23d1ad4bd4

    SHA256

    51a30ea79c7a327c57c5cf9e370fe36af0505e332e3e11d0b6154e5605b3f47e

    SHA512

    98102eddfb0e2afa5533d99f44a49b1a13be96b4ea2d87c89ae570d89b543eb1d5fc41e7464a1d6c4624bcb9ea257c64516fae545c9758b1221fe36273aac9c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32a387d43cb83ef2390b5edef1e7a1b2

    SHA1

    0dc40ff8cfd9ed2bc141e0acd054057f4609f696

    SHA256

    9db888c6041a763c8fad53c43652261cec0406daa98f95c6f35044ccddda7dbb

    SHA512

    23df6f77d776f8f1233d50d9e4deaa57db2e18e04649f01dd7b47ca8c4296ace358510ce30795f00dd044e241031f3c5dcdc49452f9ed029ab53015760e47e1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3039169362d5b5e369e9a0c9e150c7a

    SHA1

    916908f8c5a91980c55f04e052b71d2ce55689b4

    SHA256

    a981856383223911125e698f6dceaeaf0ca16883e2231aa497a142737434057f

    SHA512

    b831869e72de2190a2e3171b806771f33db39f5fe87cee5d28997cf4b2f7e1e5eb7a225fe3b9e29a73c668444f7b9e8ab4a3550f27b50ea66e8ddb2be2a9a970

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e5c51619831ac2a3edf987511a5bc64

    SHA1

    fc4bab3783c14f90e5c8845146d8188c587a387f

    SHA256

    31e70bd8b4bab0d049bb825880a2c94a1db811d08964c7f40948dad2eadd52d4

    SHA512

    17de4573b6982f6502882d8c268dbad76d808f8efecc70fbc03978c0954d5b55add9eac6537b26ab5cd518a1c516c5774b0166ee529a51bde6871da0fac70a9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28fbcd02570cc39ff38078f07a042604

    SHA1

    40983ca04c5a6af3929c1c1b672ccfeb9e3c0d5c

    SHA256

    3d7e9d3bf6b192f97031eb867601a3f10f9ebb6df39a9d4b313c260737877afc

    SHA512

    8f01a87ad95142aefec308b93564e52ee29653bf384920216f5b5f210d4d61deb170bfff88a88f34ed15bbc2786a5e6ba96d9671d38b14caea75469fc576e7c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d47d0e5ad343835ee39966c8af65390

    SHA1

    fea37a4efc25a285dbabbe0d153f60ded78d65fd

    SHA256

    c267a0e9f4c3f79d2c11993b82cc23fbfe04eb2aeed5de36dbb3c003a1664dbf

    SHA512

    896bd9eafdd4ae1df6c98a4a8f9373ca4fef66ed63fbfe228b968ccb2d64c40e1de85657afe26e154452fe7e9c99dd20386aac075b05e186fdc2e07e9eaada29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8127e8e19e53d688fdf1b804de0d75f3

    SHA1

    ad4e166fccfa75adf7962f92c4094c4ed25b9ac5

    SHA256

    56c319ea61e627c186d34bddc02ad4c1dd335344cecc64748f720f4bfebc8e97

    SHA512

    2cba693af96777b24c0fe417869183af071cc1c4bd409a037b4b13055d34f1952f6aaaae5ded7609202368231069bfde1accab94b1379c7fcd0f6ab3512c7494

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bb319b2053af1856da8e95869c16955

    SHA1

    14a5aaa104d7d5255435f72059e4ed64a0e3fed7

    SHA256

    ed1d3fed371c896cbd0bc165b141ac28212c98e01920b977035bddaa49f04669

    SHA512

    d91e1e8dc6cd20d92789f46d5e91b0ae4b78b483bae5e26a93d9c07186c33fb93c6772903a1fabba29916bb04ec71b3a0b692788cf40cf4d0126d7cb415eb1a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9c38c4617b8a853fc66a10c6b7fd79d

    SHA1

    bfa57b8596607fc00f27c7ac5d9d7a91b250c218

    SHA256

    83be1e57f05ab5f33f858b281ddb389539733b0ac158de9c562f4595c705b096

    SHA512

    b94ee37e7e7b2a49890778f7ac8936c27bee0db95d8e3004f5bc24c04b33d9f3ecc5597fbdd5486d974c50f04783ee36a7e007301f1009829b4c95349a0d6043

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e723f8dc80594a5533df37dd35b84c3

    SHA1

    e32c8f5244f932db94e385a85460906a99062d14

    SHA256

    989a8eec9a2732ae95ae55e7cab2373d60ca152e6f81ce8730bd7dcd0e506078

    SHA512

    e8f9854f5d4e84e723b10f8f20da8b2c682de429640ad71179eb66d4d64d7146b9d2d50ddbfd4fabc222a914aa2ada7fd9f4a87139dfc7d96f231e3dcfcbdca3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f20f10075938b5ac3cbef80e43ca5f9f

    SHA1

    322536656fd76e9dae4be07481576c66719f109d

    SHA256

    8b97b9b56206f307ea28b3891ea71a3fe4375e2750e028a5c5425568624a2bc3

    SHA512

    0c4c440e23915388c402fb85ff780c26b68988d410b30c7d7d7f237a54307c806ad5c1c1cb2e4b01e83f19e2fe1bd460770a483c70e062395094e06df28fc535

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d96eeb45579b22d8f4d0d8f050923c0a

    SHA1

    3e977edc5e41c976854bcf4bd638a44d6ba81761

    SHA256

    12a40d6ad0fcd34b3f4796a508c6d9e3295f427a29e81755c62b3f2d9cf79ca7

    SHA512

    8f993846dd608fe95099fe7349c93e73b8fd21fcaa55ba7e838f7080adfe965d2b99bef17192a87bcf0138a59952096265b4a2642645bccffda6e8efd41585c8

  • C:\Users\Admin\AppData\Local\Temp\CabA23A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe.config

    Filesize

    6KB

    MD5

    0a86fa27d09e26491dbbb4fe27f4b410

    SHA1

    63e4b5afb8bdb67fc1d6f8dddeb40be20939289e

    SHA256

    2b6d99db8369b0ff6372737d89d1c9e4101815b4168a3852c7b513f2897e7f3d

    SHA512

    fbebc4dc0925d5d67271cac04c1ed324091442ef4c9f6243d2c1c523c9aa6b338c6a594e4987fc142dd3b2a023338a267c8a3454e47fbf0b3e0dbd7b3b65cc0d

  • C:\Users\Admin\AppData\Local\Temp\TarA24D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2596-6-0x0000000073C00000-0x00000000742EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2596-0-0x0000000073C0E000-0x0000000073C0F000-memory.dmp

    Filesize

    4KB

  • memory/2596-3-0x0000000073C00000-0x00000000742EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2596-2-0x0000000000C90000-0x0000000000CD6000-memory.dmp

    Filesize

    280KB

  • memory/2596-4-0x0000000000CE0000-0x0000000000D06000-memory.dmp

    Filesize

    152KB

  • memory/2596-5-0x0000000001200000-0x000000000121E000-memory.dmp

    Filesize

    120KB

  • memory/2596-11-0x0000000073C00000-0x00000000742EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2596-1-0x0000000001380000-0x00000000018EC000-memory.dmp

    Filesize

    5.4MB