Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
1Roblox-Mas...in.zip
windows7-x64
1Roblox-Mas...in.zip
windows10-2004-x64
15df42da4-c...dc.mp4
windows7-x64
15df42da4-c...dc.mp4
windows10-2004-x64
6Roblox-Mas...Ban.py
windows7-x64
3Roblox-Mas...Ban.py
windows10-2004-x64
3Roblox-Mas...DME.md
windows7-x64
3Roblox-Mas...DME.md
windows10-2004-x64
3Roblox-Mas...es.txt
windows7-x64
1Roblox-Mas...es.txt
windows10-2004-x64
3Roblox-Mas...ain.py
windows7-x64
3Roblox-Mas...ain.py
windows10-2004-x64
3Roblox-Mas...xy.txt
windows7-x64
1Roblox-Mas...xy.txt
windows10-2004-x64
1Roblox-Mas...up.bat
windows7-x64
1Roblox-Mas...up.bat
windows10-2004-x64
1Roblox-Mas...ts.txt
windows7-x64
1Roblox-Mas...ts.txt
windows10-2004-x64
1python-3.1...64.exe
windows7-x64
4python-3.1...64.exe
windows10-2004-x64
4Analysis
-
max time kernel
844s -
max time network
852s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
Roblox-Mass-Report-main.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Roblox-Mass-Report-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
5df42da4-c2fc-4c88-b987-7b53c91958dc.mp4
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
5df42da4-c2fc-4c88-b987-7b53c91958dc.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Roblox-Mass-Report-main/RBXBan.py
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Roblox-Mass-Report-main/RBXBan.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Roblox-Mass-Report-main/README.md
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Roblox-Mass-Report-main/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Roblox-Mass-Report-main/cookies.txt
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Roblox-Mass-Report-main/cookies.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Roblox-Mass-Report-main/main.py
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Roblox-Mass-Report-main/main.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Roblox-Mass-Report-main/proxy.txt
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Roblox-Mass-Report-main/proxy.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Roblox-Mass-Report-main/setup.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Roblox-Mass-Report-main/setup.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Roblox-Mass-Report-main/useragents.txt
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Roblox-Mass-Report-main/useragents.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
python-3.11.8-amd64.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
python-3.11.8-amd64.exe
Resource
win10v2004-20240802-en
General
-
Target
Roblox-Mass-Report-main/RBXBan.py
-
Size
3KB
-
MD5
b55c5df7de9147c11a5e7413c22881aa
-
SHA1
48ea8cc4ad4394cf0053ef5044999fef1f48d157
-
SHA256
7fa1d25cdfc56a8fc47cd7042b403435257db1d531a40db3558c17a4099e46aa
-
SHA512
02dab4ecd92c1637fb14c72a5724d26ca09e794c36f9c1a208e6ecdb8f823596e3215cc1a859b740826e05753892de2dd8ebcb5976e1c4ce93ffba3096b8e7d4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\py_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2744 AcroRd32.exe 2744 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2096 1088 cmd.exe 31 PID 1088 wrote to memory of 2096 1088 cmd.exe 31 PID 1088 wrote to memory of 2096 1088 cmd.exe 31 PID 2096 wrote to memory of 2744 2096 rundll32.exe 33 PID 2096 wrote to memory of 2744 2096 rundll32.exe 33 PID 2096 wrote to memory of 2744 2096 rundll32.exe 33 PID 2096 wrote to memory of 2744 2096 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Roblox-Mass-Report-main\RBXBan.py1⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Roblox-Mass-Report-main\RBXBan.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Roblox-Mass-Report-main\RBXBan.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5897da79c4ceb8e91728ae1d24c3362b0
SHA198ce057a337b74a536de89cada7ee01628bec579
SHA256e46b9e0cd9c5503aa3fc384274b4a929d50c21dc2e46cd70f34602f6b0448e90
SHA5125052587d41c42b4bf81aab365f58e06be0b446e4209a64b7a84066543672565df724220f0f4645e491a08b4713bbafcf471b1f609145c29611284b4f3e210635