Analysis
-
max time kernel
11s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 15:12
Behavioral task
behavioral1
Sample
RobloxBooster.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RobloxBooster.exe
Resource
win10v2004-20241007-en
General
-
Target
RobloxBooster.exe
-
Size
81.8MB
-
MD5
866e379f82855dc76587daf7155fe7d8
-
SHA1
6041757219f9d74bbb483d11ffe94623660373d1
-
SHA256
99d9ec0a8c9ccd1ed7f933bcebef79b89ef6f8159cf496ebcb3f300bc7829490
-
SHA512
6668a8eb64362d8bfc0068e451299da472d8917c3b58f165757a00fd6e56a56f128ad2944360a76f96062a8142114f1220b58b326bc09cd56777562c34cefe59
-
SSDEEP
1572864:50RQ+j3w8F0Sk8IpG7V+VPhqArYE7FjCNt1WB/4PcPJKWh9be+P1gD:50RvD1F0SkB05awArzu/kB/YcPsu9bNS
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 1736 RobloxBooster.exe 1736 RobloxBooster.exe 1736 RobloxBooster.exe 1736 RobloxBooster.exe 1736 RobloxBooster.exe 1736 RobloxBooster.exe 1736 RobloxBooster.exe -
resource yara_rule behavioral1/files/0x000300000001cfb0-1314.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1736 2364 RobloxBooster.exe 31 PID 2364 wrote to memory of 1736 2364 RobloxBooster.exe 31 PID 2364 wrote to memory of 1736 2364 RobloxBooster.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\RobloxBooster.exe"C:\Users\Admin\AppData\Local\Temp\RobloxBooster.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\RobloxBooster.exe"C:\Users\Admin\AppData\Local\Temp\RobloxBooster.exe"2⤵
- Loads dropped DLL
PID:1736
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e8b61d27a9d04e28d4dae0bfa0902ed
SHA1861a7b31022915f26fb49c79ac357c65782c9f4b
SHA2561ef06c600c451e66e744b2ca356b7f4b7b88ba2f52ec7795858d21525848ac8c
SHA5121c5b35026937b45beb76cb8d79334a306342c57a8e36cc15d633458582fc8f7d9ab70ace7a92144288c6c017f33ecfc20477a04432619b40a21c9cda8d249f6d
-
Filesize
1.6MB
MD55f6fd64ec2d7d73ae49c34dd12cedb23
SHA1c6e0385a868f3153a6e8879527749db52dce4125
SHA256ff9f102264d1944fbfae2ba70e7a71435f51a3e8c677fd970b621c4c9ea71967
SHA512c4be2d042c6e4d22e46eacfd550f61b8f55814bfe41d216a4df48382247df70bc63151068513855aa78f9b3d2f10ba6a824312948324c92de6dd0f6af414e8ab
-
Filesize
1011KB
MD5849959a003fa63c5a42ae87929fcd18b
SHA1d1b80b3265e31a2b5d8d7da6183146bbd5fb791b
SHA2566238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232
SHA51264958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09
-
Filesize
11KB
MD55a72a803df2b425d5aaff21f0f064011
SHA14b31963d981c07a7ab2a0d1a706067c539c55ec5
SHA256629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086
SHA512bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69
-
Filesize
11KB
MD5721b60b85094851c06d572f0bd5d88cd
SHA14d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7
SHA256dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf
SHA512430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b
-
Filesize
14KB
MD51ed0b196ab58edb58fcf84e1739c63ce
SHA1ac7d6c77629bdee1df7e380cc9559e09d51d75b7
SHA2568664222823e122fca724620fd8b72187fc5336c737d891d3cef85f4f533b8de2
SHA512e1fa7f14f39c97aaa3104f3e13098626b5f7cfd665ba52dcb2312a329639aaf5083a9177e4686d11c4213e28acc40e2c027988074b6cc13c5016d5c5e9ef897b
-
Filesize
11KB
MD591a2ae3c4eb79cf748e15a58108409ad
SHA1d402b9df99723ea26a141bfc640d78eaf0b0111b
SHA256b0eda99eabd32fefecc478fd9fe7439a3f646a864fdab4ec3c1f18574b5f8b34
SHA5128527af610c1e2101b6f336a142b1a85ac9c19bb3af4ad4a245cfb6fd602dc185da0f7803358067099475102f3a8f10a834dc75b56d3e6ded2ed833c00ad217ed