Analysis
-
max time kernel
126s -
max time network
99s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
30/10/2024, 01:31
Static task
static1
General
-
Target
Roblox.zip
-
Size
90KB
-
MD5
2b34d1cdf5be2e8b86dcba5bf9b9e46c
-
SHA1
5f91bca2699a499dea24bdb97bc6f00f45528a15
-
SHA256
d390cedf4222277eccbc02514a5d9a47c67379d14bc1d67ee95b096addce601f
-
SHA512
e7dac33ba720de79614a086ea1e47878d0e9b28b9466e99435d5432e534da0dd5df7bdcf0d7fef1011871c42c286dca27cacd1262069eaf92755af30cfd3087b
-
SSDEEP
1536:fMPpnsv6AX06nsAQMpGFaULvzjpCE4RHYue7gSe4risNXvvEBkAI+ig3cJ+spQi7:Wt6pfGJLvzjoNa7Ne4risNXvvEO+Zvsr
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
HMqfL0cBw4qM
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00280000000451b6-2.dat family_asyncrat -
Executes dropped EXE 4 IoCs
pid Process 2068 Roblox.exe 1548 Roblox.exe 3408 Roblox.exe 4880 Roblox.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Roblox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Roblox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Roblox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Roblox.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1584 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 1584 7zFM.exe Token: 35 1584 7zFM.exe Token: SeSecurityPrivilege 1584 7zFM.exe Token: SeDebugPrivilege 2068 Roblox.exe Token: SeDebugPrivilege 2068 Roblox.exe Token: SeDebugPrivilege 4804 taskmgr.exe Token: SeSystemProfilePrivilege 4804 taskmgr.exe Token: SeCreateGlobalPrivilege 4804 taskmgr.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
pid Process 1584 7zFM.exe 1584 7zFM.exe 1584 7zFM.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe -
Suspicious use of SendNotifyMessage 45 IoCs
pid Process 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe 4804 taskmgr.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Roblox.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1584
-
C:\Users\Admin\Desktop\Roblox.exe"C:\Users\Admin\Desktop\Roblox.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
C:\Users\Admin\Desktop\Roblox.exe"C:\Users\Admin\Desktop\Roblox.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1548
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4804
-
C:\Users\Admin\Desktop\Roblox.exe"C:\Users\Admin\Desktop\Roblox.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3408
-
C:\Users\Admin\Desktop\Roblox.exe"C:\Users\Admin\Desktop\Roblox.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD58c7889bde41724ce3db7c67e730677f6
SHA1485891cc9120cb2203a2483754dbd5e6ea24f28e
SHA25683c70bfcb1b41892c9c50cabe9bc2d96b2f7420b28545afabd32f682ac62d0ad
SHA512b7c3aab27fc924dcaef78987b492931e164b9e30b813c532fe87e1d40001ed1861c4b5ddbdd85cd2278681a22e32eee816877f4f63cecaa9972976d87e38f5cc
-
Filesize
128KB
MD54068c787e0957ef2bcace223b329e350
SHA164953413198c9e73d3cb2dee812bf80a359c4d60
SHA2560fe742209ac27e9da3613b6a5a6007f45c9ffbf4f71583752cdf0fa9a70c7780
SHA512f3794b639c45becfae73f3c3e3fe5e722f1b36d904b95bbfde3b7d89b091f457ed6487ed38e650870391fca00c4fc08dd0389092e508d3f759e7cfd60493c849