General

  • Target

    RobloxPlayerInstaller.exe

  • Size

    6.7MB

  • Sample

    241113-fa359awgrj

  • MD5

    da5705f4ae30d837139cb7380d941e1b

  • SHA1

    08ae6cb9b2703df17b2bf554586a36f4b73502a6

  • SHA256

    9f205a55a45a2a45d2ebb98afb21499b191a4b2e26f4311568d0337b32faa1ca

  • SHA512

    f3042947d05222aff5facc14ac6123380d502435e98608dc6d053848997cdd0fb22b121a381e67df893c15ae14ed836a58fca5898540ea5dfb0a0da32ed8dbef

  • SSDEEP

    98304:e0vhWhkxBW2oqIht3aMQPfb6Fw04X1xEg+CNlPSHtzQLy9rFI:tKkxBW/qgkvFX1xEyP8zQG9r2

Malware Config

Targets

    • Target

      RobloxPlayerInstaller.exe

    • Size

      6.7MB

    • MD5

      da5705f4ae30d837139cb7380d941e1b

    • SHA1

      08ae6cb9b2703df17b2bf554586a36f4b73502a6

    • SHA256

      9f205a55a45a2a45d2ebb98afb21499b191a4b2e26f4311568d0337b32faa1ca

    • SHA512

      f3042947d05222aff5facc14ac6123380d502435e98608dc6d053848997cdd0fb22b121a381e67df893c15ae14ed836a58fca5898540ea5dfb0a0da32ed8dbef

    • SSDEEP

      98304:e0vhWhkxBW2oqIht3aMQPfb6Fw04X1xEg+CNlPSHtzQLy9rFI:tKkxBW/qgkvFX1xEyP8zQG9r2

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • A potential corporate email address has been identified in the URL: [email protected]

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks