Analysis Overview
SHA256
5c13bc08d1674cb8907be6532baec4f2e210f499e1a29736994f806d1e5427fb
Threat Level: Known bad
The file Roblox-Hack.exe was found to be: Known bad.
Malicious Activity Summary
Discord RAT
Discordrat family
Legitimate hosting services abused for malware hosting/C2
Unsigned PE
Suspicious use of AdjustPrivilegeToken
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Checks SCSI registry key(s)
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-16 23:44
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-16 23:44
Reported
2024-11-16 23:47
Platform
win7-20240903-en
Max time kernel
117s
Max time network
120s
Command Line
Signatures
Discord RAT
Discordrat family
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2160 wrote to memory of 3068 | N/A | C:\Users\Admin\AppData\Local\Temp\Roblox-Hack.exe | C:\Windows\system32\WerFault.exe |
| PID 2160 wrote to memory of 3068 | N/A | C:\Users\Admin\AppData\Local\Temp\Roblox-Hack.exe | C:\Windows\system32\WerFault.exe |
| PID 2160 wrote to memory of 3068 | N/A | C:\Users\Admin\AppData\Local\Temp\Roblox-Hack.exe | C:\Windows\system32\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\Roblox-Hack.exe
"C:\Users\Admin\AppData\Local\Temp\Roblox-Hack.exe"
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2160 -s 632
Network
Files
memory/2160-0-0x000007FEF53E3000-0x000007FEF53E4000-memory.dmp
memory/2160-1-0x000000013FE70000-0x000000013FE82000-memory.dmp
memory/2160-2-0x0000000000640000-0x0000000000658000-memory.dmp
memory/2160-3-0x000007FEF53E0000-0x000007FEF5DCC000-memory.dmp
memory/2160-4-0x000007FEF53E3000-0x000007FEF53E4000-memory.dmp
memory/2160-5-0x000007FEF53E0000-0x000007FEF5DCC000-memory.dmp
memory/2160-6-0x000007FEF53E0000-0x000007FEF5DCC000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-16 23:44
Reported
2024-11-16 23:47
Platform
win10v2004-20241007-en
Max time kernel
148s
Max time network
157s
Command Line
Signatures
Discord RAT
Discordrat family
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName | C:\Windows\system32\taskmgr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 | C:\Windows\system32\taskmgr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A | C:\Windows\system32\taskmgr.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Roblox-Hack.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskmgr.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\system32\taskmgr.exe | N/A |
| Token: SeCreateGlobalPrivilege | N/A | C:\Windows\system32\taskmgr.exe | N/A |
| Token: 33 | N/A | C:\Windows\system32\taskmgr.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\system32\taskmgr.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Processes
C:\Users\Admin\AppData\Local\Temp\Roblox-Hack.exe
"C:\Users\Admin\AppData\Local\Temp\Roblox-Hack.exe"
C:\Windows\system32\taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /4
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | gateway.discord.gg | udp |
| US | 162.159.134.234:443 | gateway.discord.gg | tcp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 234.134.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | discord.com | udp |
| US | 162.159.137.232:443 | discord.com | tcp |
| US | 8.8.8.8:53 | geolocation-db.com | udp |
| DE | 159.89.102.253:443 | geolocation-db.com | tcp |
| US | 162.159.137.232:443 | discord.com | tcp |
| US | 8.8.8.8:53 | 133.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.137.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 253.102.89.159.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 131.109.69.13.in-addr.arpa | udp |
Files
memory/4788-0-0x00007FFF59F73000-0x00007FFF59F75000-memory.dmp
memory/4788-1-0x000001C5043A0000-0x000001C5043B2000-memory.dmp
memory/4788-2-0x000001C504770000-0x000001C504788000-memory.dmp
memory/4788-3-0x000001C51EC20000-0x000001C51EDE2000-memory.dmp
memory/4788-4-0x00007FFF59F70000-0x00007FFF5AA31000-memory.dmp
memory/4788-5-0x000001C51F320000-0x000001C51F848000-memory.dmp
memory/4904-6-0x000001AC5E460000-0x000001AC5E461000-memory.dmp
memory/4904-8-0x000001AC5E460000-0x000001AC5E461000-memory.dmp
memory/4904-7-0x000001AC5E460000-0x000001AC5E461000-memory.dmp
memory/4904-12-0x000001AC5E460000-0x000001AC5E461000-memory.dmp
memory/4904-18-0x000001AC5E460000-0x000001AC5E461000-memory.dmp
memory/4904-17-0x000001AC5E460000-0x000001AC5E461000-memory.dmp
memory/4904-16-0x000001AC5E460000-0x000001AC5E461000-memory.dmp
memory/4904-15-0x000001AC5E460000-0x000001AC5E461000-memory.dmp
memory/4904-14-0x000001AC5E460000-0x000001AC5E461000-memory.dmp
memory/4904-13-0x000001AC5E460000-0x000001AC5E461000-memory.dmp
memory/4788-19-0x00007FFF59F73000-0x00007FFF59F75000-memory.dmp
memory/4788-20-0x00007FFF59F70000-0x00007FFF5AA31000-memory.dmp