Analysis

  • max time kernel
    131s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 13:57

General

  • Target

    Roblox Account Manager.exe

  • Size

    5.2MB

  • MD5

    a057fae0c8c97ee6cf2c12fb7bcf034d

  • SHA1

    64fe0eb242b5c3f9c42f4f2c1685e4a36708e4f6

  • SHA256

    cdb0a360cca7a5099c2d2357be1a833e032ffdeb3f467a6fac845f6bb77031c9

  • SHA512

    447cf69cf39ef19d098f4ab223d6ad9d760efb1eabb1bb0dac27fd2e55ac14c5a6502f2edd00b199d2db702e38551065bcc087c8df931360e769443908a4d200

  • SSDEEP

    98304:b2bT1Qm7d9GP4i7q0LTWgtUmWzmSyZs9S8Z/LywnrSkqXf0Fb7WnhNMYkj7:4Qm59q/tUhzmS9zZ/mY+kSIb7ahNMYk

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe
      "C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    628ccb7770f24a55b7ab893491b07495

    SHA1

    8a6a2830b6ed56a235a250b77794c88b8b8b1d32

    SHA256

    8c8ba67e5ca85fd1dd72a250cbd9e619ac80de00c55ed44b58c4bb9fd3a3f851

    SHA512

    12a26bf7f871e20f4a449af313b14ccaebc18428a6a0f7e7ad7de6a430a2e814aeb3535358040c2b1941c85789d7e04ff3026a8e7aebf2a8ac4698d7eca961db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6546012103d440e46acc128b0688dfbf

    SHA1

    1b72490c3664093665add88288b21415987bf110

    SHA256

    6a65121cadfab2224e8d1f23102c0a94d9b83928e3faeaee843574978b61836a

    SHA512

    06cbb25eefe2735c9cf56ccf8b7149e008422fc0ae3f71d39f4a65db75d15601925d41fc6a159e86baa6e07a83bc6386966c4afa3bc169163fb65ecdec5f521c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6974cef5215563e882c8dad636790b1a

    SHA1

    fdc4201249dce4b5ba388c4f9b2745697570495d

    SHA256

    6ef2723483431e533a486a2f24d98f0230a70436d490ddafc685e0b73572bccf

    SHA512

    8adf3da488b1485ebf2b119664784deed4b6acea7cb840a64450c63ac0c8031104fca09d98307df31dfa16e43541af57dbc86004fd86f2f7d63eca3ce644f69f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f017699caa3170c62fb85cf76fe7884

    SHA1

    6dedd270fc179853d7b1da3d0c074f1cd2c0e27b

    SHA256

    b60d9b65cd9b1107cdf812dc2868b6913fa292a00b9d4739970602c807da195a

    SHA512

    0f74bdebf9cbaa0f4425794189c944ab6dda89851933977dbc2e3a324adaf279f36097b2f0a700e72e330eec674063ced8065b987772f953f7a1e9a7fef58403

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4a3ca69f6620243a5b594f73e32632d

    SHA1

    78016ef591b451a996546bb584171f8ac2f5c7fe

    SHA256

    ebf4d2a99cb3a88db3030096debcc5fdd3987fbbf5740c47e11305675b03b7d9

    SHA512

    d9b966ff9e4c6fde18f616f54aa27ac1717fe2e48dab21f054ae5e1ca5f24d54fdf35c3edd3d83f3e02dea7cb807dd4ab35eb9081a01f27d97f697e34b32b7b9

  • C:\Users\Admin\AppData\Local\Temp\Cab830A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RAMSettings.ini

    Filesize

    1KB

    MD5

    5369e83203a8972ee844ac973efd985a

    SHA1

    d91909ad9be3a67f66687a5cc58258fe2b715986

    SHA256

    fbbf21c6c6a3594b126ad1e48a06e315478022b6fa54ab0dc54b9ddaf30089ee

    SHA512

    af7fbb21b3ff7a32b34c72a303f380edda527a0f4273237f3c9a9f8804e83eb2bbbc1300135d094f64888227d72fdd832616dc2e18797398ad3df6db0d6b16f6

  • C:\Users\Admin\AppData\Local\Temp\RAMTheme.ini

    Filesize

    314B

    MD5

    f18fa783f4d27e35e54e54417334bfb4

    SHA1

    94511cdf37213bebdaf42a6140c9fe5be8eb07ba

    SHA256

    563eb35fd613f4298cd4dceff67652a13ba516a6244d9407c5709323c4ca4bb1

    SHA512

    602f6a68562bc89a4b3c3a71c2477377f161470bf8ae8e6925bf35691367115abfa9809925bd09c35596c6a3e5a7e9d090e5198e6a885a6658049c8732a05071

  • C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe.config

    Filesize

    5KB

    MD5

    7e067afe7c779870c370c40240e2ce1f

    SHA1

    71d59901ee26810c2b2cfdeca176cec9a54fdb48

    SHA256

    5e0ba1895cf088e6d6907b8abbd8cd41c86f39cc642351a9ab0bf458bf1f5b31

    SHA512

    7ae4e81cd7a06aca5c363e1009d898aa8b42236d6796c38a8ba07adb52eae45f69cd446d008a0e1d12c60c02a43bee1c813231d58884c6dd69a2967e243c9cc6

  • C:\Users\Admin\AppData\Local\Temp\Tar830B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\log4.config

    Filesize

    936B

    MD5

    e4659ac08af3582a23f38bf6c562f841

    SHA1

    19cb4f014ba96285fa1798f008deabce632c7e76

    SHA256

    e4b10630d9ec2af508de31752fbbc6816c7426c40a3e57f0a085ce7f42c77bd5

    SHA512

    5bfa1e021cc7ee5e7a00da865d68684202b3b92d3d369b85b80c591fffa67725d434398325dc1e37c659eab62c0a4118b3e279ac0096b95790d252ceb6254249

  • memory/2796-13-0x00000000747F0000-0x0000000074EDE000-memory.dmp

    Filesize

    6.9MB

  • memory/2796-32-0x0000000005AC0000-0x0000000005AC8000-memory.dmp

    Filesize

    32KB

  • memory/2796-17-0x0000000000E50000-0x0000000000EC4000-memory.dmp

    Filesize

    464KB

  • memory/2796-276-0x00000000051B0000-0x00000000051BA000-memory.dmp

    Filesize

    40KB

  • memory/2796-19-0x00000000747F0000-0x0000000074EDE000-memory.dmp

    Filesize

    6.9MB

  • memory/2796-20-0x0000000005610000-0x0000000005644000-memory.dmp

    Filesize

    208KB

  • memory/2796-22-0x00000000747F0000-0x0000000074EDE000-memory.dmp

    Filesize

    6.9MB

  • memory/2796-21-0x000000000A6B0000-0x000000000A742000-memory.dmp

    Filesize

    584KB

  • memory/2796-23-0x0000000005640000-0x000000000564A000-memory.dmp

    Filesize

    40KB

  • memory/2796-28-0x0000000007030000-0x0000000007088000-memory.dmp

    Filesize

    352KB

  • memory/2796-275-0x0000000005190000-0x0000000005198000-memory.dmp

    Filesize

    32KB

  • memory/2796-30-0x000000000A7D0000-0x000000000A88E000-memory.dmp

    Filesize

    760KB

  • memory/2796-31-0x0000000005890000-0x00000000058AA000-memory.dmp

    Filesize

    104KB

  • memory/2796-15-0x00000000747F0000-0x0000000074EDE000-memory.dmp

    Filesize

    6.9MB

  • memory/2796-33-0x0000000005AD0000-0x0000000005AD8000-memory.dmp

    Filesize

    32KB

  • memory/2796-34-0x000000000AE50000-0x000000000AF02000-memory.dmp

    Filesize

    712KB

  • memory/2796-274-0x00000000050F0000-0x0000000005106000-memory.dmp

    Filesize

    88KB

  • memory/2796-273-0x00000000050E0000-0x00000000050EA000-memory.dmp

    Filesize

    40KB

  • memory/2796-272-0x00000000747F0000-0x0000000074EDE000-memory.dmp

    Filesize

    6.9MB

  • memory/3032-4-0x0000000000B30000-0x0000000000B56000-memory.dmp

    Filesize

    152KB

  • memory/3032-3-0x00000000747F0000-0x0000000074EDE000-memory.dmp

    Filesize

    6.9MB

  • memory/3032-2-0x0000000000A90000-0x0000000000AD6000-memory.dmp

    Filesize

    280KB

  • memory/3032-1-0x00000000011D0000-0x000000000170E000-memory.dmp

    Filesize

    5.2MB

  • memory/3032-5-0x0000000000470000-0x000000000048E000-memory.dmp

    Filesize

    120KB

  • memory/3032-6-0x00000000747F0000-0x0000000074EDE000-memory.dmp

    Filesize

    6.9MB

  • memory/3032-7-0x00000000747FE000-0x00000000747FF000-memory.dmp

    Filesize

    4KB

  • memory/3032-0-0x00000000747FE000-0x00000000747FF000-memory.dmp

    Filesize

    4KB

  • memory/3032-12-0x00000000747F0000-0x0000000074EDE000-memory.dmp

    Filesize

    6.9MB