Resubmissions

22/11/2024, 00:17

241122-ak4a4swpgk 4

22/11/2024, 00:13

241122-ahzvxawpej 8

22/11/2024, 00:12

241122-ahly2swpdp 8

22/11/2024, 00:07

241122-aevf1swnhr 8

22/11/2024, 00:02

241122-abx3qszpbt 8

21/11/2024, 23:59

241121-314k2awnan 8

21/11/2024, 23:52

241121-3w3g6sznes 8

21/11/2024, 23:46

241121-3shzcswmbn 8

21/11/2024, 23:44

241121-3q6yeawlhr 8

General

  • Target

    RobloxPlayerInstaller (2).exe

  • Size

    6.8MB

  • Sample

    241122-ahzvxawpej

  • MD5

    91563396f82674c0b8a13a5bd4faa2cc

  • SHA1

    becfde376e3053a2593640e8fbb743890077ed07

  • SHA256

    c4e4b832dfab883152602b2ffef83f57281ebd8d08b3b8b12540f580fe0526d0

  • SHA512

    07ee5e4084c24885ce735e93c314700dfaad96bf1b65e63a36a9c14c9f91a14fb6d4e26a534627e6a0df9416ce6a80f0539af3e50d5606489638a36b6da95e09

  • SSDEEP

    98304:Mcv+QirHeUqMuUP0vjg9bJnAVxlVvq0waHsdRblAH4qPSAupG+udFJp0:HpirHeUqOYkJSqcHsdRbgPQpB83a

Malware Config

Targets

    • Target

      RobloxPlayerInstaller (2).exe

    • Size

      6.8MB

    • MD5

      91563396f82674c0b8a13a5bd4faa2cc

    • SHA1

      becfde376e3053a2593640e8fbb743890077ed07

    • SHA256

      c4e4b832dfab883152602b2ffef83f57281ebd8d08b3b8b12540f580fe0526d0

    • SHA512

      07ee5e4084c24885ce735e93c314700dfaad96bf1b65e63a36a9c14c9f91a14fb6d4e26a534627e6a0df9416ce6a80f0539af3e50d5606489638a36b6da95e09

    • SSDEEP

      98304:Mcv+QirHeUqMuUP0vjg9bJnAVxlVvq0waHsdRblAH4qPSAupG+udFJp0:HpirHeUqOYkJSqcHsdRbgPQpB83a

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • A potential corporate email address has been identified in the URL: web-vitals@3

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks