Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 09:27
Behavioral task
behavioral1
Sample
roblox.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
roblox.exe
Resource
win10v2004-20241007-en
General
-
Target
roblox.exe
-
Size
53.5MB
-
MD5
e2b560c208c3f985a399f3d03e76b539
-
SHA1
a510b5eaefee58634e61e5724c541e027f5aad1f
-
SHA256
85cb7bf2dc75844d64ed043f8ab4d80d48989bd2d1084ecc1478b66ee1dda40c
-
SHA512
81c1e6b6e7507f8aa270588105dc6c390cf3195d688d373ce0f9b3d9d93cfd331fd06a0256db5b361b2c26b3b7e8a80f510eae9d193b4142531a0e4ae45951e6
-
SSDEEP
1572864:pGKlKWLxSk8IpG7V+VPhqclE7plPDerSEpbb:gKoKSkB05awcIJDervZb
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1548 roblox.exe -
resource yara_rule behavioral1/files/0x0003000000020aa0-1153.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2916 wrote to memory of 1548 2916 roblox.exe 30 PID 2916 wrote to memory of 1548 2916 roblox.exe 30 PID 2916 wrote to memory of 1548 2916 roblox.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5546cc5fe76abc35fdbf92f682124e23d
SHA15c1030752d32aa067b49125194befee7b3ee985a
SHA25643bff2416ddd123dfb15d23dc3e99585646e8df95633333c56d85545029d1e76
SHA512cb75334f2f36812f3a5efd500b2ad97c21033a7a7054220e58550e95c3408db122997fee70a319aef8db6189781a9f2c00a9c19713a89356038b87b036456720