Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 17:00
General
-
Target
Roblox(unclose).exe
-
Size
45KB
-
MD5
11544ff4745a17016a9086bac7c0c83c
-
SHA1
91440ea21b73beba389c29784be98b8b83c5ee77
-
SHA256
ec8c79d2dead186bfc98d16e10dea1f01acd654815c1b6a468a427419624d227
-
SHA512
b357274d5d17b05e580b9785ff8aad57ea87dcb721d46cbe8410e87e651bea2fccfd5f93796fd775947c6d0b134a2bbe138857f13c40fda8c634e02bd5e18b48
-
SSDEEP
768:ru1a21T3EiJfWUzDydmo2qzConp/JtByBlPI1zjbKgX3i4G03gSjt7Of78BDZ5A:ru1a21T3xq2Rop/J113bdXS7zSJ7/d5
Malware Config
Extracted
asyncrat
0.5.8
Default
https://d43b-88-230-120-156.ngrok-free.app:80
NU2iszyvlx0s
-
delay
3
-
install
true
-
install_file
Datamc.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023c80-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Roblox(unclose).exe -
Executes dropped EXE 1 IoCs
pid Process 2128 Datamc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Datamc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Roblox(unclose).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4816 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 644 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 4288 Roblox(unclose).exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4288 Roblox(unclose).exe Token: SeDebugPrivilege 2128 Datamc.exe Token: SeDebugPrivilege 2164 taskmgr.exe Token: SeSystemProfilePrivilege 2164 taskmgr.exe Token: SeCreateGlobalPrivilege 2164 taskmgr.exe Token: 33 2164 taskmgr.exe Token: SeIncBasePriorityPrivilege 2164 taskmgr.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe 2164 taskmgr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4288 wrote to memory of 676 4288 Roblox(unclose).exe 88 PID 4288 wrote to memory of 676 4288 Roblox(unclose).exe 88 PID 4288 wrote to memory of 676 4288 Roblox(unclose).exe 88 PID 4288 wrote to memory of 4464 4288 Roblox(unclose).exe 90 PID 4288 wrote to memory of 4464 4288 Roblox(unclose).exe 90 PID 4288 wrote to memory of 4464 4288 Roblox(unclose).exe 90 PID 4464 wrote to memory of 4816 4464 cmd.exe 92 PID 4464 wrote to memory of 4816 4464 cmd.exe 92 PID 4464 wrote to memory of 4816 4464 cmd.exe 92 PID 676 wrote to memory of 644 676 cmd.exe 93 PID 676 wrote to memory of 644 676 cmd.exe 93 PID 676 wrote to memory of 644 676 cmd.exe 93 PID 4464 wrote to memory of 2128 4464 cmd.exe 96 PID 4464 wrote to memory of 2128 4464 cmd.exe 96 PID 4464 wrote to memory of 2128 4464 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Roblox(unclose).exe"C:\Users\Admin\AppData\Local\Temp\Roblox(unclose).exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Datamc" /tr '"C:\Users\Admin\AppData\Roaming\Datamc.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Datamc" /tr '"C:\Users\Admin\AppData\Roaming\Datamc.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD002.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4816
-
-
C:\Users\Admin\AppData\Roaming\Datamc.exe"C:\Users\Admin\AppData\Roaming\Datamc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD559f28e2604ac9a1352e9cdc621147796
SHA1676dd71025dd1760563c08272e9c6d0f63a1f286
SHA2569429f749c52eb2a089b958f8f5c785c5edb554c16523f3ebf03b49d46422df10
SHA512c24d6572271820151cd0f898da2573b185c9a34b5450627cd186ec2f1ebac36cf09b4b570fc0ab2b2c02bbc6ff81f7f38da9593e7f181156e78f20f65ecb08e4
-
Filesize
45KB
MD511544ff4745a17016a9086bac7c0c83c
SHA191440ea21b73beba389c29784be98b8b83c5ee77
SHA256ec8c79d2dead186bfc98d16e10dea1f01acd654815c1b6a468a427419624d227
SHA512b357274d5d17b05e580b9785ff8aad57ea87dcb721d46cbe8410e87e651bea2fccfd5f93796fd775947c6d0b134a2bbe138857f13c40fda8c634e02bd5e18b48