Analysis
-
max time kernel
45s -
max time network
52s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
01-07-2024 16:09
Static task
static1
Behavioral task
behavioral1
Sample
RobloxExecutor.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
RobloxExecutor.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
RobloxExecutor.exe
Resource
win10v2004-20240508-en
General
-
Target
RobloxExecutor.exe
-
Size
316KB
-
MD5
f0c864fee64edd613b413ddb7c559446
-
SHA1
87e75a58eef9f3765a2eed498f6aca135b1ef7c4
-
SHA256
f20df849f7284d15b7915badc28f7afaad9e1a768279ced17db67796f2f883fd
-
SHA512
9c8e90d0a04740ed6e36d886bb13bb9df3b963236eaca0b2fd0db6bfce1d4052761d689d77dcf66c7c07df53295751f0ff8907a8f426ccc4391b365b282bd154
-
SSDEEP
3072:0n2Af+SLiJO+Y7mR9USl6yOiGB3PSQQivLXdn+mvo+vuChrZtwkYZBwOepe4PUe1:1E+yclwQKjdn+WPtYVJIoBfTVRsjbQ2p
Malware Config
Extracted
xworm
5.0
allows-welfare.gl.at.ply.gg:49180
B2qPpHuLCfcwYFiL
-
Install_directory
%AppData%
-
install_file
System.exe
Signatures
-
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\RarSFX0\Systemdefault.exe family_xworm behavioral2/memory/3000-13-0x0000000000530000-0x0000000000540000-memory.dmp family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 4688 powershell.exe 3916 powershell.exe 4268 powershell.exe 4548 powershell.exe -
Drops startup file 2 IoCs
Processes:
Systemdefault.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk Systemdefault.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk Systemdefault.exe -
Executes dropped EXE 2 IoCs
Processes:
Systemdefault.exeLOLPOOP.exepid process 3000 Systemdefault.exe 4832 LOLPOOP.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeSystemdefault.exepid process 4548 powershell.exe 4548 powershell.exe 4548 powershell.exe 4688 powershell.exe 4688 powershell.exe 4688 powershell.exe 3916 powershell.exe 3916 powershell.exe 3916 powershell.exe 4268 powershell.exe 4268 powershell.exe 4268 powershell.exe 3000 Systemdefault.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Systemdefault.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3000 Systemdefault.exe Token: SeDebugPrivilege 4548 powershell.exe Token: SeIncreaseQuotaPrivilege 4548 powershell.exe Token: SeSecurityPrivilege 4548 powershell.exe Token: SeTakeOwnershipPrivilege 4548 powershell.exe Token: SeLoadDriverPrivilege 4548 powershell.exe Token: SeSystemProfilePrivilege 4548 powershell.exe Token: SeSystemtimePrivilege 4548 powershell.exe Token: SeProfSingleProcessPrivilege 4548 powershell.exe Token: SeIncBasePriorityPrivilege 4548 powershell.exe Token: SeCreatePagefilePrivilege 4548 powershell.exe Token: SeBackupPrivilege 4548 powershell.exe Token: SeRestorePrivilege 4548 powershell.exe Token: SeShutdownPrivilege 4548 powershell.exe Token: SeDebugPrivilege 4548 powershell.exe Token: SeSystemEnvironmentPrivilege 4548 powershell.exe Token: SeRemoteShutdownPrivilege 4548 powershell.exe Token: SeUndockPrivilege 4548 powershell.exe Token: SeManageVolumePrivilege 4548 powershell.exe Token: 33 4548 powershell.exe Token: 34 4548 powershell.exe Token: 35 4548 powershell.exe Token: 36 4548 powershell.exe Token: SeDebugPrivilege 4688 powershell.exe Token: SeIncreaseQuotaPrivilege 4688 powershell.exe Token: SeSecurityPrivilege 4688 powershell.exe Token: SeTakeOwnershipPrivilege 4688 powershell.exe Token: SeLoadDriverPrivilege 4688 powershell.exe Token: SeSystemProfilePrivilege 4688 powershell.exe Token: SeSystemtimePrivilege 4688 powershell.exe Token: SeProfSingleProcessPrivilege 4688 powershell.exe Token: SeIncBasePriorityPrivilege 4688 powershell.exe Token: SeCreatePagefilePrivilege 4688 powershell.exe Token: SeBackupPrivilege 4688 powershell.exe Token: SeRestorePrivilege 4688 powershell.exe Token: SeShutdownPrivilege 4688 powershell.exe Token: SeDebugPrivilege 4688 powershell.exe Token: SeSystemEnvironmentPrivilege 4688 powershell.exe Token: SeRemoteShutdownPrivilege 4688 powershell.exe Token: SeUndockPrivilege 4688 powershell.exe Token: SeManageVolumePrivilege 4688 powershell.exe Token: 33 4688 powershell.exe Token: 34 4688 powershell.exe Token: 35 4688 powershell.exe Token: 36 4688 powershell.exe Token: SeDebugPrivilege 3916 powershell.exe Token: SeIncreaseQuotaPrivilege 3916 powershell.exe Token: SeSecurityPrivilege 3916 powershell.exe Token: SeTakeOwnershipPrivilege 3916 powershell.exe Token: SeLoadDriverPrivilege 3916 powershell.exe Token: SeSystemProfilePrivilege 3916 powershell.exe Token: SeSystemtimePrivilege 3916 powershell.exe Token: SeProfSingleProcessPrivilege 3916 powershell.exe Token: SeIncBasePriorityPrivilege 3916 powershell.exe Token: SeCreatePagefilePrivilege 3916 powershell.exe Token: SeBackupPrivilege 3916 powershell.exe Token: SeRestorePrivilege 3916 powershell.exe Token: SeShutdownPrivilege 3916 powershell.exe Token: SeDebugPrivilege 3916 powershell.exe Token: SeSystemEnvironmentPrivilege 3916 powershell.exe Token: SeRemoteShutdownPrivilege 3916 powershell.exe Token: SeUndockPrivilege 3916 powershell.exe Token: SeManageVolumePrivilege 3916 powershell.exe Token: 33 3916 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Systemdefault.exepid process 3000 Systemdefault.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
RobloxExecutor.execmd.exeSystemdefault.exedescription pid process target process PID 2424 wrote to memory of 200 2424 RobloxExecutor.exe cmd.exe PID 2424 wrote to memory of 200 2424 RobloxExecutor.exe cmd.exe PID 2424 wrote to memory of 200 2424 RobloxExecutor.exe cmd.exe PID 200 wrote to memory of 3000 200 cmd.exe Systemdefault.exe PID 200 wrote to memory of 3000 200 cmd.exe Systemdefault.exe PID 200 wrote to memory of 4832 200 cmd.exe LOLPOOP.exe PID 200 wrote to memory of 4832 200 cmd.exe LOLPOOP.exe PID 200 wrote to memory of 4832 200 cmd.exe LOLPOOP.exe PID 3000 wrote to memory of 4548 3000 Systemdefault.exe powershell.exe PID 3000 wrote to memory of 4548 3000 Systemdefault.exe powershell.exe PID 3000 wrote to memory of 4688 3000 Systemdefault.exe powershell.exe PID 3000 wrote to memory of 4688 3000 Systemdefault.exe powershell.exe PID 3000 wrote to memory of 3916 3000 Systemdefault.exe powershell.exe PID 3000 wrote to memory of 3916 3000 Systemdefault.exe powershell.exe PID 3000 wrote to memory of 4268 3000 Systemdefault.exe powershell.exe PID 3000 wrote to memory of 4268 3000 Systemdefault.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RobloxExecutor.exe"C:\Users\Admin\AppData\Local\Temp\RobloxExecutor.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "Systemdefault.exe" & start "" "LOLPOOP.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Systemdefault.exe"Systemdefault.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RarSFX0\Systemdefault.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Systemdefault.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\System.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\LOLPOOP.exe"LOLPOOP.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD54fe9f87c51261a00e91cd99753907c0c
SHA18b5f251289c777a7fb1b20f35e20c1c211019077
SHA25655186dc507827ac8aa95a51ca99e81efcdb3a3d713700052780af5b916f5ff62
SHA512acfa37a5d26a833016cd1ebd96aff7d460ab12fcac8a48be7b1b1c973670eadee0d4d1fe1ff7131530b111cb37f1acc594a4de8a44739fb2cf50d479bb2fbc46
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5766080d0a3bc39cc10eeff410804cf1e
SHA1c704135f8d80cd9a95c131cd5dcf476c40eba7e6
SHA2560049f89e7549ea8b562e328d153b594b20e066bf11d60d01a83a84e392b295ac
SHA512ac9389653e6a11e33a7003cbe5f05b33ce31a4c3ba074a9870163efca50c4c317eababcda741610a2e2ce4e6deed5cfaad6ea96b5bc8a093a7b0164ac397ebf1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5104bfd705288fdea04fc3050855a1898
SHA1eeb089a6a52c42ba39450e45606c04c35533fa1c
SHA256fec76ba7aa2906040ec2cce5ff271aa148ea6b6813fc79790ca641706092425f
SHA512d5bf004ac18f5f859e1da6b8f283452ddea4798a7b22152484a604b28635ea1084597148e30b2b9ca4bfcc4272b127159bb51fc0dd07320b363a7c315e461f7c
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\LOLPOOP.exeFilesize
9KB
MD5c9bd5672882c79b5f7977fc3c37dc9b6
SHA190cfa0e99aacd42bd2561cdb218fd618f0ed4b9f
SHA256c6594102d290245d0830cead7f7e3cacf79db881358f001373fcca0d625d0998
SHA5125586496c54c7c33c3e3f1cd6c4e0117b8e34d42846f55aadf22314144e1e27691e8c7fef924386cd5ae01a958d7437ab1a0b6c709ca06f25f6deab82f6171038
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Systemdefault.exeFilesize
40KB
MD52b7216f79728eb5ff4b5553737685a99
SHA1d7f4f41f03485eb76326c75ec2ae0fe53282ebd0
SHA2565a40bff3109b83243b53bf7439dc5e66e29c923363c02d49fa93614c19ce36f5
SHA512b9f4c8e9b5b46785806eb498028e85d2515d743a518c0ecfd9269e8f4cb2351da0bcd9a6bc0e74eabc33e8dd2374bee46566b188d5f4ee49ba3384ece7a54982
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bi1yhg3j.mvw.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
memory/3000-20-0x000000001B2B0000-0x000000001B2C0000-memory.dmpFilesize
64KB
-
memory/3000-12-0x00007FFFE5D63000-0x00007FFFE5D64000-memory.dmpFilesize
4KB
-
memory/3000-202-0x000000001B2B0000-0x000000001B2C0000-memory.dmpFilesize
64KB
-
memory/3000-199-0x00007FFFE5D63000-0x00007FFFE5D64000-memory.dmpFilesize
4KB
-
memory/3000-13-0x0000000000530000-0x0000000000540000-memory.dmpFilesize
64KB
-
memory/4548-25-0x000001C0ECB00000-0x000001C0ECB22000-memory.dmpFilesize
136KB
-
memory/4548-28-0x000001C0ED280000-0x000001C0ED2F6000-memory.dmpFilesize
472KB
-
memory/4832-16-0x0000000005C00000-0x00000000060FE000-memory.dmpFilesize
5.0MB
-
memory/4832-15-0x0000000000D90000-0x0000000000D98000-memory.dmpFilesize
32KB
-
memory/4832-14-0x00000000724DE000-0x00000000724DF000-memory.dmpFilesize
4KB
-
memory/4832-18-0x0000000005680000-0x000000000568A000-memory.dmpFilesize
40KB
-
memory/4832-17-0x00000000055D0000-0x0000000005662000-memory.dmpFilesize
584KB
-
memory/4832-200-0x00000000724DE000-0x00000000724DF000-memory.dmpFilesize
4KB
-
memory/4832-201-0x00000000724D0000-0x0000000072BBE000-memory.dmpFilesize
6.9MB
-
memory/4832-19-0x00000000724D0000-0x0000000072BBE000-memory.dmpFilesize
6.9MB