Resubmissions

06-07-2024 15:30

240706-sxe36avglc 10

06-07-2024 11:57

240706-n4vpzayalq 10

General

  • Target

    ROBLOX.exe

  • Size

    924KB

  • Sample

    240706-n4vpzayalq

  • MD5

    1751f41985203c9350750ebe851e8375

  • SHA1

    658256438c0eaf65823b3460baba492d13f3884c

  • SHA256

    c6a3b5d161d915fd5bb009d3518dad2e2c06609f2e77b522776d55afa756b626

  • SHA512

    db99c3803bef4a1b117a7100138c218cd186462d32b94913d13b183aca0ce36b96f3f3cbe4d18dd6744feb32777e805cfeab5655eb4e07b7a341a2f5582f750a

  • SSDEEP

    24576:jWt+0cYc3S0Y0lPZgxxkMSEdSqLFLd/XcDB/EvI:jM+mc3RY0Psk6dFd8Z

Malware Config

Targets

    • Target

      ROBLOX.exe

    • Size

      924KB

    • MD5

      1751f41985203c9350750ebe851e8375

    • SHA1

      658256438c0eaf65823b3460baba492d13f3884c

    • SHA256

      c6a3b5d161d915fd5bb009d3518dad2e2c06609f2e77b522776d55afa756b626

    • SHA512

      db99c3803bef4a1b117a7100138c218cd186462d32b94913d13b183aca0ce36b96f3f3cbe4d18dd6744feb32777e805cfeab5655eb4e07b7a341a2f5582f750a

    • SSDEEP

      24576:jWt+0cYc3S0Y0lPZgxxkMSEdSqLFLd/XcDB/EvI:jM+mc3RY0Psk6dFd8Z

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Possible privilege escalation attempt

    • Stops running service(s)

    • Executes dropped EXE

    • Modifies file permissions

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v13

Execution

Windows Management Instrumentation

1
T1047

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

System Services

1
T1569

Service Execution

1
T1569.002

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Access Token Manipulation

1
T1134

Create Process with Token

1
T1134.002

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

2
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

3
T1112

Indicator Removal

2
T1070

File Deletion

2
T1070.004

File and Directory Permissions Modification

1
T1222

Access Token Manipulation

1
T1134

Create Process with Token

1
T1134.002

Direct Volume Access

1
T1006

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Service Stop

1
T1489

Defacement

1
T1491

Tasks