Edit tour
Windows
Analysis Report
roblox1.exe
Overview
General Information
Detection
Python Stealer, Monster Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Yara detected Monster Stealer
AI detected suspicious sample
Bypasses PowerShell execution policy
Detected generic credential text file
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Gathers network related connection and port information
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Overwrites the password of the administrator account
Performs a network lookup / discovery via ARP
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes)
Sigma detected: MSHTA Suspicious Execution 01
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses attrib.exe to hide files
Uses ipconfig to lookup or modify the Windows network settings
Uses netsh to modify the Windows network and firewall settings
Uses netstat to query active network connections and open ports
Yara detected Generic Python Stealer
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Console CodePage Lookup Via CHCP
Sigma detected: PowerShell Get-Clipboard Cmdlet Via CLI
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious Group And Account Reconnaissance Activity Using Net.EXE
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Classification
- System is w10x64
- roblox1.exe (PID: 1364 cmdline:
"C:\Users\ user\Deskt op\roblox1 .exe" MD5: CD463D16CF57C3A9F5C9588A878A7213) - conhost.exe (PID: 5876 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - stub.exe (PID: 3428 cmdline:
C:\Users\u ser\Deskto p\roblox1. exe MD5: 6FE46FD6E5B143F5114E6616C59B703C) - cmd.exe (PID: 5384 cmdline:
C:\Windows \system32\ cmd.exe /c "ver" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 5072 cmdline:
C:\Windows \system32\ cmd.exe /c "wmic csp roduct get uuid" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - WMIC.exe (PID: 5168 cmdline:
wmic cspro duct get u uid MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - cmd.exe (PID: 3908 cmdline:
C:\Windows \system32\ cmd.exe /c "tasklist " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - tasklist.exe (PID: 356 cmdline:
tasklist MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) - cmd.exe (PID: 5040 cmdline:
C:\Windows \system32\ cmd.exe /c "attrib + h +s "C:\U sers\user\ AppData\Lo cal\Monste rUpdateSer vice\Monst er.exe"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - attrib.exe (PID: 5452 cmdline:
attrib +h +s "C:\Use rs\user\Ap pData\Loca l\MonsterU pdateServi ce\Monster .exe" MD5: 5037D8E6670EF1D89FB6AD435F12A9FD) - cmd.exe (PID: 3488 cmdline:
C:\Windows \system32\ cmd.exe /c "mshta "j avascript: var sh=new ActiveXOb ject('WScr ipt.Shell' ); sh.Popu p('The Pro gram can\x 22t start because ap i-ms-win-c rt-runtime -|l1-1-.dl l is missi ng from yo ur compute r. Try rei nstalling the progra m to fix t his proble m', 0, 'Sy stem Error ', 0+16);c lose()"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - mshta.exe (PID: 2752 cmdline:
mshta "jav ascript:va r sh=new A ctiveXObje ct('WScrip t.Shell'); sh.Popup( 'The Progr am can\x22 t start be cause api- ms-win-crt -runtime-| l1-1-.dll is missing from your computer. Try reins talling th e program to fix thi s problem' , 0, 'Syst em Error', 0+16);clo se()" MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - cmd.exe (PID: 3260 cmdline:
C:\Windows \system32\ cmd.exe /c "taskkill /F /IM ch rome.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - taskkill.exe (PID: 5396 cmdline:
taskkill / F /IM chro me.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7) - cmd.exe (PID: 768 cmdline:
C:\Windows \system32\ cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - tasklist.exe (PID: 5500 cmdline:
tasklist / FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) - cmd.exe (PID: 6488 cmdline:
C:\Windows \system32\ cmd.exe /c "powershe ll.exe Get -Clipboard " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - powershell.exe (PID: 5960 cmdline:
powershell .exe Get-C lipboard MD5: 04029E121A0CFA5991749937DD22A1D9) - cmd.exe (PID: 900 cmdline:
C:\Windows \system32\ cmd.exe /c "chcp" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - chcp.com (PID: 880 cmdline:
chcp MD5: 33395C4732A49065EA72590B14B64F32) - cmd.exe (PID: 2036 cmdline:
C:\Windows \system32\ cmd.exe /c "chcp" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - chcp.com (PID: 4584 cmdline:
chcp MD5: 33395C4732A49065EA72590B14B64F32) - cmd.exe (PID: 5224 cmdline:
C:\Windows \system32\ cmd.exe /c "echo ### #System In fo#### & s ysteminfo & echo ### #System Ve rsion#### & ver & ec ho ####Hos t Name#### & hostnam e & echo # ###Environ ment Varia ble#### & set & echo ####Logic al Disk### # & wmic l ogicaldisk get capti on,descrip tion,provi dername & echo ####U ser Info## ## & net u ser & echo ####Onlin e User#### & query u ser & echo ####Local Group#### & net loc algroup & echo ####A dministrat ors Info## ## & net l ocalgroup administra tors & ech o ####Gues t User Inf o#### & ne t user gue st & echo ####Admini strator Us er Info### # & net us er adminis trator & e cho ####St artup Info #### & wmi c startup get captio n,command & echo ### #Tasklist# ### & task list /svc & echo ### #Ipconfig# ### & ipco nfig/all & echo #### Hosts#### & type C:\ WINDOWS\Sy stem32\dri vers\etc\h osts & ech o ####Rout e Table### # & route print & ec ho ####Arp Info#### & arp -a & echo #### Netstat### # & netsta t -ano & e cho ####Se rvice Info #### & sc query type = service state= all & echo ## ##Firewall info#### & netsh fir ewall show state & n etsh firew all show c onfig" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - systeminfo.exe (PID: 6324 cmdline:
systeminfo MD5: EE309A9C61511E907D87B10EF226FDCD) - WmiPrvSE.exe (PID: 7140 cmdline:
C:\Windows \system32\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51) - HOSTNAME.EXE (PID: 5836 cmdline:
hostname MD5: 33AFAA43B84BDEAB12E02F9DBD2B2EE0) - WMIC.exe (PID: 4916 cmdline:
wmic logic aldisk get caption,d escription ,providern ame MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - net.exe (PID: 6120 cmdline:
net user MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - net1.exe (PID: 6864 cmdline:
C:\Windows \system32\ net1 user MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9) - conhost.exe (PID: 6864 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - query.exe (PID: 2752 cmdline:
query user MD5: 29043BC0B0F99EAFF36CAD35CBEE8D45) - quser.exe (PID: 356 cmdline:
"C:\Window s\system32 \quser.exe " MD5: 480868AEBA9C04CA04D641D5ED29937B) - net.exe (PID: 880 cmdline:
net localg roup MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - net1.exe (PID: 5320 cmdline:
C:\Windows \system32\ net1 local group MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9) - net.exe (PID: 2788 cmdline:
net localg roup admin istrators MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - net1.exe (PID: 1272 cmdline:
C:\Windows \system32\ net1 local group admi nistrators MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9) - net.exe (PID: 768 cmdline:
net user g uest MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - net1.exe (PID: 3776 cmdline:
C:\Windows \system32\ net1 user guest MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9) - net.exe (PID: 6408 cmdline:
net user a dministrat or MD5: 0BD94A338EEA5A4E1F2830AE326E6D19) - net1.exe (PID: 1660 cmdline:
C:\Windows \system32\ net1 user administra tor MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9) - WMIC.exe (PID: 7100 cmdline:
wmic start up get cap tion,comma nd MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - tasklist.exe (PID: 5712 cmdline:
tasklist / svc MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA) - ipconfig.exe (PID: 5896 cmdline:
ipconfig / all MD5: 62F170FB07FDBB79CEB7147101406EB8) - ROUTE.EXE (PID: 5996 cmdline:
route prin t MD5: 3C97E63423E527BA8381E81CBA00B8CD) - ARP.EXE (PID: 5976 cmdline:
arp -a MD5: 2AF1B2C042B83437A4BE82B19749FA98) - NETSTAT.EXE (PID: 3500 cmdline:
netstat -a no MD5: 7FDDD6681EA81CE26E64452336F479E6) - sc.exe (PID: 7116 cmdline:
sc query t ype= servi ce state= all MD5: 3FB5CF71F7E7EB49790CB0E663434D80) - netsh.exe (PID: 4648 cmdline:
netsh fire wall show state MD5: 6F1E6DD688818BC3D1391D0CC7D597EB) - netsh.exe (PID: 900 cmdline:
netsh fire wall show config MD5: 6F1E6DD688818BC3D1391D0CC7D597EB) - cmd.exe (PID: 6168 cmdline:
C:\Windows \system32\ cmd.exe /c "netsh wl an show pr ofiles" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - netsh.exe (PID: 1660 cmdline:
netsh wlan show prof iles MD5: 6F1E6DD688818BC3D1391D0CC7D597EB) - cmd.exe (PID: 4784 cmdline:
C:\Windows \system32\ cmd.exe /c "wmic csp roduct get uuid" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - WMIC.exe (PID: 4352 cmdline:
wmic cspro duct get u uid MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - cmd.exe (PID: 2660 cmdline:
C:\Windows \system32\ cmd.exe /c "powershe ll.exe -No Profile -E xecutionPo licy Bypas s -Encoded Command Ww BSAGUAZgBs AGUAYwB0AG kAbwBuAC4A QQBzAHMAZQ BtAGIAbAB5 AF0AOgA6AE wAbwBhAGQA VwBpAHQAaA BQAGEAcgB0 AGkAYQBsAE 4AYQBtAGUA KAAiAFMAeQ BzAHQAZQBt AC4ARAByAG EAdwBpAG4A ZwAiACkADQ AKAGYAdQBu AGMAdABpAG 8AbgAgAHMA YwByAGUAZQ BuAHMAaABv AHQAKABbAE QAcgBhAHcA aQBuAGcALg BSAGUAYwB0 AGEAbgBnAG wAZQBdACQA YgBvAHUAbg BkAHMALAAg ACQAcABhAH QAaAApACAA ewANAAoAIA AgACAAJABi AG0AcAAgAD 0AIABOAGUA dwAtAE8AYg BqAGUAYwB0 ACAARAByAG EAdwBpAG4A ZwAuAEIAaQ B0AG0AYQBw ACAAJABiAG 8AdQBuAGQA cwAuAHcAaQ BkAHQAaAAs ACAAJABiAG 8AdQBuAGQA cwAuAGgAZQ BpAGcAaAB0 AA0ACgAgAC AAIAAkAGcA cgBhAHAAaA BpAGMAcwAg AD0AIABbAE QAcgBhAHcA aQBuAGcALg BHAHIAYQBw AGgAaQBjAH MAXQA6ADoA RgByAG8AbQ BJAG0AYQBn AGUAKAAkAG IAbQBwACkA DQAKAA0ACg AgACAAIAAk AGcAcgBhAH AAaABpAGMA cwAuAEMAbw BwAHkARgBy AG8AbQBTAG MAcgBlAGUA bgAoACQAYg BvAHUAbgBk AHMALgBMAG 8AYwBhAHQA aQBvAG4ALA AgAFsARABy AGEAdwBpAG 4AZwAuAFAA bwBpAG4AdA BdADoAOgBF AG0AcAB0AH kALAAgACQA YgBvAHUAbg BkAHMALgBz AGkAegBlAC kADQAKAA0A CgAgACAAIA AkAGIAbQBw AC4AUwBhAH YAZQAoACQA cABhAHQAaA ApAA0ACgAN AAoAIAAgAC AAJABnAHIA YQBwAGgAaQ BjAHMALgBE AGkAcwBwAG 8AcwBlACgA KQANAAoAIA AgACAAJABi AG0AcAAuAE QAaQBzAHAA bwBzAGUAKA ApAA0ACgB9 AA0ACgANAA oAJABiAG8A dQBuAGQAcw AgAD0AIABb AEQAcgBhAH cAaQBuAGcA LgBSAGUAYw B0AGEAbgBn AGwAZQBdAD oAOgBGAHIA bwBtAEwAVA BSAEIAKAAw ACwAIAAwAC wAIAAxADkA MgAwACwAIA AxADAAOAAw ACkADQAKAC QAcABhAHQA aAAgAD0AIA AoAEcAZQB0 AC0ASQB0AG UAbQAgAC4A KQAuAEYAdQ BsAGwATgBh AG0AZQArAC IAXABzAGMA cgBlAGUAbg BzAGgAbwB0 AC4AcABuAG cAIgANAAoA cwBjAHIAZQ BlAG4AcwBo AG8AdAAgAC QAYgBvAHUA bgBkAHMAIA AkAHAAYQB0 AGgA" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - powershell.exe (PID: 4424 cmdline:
powershell .exe -NoPr ofile -Exe cutionPoli cy Bypass -EncodedCo mmand WwBS AGUAZgBsAG UAYwB0AGkA bwBuAC4AQQ BzAHMAZQBt AGIAbAB5AF 0AOgA6AEwA bwBhAGQAVw BpAHQAaABQ AGEAcgB0AG kAYQBsAE4A YQBtAGUAKA AiAFMAeQBz AHQAZQBtAC 4ARAByAGEA dwBpAG4AZw AiACkADQAK AGYAdQBuAG MAdABpAG8A bgAgAHMAYw ByAGUAZQBu AHMAaABvAH QAKABbAEQA cgBhAHcAaQ BuAGcALgBS AGUAYwB0AG EAbgBnAGwA ZQBdACQAYg BvAHUAbgBk AHMALAAgAC QAcABhAHQA aAApACAAew ANAAoAIAAg ACAAJABiAG 0AcAAgAD0A IABOAGUAdw AtAE8AYgBq AGUAYwB0AC AARAByAGEA dwBpAG4AZw AuAEIAaQB0 AG0AYQBwAC AAJABiAG8A dQBuAGQAcw AuAHcAaQBk AHQAaAAsAC AAJABiAG8A dQBuAGQAcw AuAGgAZQBp AGcAaAB0AA 0ACgAgACAA IAAkAGcAcg BhAHAAaABp AGMAcwAgAD 0AIABbAEQA cgBhAHcAaQ BuAGcALgBH AHIAYQBwAG gAaQBjAHMA XQA6ADoARg ByAG8AbQBJ AG0AYQBnAG UAKAAkAGIA bQBwACkADQ AKAA0ACgAg ACAAIAAkAG cAcgBhAHAA aABpAGMAcw AuAEMAbwBw AHkARgByAG 8AbQBTAGMA cgBlAGUAbg AoACQAYgBv AHUAbgBkAH MALgBMAG8A YwBhAHQAaQ BvAG4ALAAg AFsARAByAG EAdwBpAG4A ZwAuAFAAbw BpAG4AdABd ADoAOgBFAG 0AcAB0AHkA LAAgACQAYg BvAHUAbgBk AHMALgBzAG kAegBlACkA DQAKAA0ACg AgACAAIAAk AGIAbQBwAC 4AUwBhAHYA ZQAoACQAcA BhAHQAaAAp AA0ACgANAA oAIAAgACAA JABnAHIAYQ BwAGgAaQBj AHMALgBEAG kAcwBwAG8A cwBlACgAKQ ANAAoAIAAg ACAAJABiAG 0AcAAuAEQA aQBzAHAAbw BzAGUAKAAp AA0ACgB9AA 0ACgANAAoA JABiAG8AdQ BuAGQAcwAg AD0AIABbAE QAcgBhAHcA aQBuAGcALg BSAGUAYwB0 AGEAbgBnAG wAZQBdADoA OgBGAHIAbw BtAEwAVABS AEIAKAAwAC wAIAAwACwA IAAxADkAMg AwACwAIAAx ADAAOAAwAC kADQAKACQA cABhAHQAaA AgAD0AIAAo AEcAZQB0AC 0ASQB0AGUA bQAgAC4AKQ AuAEYAdQBs AGwATgBhAG 0AZQArACIA XABzAGMAcg BlAGUAbgBz AGgAbwB0AC 4AcABuAGcA IgANAAoAcw BjAHIAZQBl AG4AcwBoAG 8AdAAgACQA YgBvAHUAbg BkAHMAIAAk AHAAYQB0AG gA MD5: 04029E121A0CFA5991749937DD22A1D9)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GenericPythonStealer | Yara detected Generic Python Stealer | Joe Security | ||
JoeSecurity_MonsterStealer | Yara detected Monster Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_GenericPythonStealer | Yara detected Generic Python Stealer | Joe Security | ||
JoeSecurity_MonsterStealer | Yara detected Monster Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_GenericPythonStealer | Yara detected Generic Python Stealer | Joe Security | ||
Click to see the 11 entries |
System Summary |
---|
Source: | Author: Diego Perez (@darkquassar), Markus Neis, Swisscom (Improve Rule): |
Source: | Author: Perez Diego (@darkquassar), oscd.community: |
Source: | Author: frack113: |