File name:

RobloxPlayerInstaller.exe

Full analysis: https://app.any.run/tasks/c6faf52e-b305-4ef8-ac5b-f666b2838c63
Verdict: Malicious activity
Analysis date: April 13, 2024, 11:49:31
OS: Ubuntu 22.04.2
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

9FB66FFA1E1F4DEDFD16EB3A8170BAFD

SHA1:

69B5D57DDDA6B97ADDE820B9CEADDAE9C33D53BD

SHA256:

7953B28B736795AAA54E6CD5CB591E794E2F770C1045CA2E33AF5FF19F480EAA

SSDEEP:

98304:wps0+wLp7069ZBLHB/Evdm/85D3vtjDnx9LdkZo2+pTJWkoLNQXXOz9x9PNvxaas:uLC0C5L

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks DMI information (probably VM detection)

      • systemd-hostnamed (PID: 9288)
    • Executes commands using command-line interpreter

      • gnome-terminal-server (PID: 9302)
      • su (PID: 9333)
    • Reads information about logins, logouts, and login attempts

      • sudo (PID: 9332)
      • bash (PID: 9320)
    • Executes the "rm" command to delete files or directories

      • bash (PID: 9334)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2043:01:15 20:10:58+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 3329536
InitializedDataSize: 9658368
UninitializedDataSize: -
EntryPoint: 0x2da800
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.6.0.40079
ProductVersionNumber: 1.6.0.40079
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Roblox Corporation
FileDescription: Roblox
FileVersion: 1, 6, 0, 6200463
LegalCopyright: Copyright © 2020 Roblox Corporation. All rights reserved.
OriginalFileName: Roblox.exe
ProductName: Roblox Bootstrapper
ProductVersion: 1, 6, 0, 6200463
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
262
Monitored processes
40
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start sh no specs sudo no specs nautilus no specs locale-check no specs systemd-hostnamed no specs gnome-terminal no specs gnome-terminal.real no specs gnome-terminal-server no specs bash no specs lesspipe no specs dircolors no specs basename no specs dash no specs dirname no specs sudo no specs sudo no specs su no specs bash no specs lesspipe no specs basename no specs dash no specs dircolors no specs dirname no specs rm no specs udisksd no specs gnome-session-binary no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs systemd no specs

Process information

PID
CMD
Path
Indicators
Parent process
9266/bin/sh -c "DISPLAY=:0 sudo -iu user nautilus \"/tmp/RobloxPlayerInstaller\.exe\" "/bin/shany-guest-agent
User:
user
Integrity Level:
UNKNOWN
Exit code:
9340
9267sudo -iu user nautilus /tmp/RobloxPlayerInstaller.exe/usr/bin/sudosh
User:
user
Integrity Level:
UNKNOWN
Exit code:
676
9268nautilus /tmp/RobloxPlayerInstaller.exe/usr/bin/nautilussudo
User:
user
Integrity Level:
UNKNOWN
Exit code:
9340
9269/usr/bin/locale-check C.UTF-8/usr/bin/locale-checknautilus
User:
user
Integrity Level:
UNKNOWN
Exit code:
0
9288/lib/systemd/systemd-hostnamed/lib/systemd/systemd-hostnamedsystemd
User:
root
Integrity Level:
UNKNOWN
Exit code:
9340
9295/usr/bin/python3 /usr/bin/gnome-terminal/usr/bin/gnome-terminalgnome-shell
User:
user
Integrity Level:
UNKNOWN
Exit code:
496
9297/usr/bin/gnome-terminal.real/usr/bin/gnome-terminal.realgnome-terminal
User:
user
Integrity Level:
UNKNOWN
Exit code:
496
9302/usr/libexec/gnome-terminal-server/usr/libexec/gnome-terminal-serversystemd
User:
user
Integrity Level:
UNKNOWN
9320bash/bin/bashgnome-terminal-server
User:
user
Integrity Level:
UNKNOWN
9321/bin/sh /usr/bin/lesspipe/usr/bin/lesspipebash
User:
user
Integrity Level:
UNKNOWN
Exit code:
496
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
9268nautilus/home/user/.local/share/nautilus/tags/meta.db-wal
MD5:
SHA256:
9268nautilus/home/user/.local/share/nautilus/tags/meta.db-shm
MD5:
SHA256:
9268nautilus/home/user/.local/share/nautilus/tags/.meta.isrunning
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
4
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
204
185.125.190.98:80
http://connectivity-check.ubuntu.com/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
185.125.190.98:80
Canonical Group Limited
GB
unknown
185.125.188.59:443
api.snapcraft.io
Canonical Group Limited
GB
unknown
185.125.188.55:443
api.snapcraft.io
Canonical Group Limited
GB
unknown
224.0.0.251:5353
unknown

DNS requests

Domain
IP
Reputation
api.snapcraft.io
  • 185.125.188.59
  • 185.125.188.55
  • 185.125.188.54
  • 185.125.188.58
unknown
38.100.168.192.in-addr.arpa
unknown
connectivity-check.ubuntu.com
  • 2620:2d:4000:1::98
  • 2620:2d:4000:1::22
  • 2001:67c:1562::23
  • 2001:67c:1562::24
  • 2620:2d:4000:1::23
  • 2620:2d:4002:1::196
  • 2620:2d:4000:1::2a
  • 2620:2d:4000:1::96
  • 2620:2d:4000:1::97
  • 2620:2d:4002:1::198
  • 2620:2d:4002:1::197
  • 2620:2d:4000:1::2b
unknown

Threats

No threats detected
No debug info