Analysis
-
max time kernel
600s -
max time network
597s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
23-11-2022 07:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/minetest/minetest/releases
Resource
win10-20220812-en
windows10-1703-x64
8 signatures
600 seconds
General
-
Target
https://github.com/minetest/minetest/releases
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 2 IoCs
Processes:
firefox.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 2 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\minetest-5.6.1-win64.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\AppData\Local\Temp\minetest-5.6.1-win64-1.zip:Zone.Identifier firefox.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
firefox.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 3288 firefox.exe Token: SeDebugPrivilege 3288 firefox.exe Token: SeDebugPrivilege 3288 firefox.exe Token: SeDebugPrivilege 3288 firefox.exe Token: SeDebugPrivilege 3288 firefox.exe Token: SeDebugPrivilege 3288 firefox.exe Token: SeDebugPrivilege 3288 firefox.exe Token: SeDebugPrivilege 3288 firefox.exe Token: SeDebugPrivilege 3288 firefox.exe Token: 33 4884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4884 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
firefox.exepid process 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
firefox.exeOpenWith.exepid process 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe 4504 OpenWith.exe 3288 firefox.exe 3288 firefox.exe 3288 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 3832 wrote to memory of 3288 3832 firefox.exe firefox.exe PID 3832 wrote to memory of 3288 3832 firefox.exe firefox.exe PID 3832 wrote to memory of 3288 3832 firefox.exe firefox.exe PID 3832 wrote to memory of 3288 3832 firefox.exe firefox.exe PID 3832 wrote to memory of 3288 3832 firefox.exe firefox.exe PID 3832 wrote to memory of 3288 3832 firefox.exe firefox.exe PID 3832 wrote to memory of 3288 3832 firefox.exe firefox.exe PID 3832 wrote to memory of 3288 3832 firefox.exe firefox.exe PID 3832 wrote to memory of 3288 3832 firefox.exe firefox.exe PID 3288 wrote to memory of 4812 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 4812 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 3364 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 4904 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 4904 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 4904 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 4904 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 4904 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 4904 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 4904 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 4904 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 4904 3288 firefox.exe firefox.exe PID 3288 wrote to memory of 4904 3288 firefox.exe firefox.exe
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://github.com/minetest/minetest/releases1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://github.com/minetest/minetest/releases2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3288.0.131281830\1140576142" -parentBuildID 20200403170909 -prefsHandle 1552 -prefMapHandle 1544 -prefsLen 1 -prefMapSize 220115 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3288 "\\.\pipe\gecko-crash-server-pipe.3288" 1632 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3288.3.745860643\2131670843" -childID 1 -isForBrowser -prefsHandle 2228 -prefMapHandle 2096 -prefsLen 156 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3288 "\\.\pipe\gecko-crash-server-pipe.3288" 2240 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3288.13.190411432\1323448686" -childID 2 -isForBrowser -prefsHandle 3376 -prefMapHandle 3372 -prefsLen 6938 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3288 "\\.\pipe\gecko-crash-server-pipe.3288" 3344 tab3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\minetest-5.6.1-win64\bin\minetest.exe"C:\minetest-5.6.1-win64\bin\minetest.exe"1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4181⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/652-120-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-121-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-122-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-124-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-128-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-127-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-126-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-125-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-129-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-130-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-123-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-131-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-133-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-134-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-135-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-136-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-137-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-139-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-138-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-140-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-141-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-142-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-132-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-143-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-145-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-144-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-146-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-149-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-148-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-150-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-147-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-151-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-152-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-153-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-154-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-156-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-157-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-155-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-158-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-160-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-161-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-159-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-162-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-167-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-169-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-168-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-170-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-166-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-171-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-172-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-165-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-164-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-163-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-173-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-174-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-175-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-176-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-177-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-179-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-178-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-180-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-181-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-182-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB
-
memory/652-183-0x00007FF66ED30000-0x00007FF66ED40000-memory.dmpFilesize
64KB