Analysis
-
max time kernel
600s -
max time network
604s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
23-11-2022 07:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.minetest.net
Resource
win10-20220812-en
windows10-1703-x64
8 signatures
600 seconds
General
-
Target
https://www.minetest.net
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings firefox.exe -
NTFS ADS 1 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\minetest-5.6.1-win64.zip:Zone.Identifier firefox.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
firefox.exedescription pid process Token: SeDebugPrivilege 4688 firefox.exe Token: SeDebugPrivilege 4688 firefox.exe Token: SeDebugPrivilege 4688 firefox.exe Token: SeDebugPrivilege 4688 firefox.exe Token: SeDebugPrivilege 4688 firefox.exe Token: SeDebugPrivilege 4688 firefox.exe Token: SeDebugPrivilege 4688 firefox.exe Token: SeDebugPrivilege 4688 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
firefox.exepid process 4688 firefox.exe 4688 firefox.exe 4688 firefox.exe 4688 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 4688 firefox.exe 4688 firefox.exe 4688 firefox.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
firefox.exepid process 4688 firefox.exe 4688 firefox.exe 4688 firefox.exe 4688 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 2940 wrote to memory of 4688 2940 firefox.exe firefox.exe PID 2940 wrote to memory of 4688 2940 firefox.exe firefox.exe PID 2940 wrote to memory of 4688 2940 firefox.exe firefox.exe PID 2940 wrote to memory of 4688 2940 firefox.exe firefox.exe PID 2940 wrote to memory of 4688 2940 firefox.exe firefox.exe PID 2940 wrote to memory of 4688 2940 firefox.exe firefox.exe PID 2940 wrote to memory of 4688 2940 firefox.exe firefox.exe PID 2940 wrote to memory of 4688 2940 firefox.exe firefox.exe PID 2940 wrote to memory of 4688 2940 firefox.exe firefox.exe PID 4688 wrote to memory of 4768 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4768 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4280 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4388 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4388 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4388 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4388 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4388 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4388 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4388 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4388 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4388 4688 firefox.exe firefox.exe PID 4688 wrote to memory of 4388 4688 firefox.exe firefox.exe
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.minetest.net1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.minetest.net2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4688.0.833660168\323194508" -parentBuildID 20200403170909 -prefsHandle 1516 -prefMapHandle 1508 -prefsLen 1 -prefMapSize 220115 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4688 "\\.\pipe\gecko-crash-server-pipe.4688" 1596 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4688.3.2039858614\1492770756" -childID 1 -isForBrowser -prefsHandle 2232 -prefMapHandle 2228 -prefsLen 156 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4688 "\\.\pipe\gecko-crash-server-pipe.4688" 2240 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4688.13.2044168653\1106591750" -childID 2 -isForBrowser -prefsHandle 3292 -prefMapHandle 3288 -prefsLen 6938 -prefMapSize 220115 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4688 "\\.\pipe\gecko-crash-server-pipe.4688" 3268 tab3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵