Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
28/12/2022, 19:37
221228-yb6lwabd55 828/12/2022, 19:35
221228-yandxaed9z 128/12/2022, 19:22
221228-x3lkcaed8x 4Analysis
-
max time kernel
281s -
max time network
295s -
platform
windows7_x64 -
resource
win7-20220812-es -
resource tags
arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows -
submitted
28/12/2022, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
Minecraft.exe
Resource
win7-20220812-es
Behavioral task
behavioral2
Sample
Minecraft.exe
Resource
win10v2004-20221111-es
General
-
Target
Minecraft.exe
-
Size
397KB
-
MD5
d99bb55b57712065bc88be297c1da38c
-
SHA1
fb6662dd31e8e5be380fbd7a33a50a45953fe1e7
-
SHA256
122bfbb9f67e355340991deeacb167be9c12ad726b5a7c5779448dd0cc4af0cb
-
SHA512
3eb5d57faea4c0146c2af40102deaac18235b379f5e81fe35a977b642e3edf70704c8cedd835e94f27b04c8413968f7469fccf82c1c9339066d38d3387c71b17
-
SSDEEP
3072:puzvch1rugYc4wqYSRR756K7ItBjgXHUYCnlK:Wch1aIqYSRVM+unlK
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2208 LauncherFenix-Minecraft-v7.exe 288 LauncherFenix-Minecraft-v7.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1344 chrome.exe 1376 chrome.exe 1376 chrome.exe 2884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 892 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 892 AUDIODG.EXE Token: 33 892 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 892 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2020 javaw.exe 2020 javaw.exe 2020 javaw.exe 2020 javaw.exe 928 mspaint.exe 928 mspaint.exe 928 mspaint.exe 928 mspaint.exe 2156 javaw.exe 2156 javaw.exe 2156 javaw.exe 2156 javaw.exe 2156 javaw.exe 2156 javaw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 600 wrote to memory of 2020 600 Minecraft.exe 28 PID 600 wrote to memory of 2020 600 Minecraft.exe 28 PID 600 wrote to memory of 2020 600 Minecraft.exe 28 PID 600 wrote to memory of 2020 600 Minecraft.exe 28 PID 1376 wrote to memory of 1728 1376 chrome.exe 34 PID 1376 wrote to memory of 1728 1376 chrome.exe 34 PID 1376 wrote to memory of 1728 1376 chrome.exe 34 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 976 1376 chrome.exe 35 PID 1376 wrote to memory of 1344 1376 chrome.exe 36 PID 1376 wrote to memory of 1344 1376 chrome.exe 36 PID 1376 wrote to memory of 1344 1376 chrome.exe 36 PID 1376 wrote to memory of 1636 1376 chrome.exe 37 PID 1376 wrote to memory of 1636 1376 chrome.exe 37 PID 1376 wrote to memory of 1636 1376 chrome.exe 37 PID 1376 wrote to memory of 1636 1376 chrome.exe 37 PID 1376 wrote to memory of 1636 1376 chrome.exe 37 PID 1376 wrote to memory of 1636 1376 chrome.exe 37 PID 1376 wrote to memory of 1636 1376 chrome.exe 37 PID 1376 wrote to memory of 1636 1376 chrome.exe 37 PID 1376 wrote to memory of 1636 1376 chrome.exe 37 PID 1376 wrote to memory of 1636 1376 chrome.exe 37 PID 1376 wrote to memory of 1636 1376 chrome.exe 37 PID 1376 wrote to memory of 1636 1376 chrome.exe 37 PID 1376 wrote to memory of 1636 1376 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Minecraft.exe"C:\Users\Admin\AppData\Local\Temp\Minecraft.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\Minecraft.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:928
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4941⤵
- Suspicious use of AdjustPrivilegeToken
PID:892
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5d64f50,0x7fef5d64f60,0x7fef5d64f702⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1044 /prefetch:22⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1836 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:12⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2064 /prefetch:12⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2524 /prefetch:22⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1412 /prefetch:12⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3492 /prefetch:82⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3604 /prefetch:82⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3708 /prefetch:82⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3816 /prefetch:82⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3900 /prefetch:82⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3924 /prefetch:82⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3520 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3432 /prefetch:82⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3904 /prefetch:82⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3976 /prefetch:82⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3968 /prefetch:82⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4064 /prefetch:82⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4040 /prefetch:82⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3592 /prefetch:82⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4076 /prefetch:82⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4060 /prefetch:82⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4120 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3604 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2168 /prefetch:12⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=536 /prefetch:82⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3124 /prefetch:82⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6272 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6288 /prefetch:82⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6420 /prefetch:82⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1012,10774292999769546188,3323325038830933295,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6428 /prefetch:82⤵PID:2080
-
-
C:\Users\Admin\Downloads\LauncherFenix-Minecraft-v7.exe"C:\Users\Admin\Downloads\LauncherFenix-Minecraft-v7.exe"2⤵
- Executes dropped EXE
PID:2208 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\Downloads\LauncherFenix-Minecraft-v7.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:2156
-
-
-
C:\Program Files\Windows Defender\MSASCui.exe"C:\Program Files\Windows Defender\MSASCui.exe"1⤵PID:2792
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2920
-
C:\Users\Admin\Desktop\LauncherFenix-Minecraft-v7.exe"C:\Users\Admin\Desktop\LauncherFenix-Minecraft-v7.exe"1⤵
- Executes dropped EXE
PID:288 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\Desktop\LauncherFenix-Minecraft-v7.exe"2⤵PID:3004
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD507f95d3042285cf342f35da65359ac8c
SHA18d5a0505ac983ca7d717141ba135422fbeb50306
SHA25624ed3de5a5aad644143a2a20415fcf53d69a3f0eab7d2bb02e344893d15be887
SHA5126310fc83ff1680d4ce0f3ae586c33f93e2aad343875ade7a2a7f53ad0a4e0dfdc9255405c860d873ba73f4b8523122860944abe8c2034232ce27549a7c09e759
-
Filesize
532KB
MD505aff84f1e32ae647a07d9a8f08ae469
SHA1cf5bf03cfa8d049ed0f2aabfc6a9eb39c9c55996
SHA256f7b522005824dd48ec9a762d2961cb1e38176b12466ded5e2412f0c50367b112
SHA512a1ef44948253abb87a85c723fdde1b448947c8d2279c0fa6013e2c0b68708ce78087554dbc70b0f17fc4707fcdc7838a6eef0d6a27341b8936cca8b6e4b2518c
-
Filesize
377KB
MD5dbde1b1efcfc9f6d0df63212b81d4b81
SHA11137627eaaaed0bf7e495345743747015dfd1d01
SHA256ac05025aaab9d07fad827773233ec8e499e3db8d91a92d2a5f529fcfbeefd9a1
SHA5125f174e557dde01e13d8b3b625509a57e854b6869ad17700164ae8f1fdd5425a9897c8191148ee06765add8660f9f0c33cdf40089abfbc6938fd645579f07efe5
-
Filesize
493KB
MD52054143e52736ebcf86fef541da99774
SHA115e839a01d300e769887ebda7e33775390956b6f
SHA2560eb53b40609f3974dd9714b4818a5bbf24551bb42a271233572b33870dd84cbf
SHA512fa81d25759f525ccc609a36bf36721e752f7c9b6677bee27469ddff0495be64e9c321745519b7da818ea2edd721ee1e2a8f2697ed034f72805ee91fc473f65f4
-
Filesize
474KB
MD5a5bf3dd65d58b25608efab6227472024
SHA13b9eedcef532e6fba7e6867e56bd1113836eb6b1
SHA25697e0164da41ec97298be8b685d06a4504722679b2df364b5392c54e5a7472adc
SHA5127366dbddd9ea00c5a1b1ec12f53129832a84336166e279510f4e631a64a8b5b7a456086cfe6c8c2727333d99cadccda7ac8c10bd4a7c355f36552a035d76a36f
-
Filesize
571KB
MD52c388f3b3db90716860e222479a3f319
SHA1fc525126d3ef3919d05ac8207f87e08b8a346a8b
SHA256cbc929ac356970ee01bb8ed4a8bd6789198aeac3a5631d2285c738ebf7e245e6
SHA5120b88881437d886ec0b049be4bdbfd858f9f1953cc81311048e7016be1ac386cb96519a77762f1e33b192d1172e58aa82479c2c444af5d716cbd4e71c84031b38
-
Filesize
358KB
MD5160a86dd17606b5ffd5221639d67de4b
SHA1899676283faf7ad12e8b3c4f3891bb58ab0d0a59
SHA256bfcf0b10c1904ea6a5675e9dea631c958c6c2f2c513b1b49d1a777d58e8565d1
SHA512e961a6ac7ffee11bafd7574d9679d84224f232a8d27ffaac605975a7370b0f61d35956b790ab2e67d8407c0b136059824387e9b6b4f158788d46f7846018bcbe
-
Filesize
871KB
MD50f8d7224508195ced2788c686a73a13c
SHA11526c95d8d14e8f430d082083c5c842bf8841163
SHA25693afdf2dec041e65cd7121d163d68d7569b530b651610831e57ded626206d2cb
SHA512224d2423d310581ece325d824e63cbda3b4390d303bd8ad677e11b884e4ea4d6c921f0f922fa09f36f3f06af42952740f66092ff5bd8c2e21bbce1fc8624daac
-
Filesize
241KB
MD571979b80ef6801c3d0f3659eebffe025
SHA1362347302d595a8eebc336f184a065292a3b4733
SHA2563f4311a5b5cbe829ea112bc31bfa05457bc8a2cdeb85c6eb291b42d34329b039
SHA512218373c0bd74759d52d03a7d3d2e8cf863a21c170a1c5e396c8884484a87a50636de3e317edea77861b710cc7794adf210561c0e9d7125ebc4f7a5dfb0c72aa7
-
Filesize
416KB
MD579b547dff3ea94765b36d8277932a838
SHA1f92a74e77fd57694652e15400dab180fa57138e9
SHA25683b7ef46b4f5d9b2a94efb3d21fc5f65ba4c4320b6a9abd57a2174d6f59db339
SHA512f8f1672f2663dceb58143f9b6b9aa6cd0d740c6cd0b8e6ad856d78102882c91c02bdd112dd224f9563643afb314abea24161b6ce84006699de7933c7136a11d4
-
Filesize
454KB
MD58f4fbf22d50dcf15540d7705281bed72
SHA1bb0b5c823430bbff65ac51802ada24ffeaf5a135
SHA25614efae237e5bdd879aee255a207001211788e83910e93f9e27c7650b999a440a
SHA51263dbab2cada4ebbd2c927a6b43d88f391a7da916bef3f5b3b28df1deb9454b1c4ab48f23d272bc9283ffbc78cd50c56c67a79be69346b249e5c05f3ceb56d4ab
-
Filesize
280KB
MD5276576b1e2c03af28219a3e774fc7c6a
SHA117dd5bd63571608842f956da22fdb3ef94a43376
SHA2562a1097f8ae3046ab32a4841eead0d3b252d51eb426a96e1d8c879a826effebb3
SHA512a26b0dfef5c70ccdef1b8cd7cbc322d152635f990ddaf2d0bd8e29568733f879205bf47f67e4102eafe5f331462868e00db43880d2b773e5fd853ba802aa50c3
-
Filesize
338KB
MD56851ef54bdf9afc4f80948b4b39a8c28
SHA1b070fce81ce1df59fe610a81be6763c792398f39
SHA256ebca83f8f84dec01c0f7b156c700e4ad44ed463461598abd8062c717e8d5c935
SHA5125342b0f4c1ba49d5ff5e119ca677a191249434a2dc05cf160a20048d6b7000f37e09cc75f3bc6f24108f743a162e77f007e1bd6290fd6a66fc30b17c0996ec25
-
Filesize
551KB
MD5b7e536c29661502b7aab5ac142214423
SHA13077549fde698254c9b4b0bea3aba52cde31be0b
SHA256ca4dd8f86264c4b583ead4c1cf2469c7d5b130fd919cd39a007c0c2d5be9a9ca
SHA512ec5c3cdc591045dc91015eb6ae211a081706d4dca47227d529dffa2077ceb7b0d341959063847fea84c7c63105ef6345fc7817c330b6e4e0a13de56d9de24dbe
-
Filesize
435KB
MD5817ab25dedde6d89cf89cdc86a2c7c66
SHA1983643fbac5c42ea65d577cc5e2ffb811537ff25
SHA2560fa9fb372e486381fd0c68ae3cbd2442be28e5d1be46cba7c8e72fe5ca96caca
SHA512744ce94b840a4ce2763336ae8d41a530d15ec4e4189cc0e2c87093d6df0ea5abcaa85c0fbff1b5b2868765a126bf0bbf205de8ef4d28259da2b2f0eff932acdd
-
Filesize
396KB
MD518297ab72de91d7d8c3c4f061f2aa98e
SHA11614334e867d7c4c92960f9c9828737346107f7a
SHA256b85e3970a5d3273fe24dc43271feb64df4f7e814434dedc35328fe92e2b76305
SHA5129f497ca3fc68a3bc2d94328dd19bb2ab10610144791e6ff54f8bfa22ca5480762a5c2142732f5115942e5efdeb0bd7b621bf2c612e33bb9cfd9d9e546ebdafd7
-
Filesize
261KB
MD55301920201fa473a27ffd5c9810fc872
SHA123882151e93ae5eb65e9e8c56271dc41d2921504
SHA2561569d14c8219887dac1160a6ed2497bcfaea0a135dd14b7049463eeca9c18961
SHA5120edd3def4a73fbc10c462a3010ff492fdb220bad81aa5b2ee727b791f95ab2a25c32bf36ab5643a1349d9fa358990aa726e10c2d684a27265a144cbef9551994
-
Filesize
590KB
MD56831a3032baa816778b9e06cd3b4b9c0
SHA10e71786b25d299675a527620cd2e5548c1a17da9
SHA256bcca47251c45ff0a67b660841dab425804a314520fe4c04365dc26b413e2c451
SHA512c54140228775917e1c1514a069eac01a0e1fd24f29f36b6f1b82444c749ae40342d97d81b3b21b46235e5e98f418aed6ec381bef2f74322b47ec8aac7aa12a76
-
Filesize
512KB
MD58cd9a509c8e343118d7bb0a0f4c29ae1
SHA108b0e55ef5f0578f8f0cba4f012ba324acfd8e00
SHA256c4068ff2e8ffb10b2760c55e12f128ccf6537ea34cb7d641602072aa39ca516c
SHA5123345028cc7b6fbaf692f0e9b1b493fa82bc6904fde22a8c17510b950ac7098e5752830031ca2db629acc627082b3d20e2626c05bf05efb0ca7cca3ca1bead944
-
Filesize
319KB
MD5e5a7bcbc6e97ddba4b86ac243a5c66f8
SHA1a66fcd8ecd598b6b4ee022b64f172a76d9c6aa57
SHA2569c4d2b1fe260e223ba2e101eb4d5ae031493a4af2f9760dda9d5446ba06da2de
SHA51222797a571a9fa39780ef5f4d700a3e2d5f1ab9cb631fe7ea29d2f2fdb53a0c46cc91ebf6aca72506f558c3456e1a9e6c83fa26e9cf16247f641d81cd5844f16d
-
Filesize
222KB
MD5af96e71a162e8bd0b541de7a48d95fa5
SHA178704168091bb2839b549efe79a8e4dac6cd84c3
SHA256a2d42e4aa97d9e74c86a28dac729c66d263cbe2077dd71ae608281c962fc7caa
SHA5125b0d84be1564b3331a888c929523af4633da498e642d4c5470fa0d2ae28c3057671f6ab99b3aeaff78ba33fa5b2718441ba1fe780028ccc3c44bc381042d5852
-
Filesize
609KB
MD53095990defdaed9fbc7545c6fb803b40
SHA17e86e295835934a8b7a0856c02e6c5aa924c1ea5
SHA256f8ff2fc7d0bbd9748c8217990f744271538fa5331af108a2c115be7d2e4935e5
SHA512e62f0cc018c64684a51d12b7564b02a1c622139e5e1d497151e50ca198ee34328a1df2a4f2515a150f16e2d36a261a22e6893115044144b332d0b01c22847db3
-
Filesize
1KB
MD522260c6c949270d1b0d3a1187eeaf06e
SHA108d26f319cb75b6c97a35dd058361cc376d6facc
SHA25663b70d30c3a5457a32b3c175b08fa88322627f498c216ac94f5121245c0504b1
SHA512a42317cb555ba7d3b013b597cdc051c32a7e53a07103bd3b6afa9b04c5eb71a01ff0adf782c9ca6c2600571cf09291bda669360c702b38a1edd6b919c140f9a7
-
Filesize
931B
MD5970d8953f5bc8d759741b5263c73f888
SHA1f1a6408c02e83a977467ad84a6566629a98a58a8
SHA2562b1ac23d14aad8d6f9fcb55ddd4405c68d4ad8d83214e7ef36ed1c9ccdab2eef
SHA5123c5bcad10882ade665af9225370ecbf966df5f6eae593d909e4f0a76025522dca00de3ffef692f977b7c0a76582200128112aff0e80b02946aa92db74e581404
-
Filesize
878B
MD55d4290a862712105b5769badae840584
SHA180ea05b2c2cf5d272a598c08a7e70b1e8652d9bf
SHA2566cc2c98598069cdc28652e9634cbf6460f9d9dd8635251fb72ea1162ae88f5af
SHA512b96013a30ede31a80f18044cafc79b9ab56cfbc1232f78583f02f9a43919bf27f8a279873c31f53aa8fd6036b66688a25ec241a680e2351d0ceae9ee8a6e568a