Analysis Overview
SHA256
122bfbb9f67e355340991deeacb167be9c12ad726b5a7c5779448dd0cc4af0cb
Threat Level: Known bad
The file LauncherFenix-Minecraft-v7.exe was found to be: Known bad.
Malicious Activity Summary
BazarBackdoor
Bazar/Team9 Backdoor payload
Executes dropped EXE
Downloads MZ/PE file
Loads dropped DLL
Suspicious use of WriteProcessMemory
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of FindShellTrayWindow
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-12-29 23:53
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-12-29 23:53
Reported
2022-12-29 23:56
Platform
win7-20220812-es
Max time kernel
120s
Max time network
151s
Command Line
Signatures
BazarBackdoor
Bazar/Team9 Backdoor payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Downloads MZ/PE file
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Downloads\jre-8u351-windows-x64.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\jds7187746.tmp\jre-8u351-windows-x64.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\jre-8u351-windows-x64.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Java\jre7\bin\javaw.exe | N/A |
| N/A | N/A | C:\Program Files\Java\jre7\bin\javaw.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe
"C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"
C:\Program Files\Java\jre7\bin\javaw.exe
"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef69e4f50,0x7fef69e4f60,0x7fef69e4f70
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1032 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1304 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1760 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2028 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2076 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3380 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3552 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3708 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3616 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3916 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2172 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2312 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3740 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5152 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5132 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=920 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5284 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1020,1754481596887985335,7401133888984488150,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5324 /prefetch:8
C:\Users\Admin\Downloads\jre-8u351-windows-x64.exe
"C:\Users\Admin\Downloads\jre-8u351-windows-x64.exe"
C:\Users\Admin\AppData\Local\Temp\jds7187746.tmp\jre-8u351-windows-x64.exe
"C:\Users\Admin\AppData\Local\Temp\jds7187746.tmp\jre-8u351-windows-x64.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | www.dropbox.com | udp |
| N/A | 162.125.8.18:443 | www.dropbox.com | tcp |
| N/A | 162.125.8.18:443 | www.dropbox.com | tcp |
| N/A | 162.125.8.18:443 | www.dropbox.com | tcp |
| N/A | 8.8.8.8:53 | files.launcherfenix.com.ar | udp |
| N/A | 104.21.72.175:443 | files.launcherfenix.com.ar | tcp |
| N/A | 8.8.8.8:53 | launchermeta.mojang.com | udp |
| N/A | 13.107.237.67:443 | launchermeta.mojang.com | tcp |
| N/A | 8.8.8.8:53 | profile.launcherfenix.com.ar | udp |
| N/A | 172.67.153.84:80 | profile.launcherfenix.com.ar | tcp |
| N/A | 8.8.8.8:53 | iniciolauncherfx.tumblr.com | udp |
| N/A | 74.114.154.18:80 | iniciolauncherfx.tumblr.com | tcp |
| N/A | 74.114.154.18:443 | iniciolauncherfx.tumblr.com | tcp |
| N/A | 8.8.8.8:53 | assets.tumblr.com | udp |
| N/A | 8.8.8.8:53 | px.srvcs.tumblr.com | udp |
| N/A | 192.0.77.40:443 | px.srvcs.tumblr.com | tcp |
| N/A | 192.0.77.40:443 | px.srvcs.tumblr.com | tcp |
| N/A | 192.0.77.40:443 | px.srvcs.tumblr.com | tcp |
| N/A | 192.0.77.40:443 | px.srvcs.tumblr.com | tcp |
| N/A | 8.8.8.8:53 | static.tumblr.com | udp |
| N/A | 192.0.77.40:443 | static.tumblr.com | tcp |
| N/A | 8.8.8.8:53 | accounts.google.com | udp |
| N/A | 8.8.8.8:53 | clients2.google.com | udp |
| N/A | 172.217.168.237:443 | accounts.google.com | tcp |
| N/A | 142.250.179.174:443 | clients2.google.com | tcp |
| N/A | 8.8.8.8:53 | dns.google | udp |
| N/A | 8.8.8.8:53 | dns.google | udp |
| N/A | 8.8.4.4:443 | dns.google | tcp |
| N/A | 8.8.4.4:443 | dns.google | tcp |
| N/A | 8.8.4.4:443 | dns.google | udp |
| N/A | 34.104.35.123:80 | edgedl.me.gvt1.com | tcp |
| N/A | 142.250.179.131:443 | ssl.gstatic.com | tcp |
| N/A | 142.250.179.142:443 | apis.google.com | tcp |
| N/A | 84.53.185.139:443 | www.java.com | tcp |
| N/A | 142.250.179.142:443 | udp | |
| N/A | 69.192.66.17:443 | static.ocecdn.oraclecloud.com | tcp |
| N/A | 138.1.45.89:443 | tcp | |
| N/A | 95.101.125.213:443 | www.oracle.com | tcp |
| N/A | 69.192.64.212:443 | c.oracleinfinity.io | tcp |
| N/A | 142.250.179.170:443 | content-autofill.googleapis.com | tcp |
| N/A | 142.251.39.110:443 | play.google.com | tcp |
| N/A | 142.251.39.110:443 | udp | |
| N/A | 142.251.39.110:443 | tcp | |
| N/A | 142.251.39.110:443 | encrypted-tbn0.gstatic.com | tcp |
| N/A | 142.251.39.110:443 | tcp | |
| N/A | 142.251.39.110:443 | tcp | |
| N/A | 142.251.39.110:443 | tcp | |
| N/A | 142.251.39.110:443 | tcp | |
| N/A | 23.222.18.199:443 | tcp | |
| N/A | 69.192.64.212:443 | c.oracleinfinity.io | tcp |
| N/A | 95.101.125.213:443 | www.oracle.com | tcp |
| N/A | 18.65.39.5:443 | consent.trustarc.com | tcp |
| N/A | 138.1.45.89:443 | tcp | |
| N/A | 15.188.95.229:443 | oracle.112.2o7.net | tcp |
| N/A | 18.65.39.5:443 | consent.trustarc.com | tcp |
| N/A | 138.1.45.89:443 | tcp | |
| N/A | 138.1.45.89:443 | tcp | |
| N/A | 95.101.58.226:443 | tcp | |
| N/A | 23.72.252.153:443 | tcp | |
| N/A | 23.72.252.131:443 | tcp | |
| N/A | 23.72.252.160:443 | tcp | |
| N/A | 23.72.252.176:443 | tcp | |
| N/A | 138.1.45.89:443 | tcp | |
| N/A | 138.1.45.89:443 | tcp | |
| N/A | 138.1.45.89:443 | tcp | |
| N/A | 138.1.45.89:443 | tcp | |
| N/A | 69.192.71.29:443 | tcp | |
| N/A | 69.192.71.29:443 | tcp | |
| N/A | 104.85.4.85:443 | sdlc-esd.oracle.com | tcp |
| N/A | 8.8.4.4:443 | dns.google | tcp |
| N/A | 8.8.4.4:443 | dns.google | udp |
| N/A | 142.251.36.14:443 | sb-ssl.google.com | tcp |
| N/A | 8.8.8.8:53 | javadl-esd-secure.oracle.com | udp |
| N/A | 23.222.50.60:443 | javadl-esd-secure.oracle.com | tcp |
| N/A | 8.8.8.8:53 | rps-svcs.oracle.com | udp |
| N/A | 23.222.50.60:443 | rps-svcs.oracle.com | tcp |
| N/A | 8.8.8.8:53 | javadl.oracle.com | udp |
| N/A | 69.192.71.29:443 | javadl.oracle.com | tcp |
| N/A | 8.8.8.8:53 | sdlc-esd.oracle.com | udp |
| N/A | 104.85.4.85:443 | sdlc-esd.oracle.com | tcp |
Files
memory/2032-54-0x0000000075361000-0x0000000075363000-memory.dmp
memory/1960-55-0x0000000000000000-mapping.dmp
memory/1960-56-0x000007FEFBB11000-0x000007FEFBB13000-memory.dmp
memory/1960-69-0x00000000022C0000-0x00000000052C0000-memory.dmp
memory/1960-70-0x0000000000140000-0x000000000014A000-memory.dmp
memory/1960-71-0x0000000000140000-0x000000000014A000-memory.dmp
memory/1960-74-0x0000000001F60000-0x0000000001F6A000-memory.dmp
memory/1960-76-0x00000000022C0000-0x00000000052C0000-memory.dmp
\??\pipe\crashpad_1472_UOIWFAOKTMIOIWVL
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
\Users\Admin\Downloads\jre-8u351-windows-x64.exe
| MD5 | 7542ec421a2f6e90751e8b64c22e0542 |
| SHA1 | d207d221a28ede5c2c8415f82c555989aa7068ba |
| SHA256 | 188ca8ecc44de1b7f602e883c3054dc392792c3631bf362b1bc4f3e1dba323e6 |
| SHA512 | 8987bf8aa1b401815fa9850e56954db6015bdd06ce78b65ba435724582ffa615dee4e1452fa237c53257dca8ee97b469d01c27757a5f070ce6f807a4f81094bc |
\Users\Admin\Downloads\jre-8u351-windows-x64.exe
| MD5 | 7542ec421a2f6e90751e8b64c22e0542 |
| SHA1 | d207d221a28ede5c2c8415f82c555989aa7068ba |
| SHA256 | 188ca8ecc44de1b7f602e883c3054dc392792c3631bf362b1bc4f3e1dba323e6 |
| SHA512 | 8987bf8aa1b401815fa9850e56954db6015bdd06ce78b65ba435724582ffa615dee4e1452fa237c53257dca8ee97b469d01c27757a5f070ce6f807a4f81094bc |
\Users\Admin\Downloads\jre-8u351-windows-x64.exe
| MD5 | 7542ec421a2f6e90751e8b64c22e0542 |
| SHA1 | d207d221a28ede5c2c8415f82c555989aa7068ba |
| SHA256 | 188ca8ecc44de1b7f602e883c3054dc392792c3631bf362b1bc4f3e1dba323e6 |
| SHA512 | 8987bf8aa1b401815fa9850e56954db6015bdd06ce78b65ba435724582ffa615dee4e1452fa237c53257dca8ee97b469d01c27757a5f070ce6f807a4f81094bc |
\Users\Admin\Downloads\jre-8u351-windows-x64.exe
| MD5 | 7542ec421a2f6e90751e8b64c22e0542 |
| SHA1 | d207d221a28ede5c2c8415f82c555989aa7068ba |
| SHA256 | 188ca8ecc44de1b7f602e883c3054dc392792c3631bf362b1bc4f3e1dba323e6 |
| SHA512 | 8987bf8aa1b401815fa9850e56954db6015bdd06ce78b65ba435724582ffa615dee4e1452fa237c53257dca8ee97b469d01c27757a5f070ce6f807a4f81094bc |
\Users\Admin\Downloads\jre-8u351-windows-x64.exe
| MD5 | 4daf83e878a63cb5477a9e2fd5b30b27 |
| SHA1 | aa9f61c6be1a4b3255ecb60fc74e7f90050ceff0 |
| SHA256 | 46bfb151ed8181439d0c699965b783df975440a6c9397af02d00ef062cefafc6 |
| SHA512 | 9cf1843c7a51f2009af814ae3f1e92226b246e7c8308c7e9f8aadb3f92b1225e4ab20c0365fe89c6265782813374bbd08c67a39fe11647e54b77e6dddde52ee4 |
memory/2312-83-0x0000000000000000-mapping.dmp
C:\Users\Admin\Downloads\jre-8u351-windows-x64.exe
| MD5 | ab13147774684efb36decd0d5f1fadfc |
| SHA1 | 7123640be10d5924fe486d4446ad85c02248d9a8 |
| SHA256 | 74e1ac895a1d9bc96476200e83dfdd108220819d773156f309be86e1df7c08ae |
| SHA512 | 7f862668122e6e8c28924b3b5307fa4a36af1dd082bb7b584ae1cab688384572e0b614542bc5316b1e08109c7c753a7a4520c3661604f4cb9c5af0a4159d2ca4 |
memory/2360-86-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\jds7187746.tmp\jre-8u351-windows-x64.exe
| MD5 | cb62d5e4b5512b8e0b350bf2f55cd093 |
| SHA1 | 59a29f5ea9588c8f8b4d86677f0f154042da9776 |
| SHA256 | b8c5f1c7b7fecb8ce1e74a9c743ed61dace8eac38f4e4e5887aac6288e4ca03e |
| SHA512 | f92d63a0de2837e4e45ac3c72fcc0f3d2d630f4afb9e4a548e884cb579dc50269c2d49fdfea4e80a07360c5729366d588f10852aed401fc022a5c43354e7414f |
\Users\Admin\AppData\Local\Temp\jds7187746.tmp\jre-8u351-windows-x64.exe
| MD5 | cb62d5e4b5512b8e0b350bf2f55cd093 |
| SHA1 | 59a29f5ea9588c8f8b4d86677f0f154042da9776 |
| SHA256 | b8c5f1c7b7fecb8ce1e74a9c743ed61dace8eac38f4e4e5887aac6288e4ca03e |
| SHA512 | f92d63a0de2837e4e45ac3c72fcc0f3d2d630f4afb9e4a548e884cb579dc50269c2d49fdfea4e80a07360c5729366d588f10852aed401fc022a5c43354e7414f |
C:\Users\Admin\AppData\Local\Temp\jusched.log
| MD5 | 3d24cf56977b48ec6b872ac5f3371eb3 |
| SHA1 | ae8b684c1d551fa733be996af4bee7d2effc4299 |
| SHA256 | 47ad3e954263bf6e70d7e9146b2e32e9923d002524b1241004a55267bb032987 |
| SHA512 | b5c9ea39c8ed48c8c615e263c87373cf5d215798c169582b2560bd0782ed451ec5ba08186689a22f893ecc396865daed2f7f49f001bf6b34319a569c0b58860c |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
| MD5 | fc4666cbca561e864e7fdf883a9e6661 |
| SHA1 | 2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5 |
| SHA256 | 10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b |
| SHA512 | c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | abcf9c1c4b08705c782d5dac30eb5415 |
| SHA1 | 1d06baac3c44cfb39c1f747bd9eb1f2e42cb2692 |
| SHA256 | 0903204dfa152859cd67058a63ea74d2bce02644c5b6a86fa4da610d57a6d0ed |
| SHA512 | 20a44d1d93d06f0e58e676b05d5417e1cbd11fd3d5ca4ac953b77e7087da40580473879319d9f3412ae6d112dc7bfd7dada584430d13df8d1bd4614692329a2d |
C:\Users\Admin\AppData\Local\Temp\jds7187746.tmp\jre-8u351-windows-x64.exe
| MD5 | f92771aac91e72fab7e97537d2f0dc3d |
| SHA1 | 20972887d1a77096866ca95c91cfb661fb15bb27 |
| SHA256 | 5ec2b2f04f957b85bfaadd123be47f11d9a6e6b47f7a453fd375e20306a71405 |
| SHA512 | 46c24d01324a0c4ef86c2e286d71aac4bde7701eb3f0f5b1f48c35fe1b165d11a0f19bc8da4596fa421ab596a3a2eb663f15a1a1ef9bc27b225072aeb9f45c15 |
Analysis: behavioral2
Detonation Overview
Submitted
2022-12-29 23:53
Reported
2022-12-29 23:56
Platform
win10v2004-20221111-es
Max time kernel
18s
Max time network
50s
Command Line
Signatures
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe | N/A |
| N/A | N/A | C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe | N/A |
| N/A | N/A | C:\Windows\system32\OpenWith.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3028 wrote to memory of 3344 | N/A | C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe | C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe |
| PID 3028 wrote to memory of 3344 | N/A | C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe | C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe
"C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"
C:\Windows\System32\GameBarPresenceWriter.exe
"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | www.dropbox.com | udp |
| N/A | 162.125.8.18:443 | www.dropbox.com | tcp |
| N/A | 162.125.8.18:443 | www.dropbox.com | tcp |
| N/A | 162.125.8.18:443 | www.dropbox.com | tcp |
| N/A | 162.125.8.18:443 | www.dropbox.com | tcp |
| N/A | 162.125.8.18:443 | www.dropbox.com | tcp |
| N/A | 162.125.8.18:443 | www.dropbox.com | tcp |
| N/A | 8.8.8.8:53 | files.launcherfenix.com.ar | udp |
| N/A | 172.67.153.84:443 | files.launcherfenix.com.ar | tcp |
Files
memory/3344-132-0x0000000000000000-mapping.dmp
memory/3344-142-0x0000000003080000-0x0000000004080000-memory.dmp
memory/3344-157-0x0000000003080000-0x0000000004080000-memory.dmp
memory/3344-160-0x0000000003080000-0x0000000004080000-memory.dmp
memory/3344-163-0x0000000003080000-0x0000000004080000-memory.dmp
memory/3344-166-0x0000000003080000-0x0000000004080000-memory.dmp
memory/3344-169-0x0000000003080000-0x0000000004080000-memory.dmp