Analysis

  • max time kernel
    140s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220812-es
  • resource tags

    arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    12/01/2023, 23:26

General

  • Target

    LauncherFenix-Minecraft-v7.exe

  • Size

    397KB

  • MD5

    d99bb55b57712065bc88be297c1da38c

  • SHA1

    fb6662dd31e8e5be380fbd7a33a50a45953fe1e7

  • SHA256

    122bfbb9f67e355340991deeacb167be9c12ad726b5a7c5779448dd0cc4af0cb

  • SHA512

    3eb5d57faea4c0146c2af40102deaac18235b379f5e81fe35a977b642e3edf70704c8cedd835e94f27b04c8413968f7469fccf82c1c9339066d38d3387c71b17

  • SSDEEP

    3072:puzvch1rugYc4wqYSRR756K7ItBjgXHUYCnlK:Wch1aIqYSRVM+unlK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe
    "C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://launcherfenix.com.ar/wope/register/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:828
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:828 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1972

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

          Filesize

          13KB

          MD5

          9ffb4a3db80fc89007435027804f016a

          SHA1

          b8a65f94b239ff171261beda69b4b5dfcf6c85c0

          SHA256

          07913d8a26c60e4c2d55eff2d088e49ae3e1cec50093ef6164c6183d6a167e41

          SHA512

          7a18522ae52068754a8a18ab6c5c6e1af6c379746bc3e8d34ee9542a891003ca58f467d96fde770b8d530b49f809752109da72b8e28be140a62fc4c1e3c85fda

        • memory/1732-72-0x0000000000530000-0x000000000053A000-memory.dmp

          Filesize

          40KB

        • memory/1732-71-0x0000000000530000-0x000000000053A000-memory.dmp

          Filesize

          40KB

        • memory/1732-68-0x00000000022F0000-0x00000000052F0000-memory.dmp

          Filesize

          48.0MB

        • memory/1732-69-0x0000000000170000-0x000000000017A000-memory.dmp

          Filesize

          40KB

        • memory/1732-70-0x0000000000170000-0x000000000017A000-memory.dmp

          Filesize

          40KB

        • memory/1732-73-0x0000000000530000-0x000000000053A000-memory.dmp

          Filesize

          40KB

        • memory/1732-56-0x000007FEFB721000-0x000007FEFB723000-memory.dmp

          Filesize

          8KB

        • memory/1732-77-0x00000000022F0000-0x00000000052F0000-memory.dmp

          Filesize

          48.0MB

        • memory/1732-78-0x0000000000530000-0x000000000053A000-memory.dmp

          Filesize

          40KB

        • memory/1732-79-0x0000000000530000-0x000000000053A000-memory.dmp

          Filesize

          40KB

        • memory/1732-80-0x0000000000530000-0x000000000053A000-memory.dmp

          Filesize

          40KB

        • memory/1732-81-0x0000000000530000-0x000000000053A000-memory.dmp

          Filesize

          40KB

        • memory/1736-54-0x0000000075781000-0x0000000075783000-memory.dmp

          Filesize

          8KB