Resubmissions

01/02/2023, 17:33

230201-v4tagach3x 4

01/02/2023, 17:16

230201-vtdr2acg8s 4

01/02/2023, 16:56

230201-vfykaacg2w 1

Analysis

  • max time kernel
    200s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2023, 17:33

General

  • Target

    LauncherFenix-Minecraft-v7.exe

  • Size

    397KB

  • MD5

    d99bb55b57712065bc88be297c1da38c

  • SHA1

    fb6662dd31e8e5be380fbd7a33a50a45953fe1e7

  • SHA256

    122bfbb9f67e355340991deeacb167be9c12ad726b5a7c5779448dd0cc4af0cb

  • SHA512

    3eb5d57faea4c0146c2af40102deaac18235b379f5e81fe35a977b642e3edf70704c8cedd835e94f27b04c8413968f7469fccf82c1c9339066d38d3387c71b17

  • SSDEEP

    3072:puzvch1rugYc4wqYSRR756K7ItBjgXHUYCnlK:Wch1aIqYSRVM+unlK

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe
    "C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"
      2⤵
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://launcherfenix.com.ar/wope/register/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:108
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:108 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1028
      • C:\Windows\system32\cmd.exe
        cmd.exe /C start "Open file" "C:\Users\Admin\AppData\Roaming\.minecraft"
        3⤵
          PID:1312

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      890b24fdce61a2d32dcb9c6c530d955b

      SHA1

      5e858ef3816ad24679cd6e37e118b8a7c3b5a3a7

      SHA256

      4595350385585a58eb320a2668e0af56d9ff8c21d923259754c42ee4a9878f15

      SHA512

      7063d2ef153a2dee28164e476b9f50d32bb5268b247a2db0dc19484677e61d5304246c91cd963d3c21da7de117e800f00097605f52d3bae3c1f707ed806aa79e

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

      Filesize

      13KB

      MD5

      3558ffd11d998e560f30a50c136b1cbe

      SHA1

      cefdc99881908836196324eb659bef1454f54c5b

      SHA256

      6488a3fcedf8a005be1b5eb76a579d4e8bd4f6dec24fc1e9fdde69b53e996a23

      SHA512

      dd6076e5c58b76e4a4afc2529d8b976772e24dbe406e3d270986dfa0ac674c1f017a9122cad12cdbdfa6ad012618c22f301c388d3abf02d29815b3724eeba15c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TT1VT0RR.txt

      Filesize

      603B

      MD5

      0d7567abe57424dc53fedf81bf8f6f32

      SHA1

      227167d4003fa4b82ef2a6d86be176ea3b8d9fb8

      SHA256

      3090ccfc02782c500f038d936b095bd47bbf500f384321e924cb5ae502626722

      SHA512

      053c95e57f67bff4dda2a4659cb2d9d0963a608224d4ff356e5bdf8dff7531149171ff262a7f612f3735a19393800d5063af44e1908d6aec82cbdfd8c7de4193

    • memory/1900-71-0x0000000001CA0000-0x0000000001CAA000-memory.dmp

      Filesize

      40KB

    • memory/1900-79-0x0000000001F40000-0x0000000001F4A000-memory.dmp

      Filesize

      40KB

    • memory/1900-73-0x0000000001CA0000-0x0000000001CAA000-memory.dmp

      Filesize

      40KB

    • memory/1900-74-0x0000000001CA0000-0x0000000001CAA000-memory.dmp

      Filesize

      40KB

    • memory/1900-75-0x0000000001F40000-0x0000000001F4A000-memory.dmp

      Filesize

      40KB

    • memory/1900-76-0x0000000001F40000-0x0000000001F4A000-memory.dmp

      Filesize

      40KB

    • memory/1900-78-0x0000000001F40000-0x0000000001F4A000-memory.dmp

      Filesize

      40KB

    • memory/1900-72-0x00000000020E0000-0x00000000050E0000-memory.dmp

      Filesize

      48.0MB

    • memory/1900-80-0x0000000001F40000-0x0000000001F4A000-memory.dmp

      Filesize

      40KB

    • memory/1900-81-0x0000000001F40000-0x0000000001F4A000-memory.dmp

      Filesize

      40KB

    • memory/1900-70-0x0000000001CA0000-0x0000000001CAA000-memory.dmp

      Filesize

      40KB

    • memory/1900-65-0x00000000020E0000-0x00000000050E0000-memory.dmp

      Filesize

      48.0MB

    • memory/1900-56-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmp

      Filesize

      8KB

    • memory/1976-54-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

      Filesize

      8KB