Overview
overview
8Static
static
1MinecraftI...er.msi
windows7-x64
8MinecraftI...er.msi
windows10-2004-x64
8MinecraftI...er.msi
android-9-x86
MinecraftI...er.msi
android-10-x64
MinecraftI...er.msi
android-11-x64
MinecraftI...er.msi
macos-10.15-amd64
MinecraftI...er.msi
ubuntu-18.04-amd64
MinecraftI...er.msi
debian-9-armhf
MinecraftI...er.msi
debian-9-mips
MinecraftI...er.msi
debian-9-mipsel
Analysis
-
max time kernel
87s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-02-2023 09:17
Static task
static1
Behavioral task
behavioral1
Sample
MinecraftInstaller.msi
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
MinecraftInstaller.msi
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
MinecraftInstaller.msi
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral4
Sample
MinecraftInstaller.msi
Resource
android-x64-20220823-en
Behavioral task
behavioral5
Sample
MinecraftInstaller.msi
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral6
Sample
MinecraftInstaller.msi
Resource
macos-20220504-en
Behavioral task
behavioral7
Sample
MinecraftInstaller.msi
Resource
ubuntu1804-amd64-20221111-en
Behavioral task
behavioral8
Sample
MinecraftInstaller.msi
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral9
Sample
MinecraftInstaller.msi
Resource
debian9-mipsbe-20221111-en
Behavioral task
behavioral10
Sample
MinecraftInstaller.msi
Resource
debian9-mipsel-en-20211208
General
-
Target
MinecraftInstaller.msi
-
Size
2.5MB
-
MD5
22991d4ef03118107a943934d92319d1
-
SHA1
832ea164d844401f9eced5bf84d45ad4b273cf8c
-
SHA256
1d9f66794a5af4e409a6c6b32a14d674cc1ea96f69e2cf2acb3c7b997750d5f8
-
SHA512
79a87b895184188d987f9390f28c20ab4d999d953f9c3d3f92f9d0069a0dc6490c4ef69603e12b62554d809a08b97a79b12f98055b0ebc6a91d5215e3b95fd33
-
SSDEEP
49152:69wfmqHrSa1uL7TFSCEeQ6EOMhKqL0WCb:+7a1ugeQVhLha
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
msiexec.exemsiexec.exeflow pid process 2 1976 msiexec.exe 4 1976 msiexec.exe 6 1976 msiexec.exe 9 608 msiexec.exe -
Executes dropped EXE 2 IoCs
Processes:
MinecraftLauncher.exeMinecraftLauncher.exepid process 2016 MinecraftLauncher.exe 1620 MinecraftLauncher.exe -
Loads dropped DLL 6 IoCs
Processes:
MsiExec.exeMsiExec.exeMsiExec.exepid process 1012 MsiExec.exe 1904 MsiExec.exe 1904 MsiExec.exe 1412 MsiExec.exe 1012 MsiExec.exe 1012 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe -
Drops file in Program Files directory 1 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files (x86)\Minecraft Launcher\MinecraftLauncher.exe msiexec.exe -
Drops file in Windows directory 15 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSIDB65.tmp msiexec.exe File created C:\Windows\Installer\{733C3ACB-432D-4880-B0E1-660000D7974D}\minecraft.ico msiexec.exe File opened for modification C:\Windows\Installer\6cd74d.msi msiexec.exe File created C:\Windows\Installer\6cd74e.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIDB45.tmp msiexec.exe File created C:\Windows\Installer\6cd750.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\6cd74e.ipi msiexec.exe File created C:\Windows\Installer\6cd74d.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIDC7F.tmp msiexec.exe File opened for modification C:\Windows\Installer\{733C3ACB-432D-4880-B0E1-660000D7974D}\minecraft.ico msiexec.exe File opened for modification C:\Windows\Installer\MSIE1BE.tmp msiexec.exe -
Modifies data under HKEY_USERS 46 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe -
Modifies registry class 23 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\BCA3C337D23408840B1E6600007D79D4 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\ProductName = "Minecraft Launcher" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\SourceList\PackageName = "MinecraftInstaller.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\PackageCode = "54FE00570550045418568622471E508D" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\BCA3C337D23408840B1E6600007D79D4\Complete msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\ProductIcon = "C:\\Windows\\Installer\\{733C3ACB-432D-4880-B0E1-660000D7974D}\\minecraft.ico" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1BBEC3237AF740F4DA613B3C4353A9A6 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1BBEC3237AF740F4DA613B3C4353A9A6\BCA3C337D23408840B1E6600007D79D4 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BCA3C337D23408840B1E6600007D79D4\Clients = 3a0000000000 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msiexec.exepid process 608 msiexec.exe 608 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 1976 msiexec.exe Token: SeIncreaseQuotaPrivilege 1976 msiexec.exe Token: SeRestorePrivilege 608 msiexec.exe Token: SeTakeOwnershipPrivilege 608 msiexec.exe Token: SeSecurityPrivilege 608 msiexec.exe Token: SeCreateTokenPrivilege 1976 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1976 msiexec.exe Token: SeLockMemoryPrivilege 1976 msiexec.exe Token: SeIncreaseQuotaPrivilege 1976 msiexec.exe Token: SeMachineAccountPrivilege 1976 msiexec.exe Token: SeTcbPrivilege 1976 msiexec.exe Token: SeSecurityPrivilege 1976 msiexec.exe Token: SeTakeOwnershipPrivilege 1976 msiexec.exe Token: SeLoadDriverPrivilege 1976 msiexec.exe Token: SeSystemProfilePrivilege 1976 msiexec.exe Token: SeSystemtimePrivilege 1976 msiexec.exe Token: SeProfSingleProcessPrivilege 1976 msiexec.exe Token: SeIncBasePriorityPrivilege 1976 msiexec.exe Token: SeCreatePagefilePrivilege 1976 msiexec.exe Token: SeCreatePermanentPrivilege 1976 msiexec.exe Token: SeBackupPrivilege 1976 msiexec.exe Token: SeRestorePrivilege 1976 msiexec.exe Token: SeShutdownPrivilege 1976 msiexec.exe Token: SeDebugPrivilege 1976 msiexec.exe Token: SeAuditPrivilege 1976 msiexec.exe Token: SeSystemEnvironmentPrivilege 1976 msiexec.exe Token: SeChangeNotifyPrivilege 1976 msiexec.exe Token: SeRemoteShutdownPrivilege 1976 msiexec.exe Token: SeUndockPrivilege 1976 msiexec.exe Token: SeSyncAgentPrivilege 1976 msiexec.exe Token: SeEnableDelegationPrivilege 1976 msiexec.exe Token: SeManageVolumePrivilege 1976 msiexec.exe Token: SeImpersonatePrivilege 1976 msiexec.exe Token: SeCreateGlobalPrivilege 1976 msiexec.exe Token: SeCreateTokenPrivilege 1976 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1976 msiexec.exe Token: SeLockMemoryPrivilege 1976 msiexec.exe Token: SeIncreaseQuotaPrivilege 1976 msiexec.exe Token: SeMachineAccountPrivilege 1976 msiexec.exe Token: SeTcbPrivilege 1976 msiexec.exe Token: SeSecurityPrivilege 1976 msiexec.exe Token: SeTakeOwnershipPrivilege 1976 msiexec.exe Token: SeLoadDriverPrivilege 1976 msiexec.exe Token: SeSystemProfilePrivilege 1976 msiexec.exe Token: SeSystemtimePrivilege 1976 msiexec.exe Token: SeProfSingleProcessPrivilege 1976 msiexec.exe Token: SeIncBasePriorityPrivilege 1976 msiexec.exe Token: SeCreatePagefilePrivilege 1976 msiexec.exe Token: SeCreatePermanentPrivilege 1976 msiexec.exe Token: SeBackupPrivilege 1976 msiexec.exe Token: SeRestorePrivilege 1976 msiexec.exe Token: SeShutdownPrivilege 1976 msiexec.exe Token: SeDebugPrivilege 1976 msiexec.exe Token: SeAuditPrivilege 1976 msiexec.exe Token: SeSystemEnvironmentPrivilege 1976 msiexec.exe Token: SeChangeNotifyPrivilege 1976 msiexec.exe Token: SeRemoteShutdownPrivilege 1976 msiexec.exe Token: SeUndockPrivilege 1976 msiexec.exe Token: SeSyncAgentPrivilege 1976 msiexec.exe Token: SeEnableDelegationPrivilege 1976 msiexec.exe Token: SeManageVolumePrivilege 1976 msiexec.exe Token: SeImpersonatePrivilege 1976 msiexec.exe Token: SeCreateGlobalPrivilege 1976 msiexec.exe Token: SeCreateTokenPrivilege 1976 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msiexec.exepid process 1976 msiexec.exe 1976 msiexec.exe 1976 msiexec.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
msiexec.exeMsiExec.exedescription pid process target process PID 608 wrote to memory of 1012 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1012 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1012 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1012 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1012 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1012 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1012 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1904 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1904 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1904 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1904 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1904 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1904 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1904 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1412 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1412 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1412 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1412 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1412 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1412 608 msiexec.exe MsiExec.exe PID 608 wrote to memory of 1412 608 msiexec.exe MsiExec.exe PID 1012 wrote to memory of 2016 1012 MsiExec.exe MinecraftLauncher.exe PID 1012 wrote to memory of 2016 1012 MsiExec.exe MinecraftLauncher.exe PID 1012 wrote to memory of 2016 1012 MsiExec.exe MinecraftLauncher.exe PID 1012 wrote to memory of 2016 1012 MsiExec.exe MinecraftLauncher.exe PID 1012 wrote to memory of 2016 1012 MsiExec.exe MinecraftLauncher.exe PID 1012 wrote to memory of 2016 1012 MsiExec.exe MinecraftLauncher.exe PID 1012 wrote to memory of 2016 1012 MsiExec.exe MinecraftLauncher.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\MinecraftInstaller.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 76ADC4344D71C929818554BAD95324F4 C2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Minecraft Launcher\MinecraftLauncher.exe"C:\Program Files (x86)\Minecraft Launcher\MinecraftLauncher.exe"3⤵
- Executes dropped EXE
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8E81DBDE57B62442CFA5A07174B61BD72⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 22D90ED0F500228652B11AD0245EB2C1 M Global\MSI00002⤵
- Loads dropped DLL
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000588" "00000000000004A8"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Minecraft Launcher\MinecraftLauncher.exe"C:\Program Files (x86)\Minecraft Launcher\MinecraftLauncher.exe"1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Minecraft Launcher\MinecraftLauncher.exeFilesize
3.3MB
MD50501b8eb39f00dcaa3c89ccec2fbde17
SHA1cb7b82a5d02a2b5ea9c16b5083015c832b556405
SHA256161ba4c1b21cd20b15573f0ccfc4a5cbab8dedd94c722cd60afb8551d8d91dc2
SHA5124ab6a3fd31c7551578f07ada264bb93a22eb16f75fdbcfaecf4c0861535a2f631082da5f6003ff9f57fda231e783cbf200caa6a6d6bdefbe08d64f33c67855b3
-
C:\Program Files (x86)\Minecraft Launcher\MinecraftLauncher.exeFilesize
3.3MB
MD50501b8eb39f00dcaa3c89ccec2fbde17
SHA1cb7b82a5d02a2b5ea9c16b5083015c832b556405
SHA256161ba4c1b21cd20b15573f0ccfc4a5cbab8dedd94c722cd60afb8551d8d91dc2
SHA5124ab6a3fd31c7551578f07ada264bb93a22eb16f75fdbcfaecf4c0861535a2f631082da5f6003ff9f57fda231e783cbf200caa6a6d6bdefbe08d64f33c67855b3
-
C:\Program Files (x86)\Minecraft Launcher\MinecraftLauncher.exeFilesize
3.3MB
MD50501b8eb39f00dcaa3c89ccec2fbde17
SHA1cb7b82a5d02a2b5ea9c16b5083015c832b556405
SHA256161ba4c1b21cd20b15573f0ccfc4a5cbab8dedd94c722cd60afb8551d8d91dc2
SHA5124ab6a3fd31c7551578f07ada264bb93a22eb16f75fdbcfaecf4c0861535a2f631082da5f6003ff9f57fda231e783cbf200caa6a6d6bdefbe08d64f33c67855b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5Filesize
471B
MD52fb45da83863bdd651aa1ec88cfc4d4d
SHA12634c8e2e479d7e7d6bb0be90662531bbcc929fc
SHA256cc5125bf64923f3c28ba199c75ef3a69ac488abbdac56fe082bc240e26353456
SHA512b5311ed92c09192ca3957e28605945fb747527da38ca2c7b9fa4ed53d4e1fbd5e9a3786d0e0ca2fd48deb981bbcb6724a8194b27df0c67a27f1ab55a0d6ea44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66AE3BFDF94A732B262342AD2154B86E_6BE73709C7F4D409D3FEEFF27BA07C40Filesize
471B
MD5d021ee1d5475bc42be5524f4a12ca8ff
SHA147e9544efd0634a63666f3ae3a1b1bbd89d08cdd
SHA2569c92ba20fe4aca9af71a61f1e6b017687dbc01ed487806a1aa3d26942208444c
SHA51229fea32479480ad1ae3e4ec7b509d186b5c26ee71600337f5827b50f317bce13d2340860b8d593fc139aea9188db4a2587b537949427df80683e2c2bf7d53ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5Filesize
434B
MD56c9869d76fe005e58ccf0c81abcb210b
SHA1fdf7f7b1187ba3cf7fc77c987475bf586353baf7
SHA25687135906272d19da12c1d5ba8d987c5f85800830fb9d4efc15034c7a4660826d
SHA512728d2a5e643236bbd480b15f0a589854e837c52eccd68cfb165842177ee9b6a370a00db279a25f6400701b14cf94119679098371570869df9b1464333a6248a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66AE3BFDF94A732B262342AD2154B86E_6BE73709C7F4D409D3FEEFF27BA07C40Filesize
430B
MD56a33a1b73d034a29ef1c4282263aaf6a
SHA1b344538a89645df8ca168b942809607464814c08
SHA256b0d8c7ac690aeaee4f0d2f695fdad5b0357fa89981031b22a9918c7700215384
SHA51287c87fcc0a527f4e0cecf9f1f07654a54306bcb65337a14029f34c20af252f113f8923976ec7c51b7ebd4bb5da9f20846558836dd355a035a159d659aa8debdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d8f8ef2bf5f970031ddf96888c24fdf7
SHA1690b34e24815d0e866394904ad21ee4b8eea9063
SHA256f9abfcb2dff1b05a2e3527f2e9db2cd21a97edebe1cb50f78e7a481366009873
SHA512eae86da745d4e5454ed7180f288643cc4b6870eee3313593b925499aa45f53b2304417d6f06794adde9bb04244d958b80f0176d4023bbe8f1fc14b9259fdc14d
-
C:\Users\Admin\AppData\Local\Temp\MSI6907.tmpFilesize
87KB
MD548eaf9d4ccf75bc06bbc5d33e78b7fff
SHA1c710753c265b148f27ff3f358bb0ee980ab46423
SHA2569ae2608edd49d2c319bb7bcfc24550bd9fb88b2f100fe90222a6fc55ca43c589
SHA512505f4366f7258df3a88af77dde8335709063dd43298bf0ff8529992d53a60ad8de7d7ac65533f1ffc3a7f3ad4ca3a04c85366bfb9a14b47221609e6d36951d77
-
C:\Users\Admin\AppData\Local\Temp\MSIEE9B.tmpFilesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
C:\Users\Admin\AppData\Roaming\.minecraft\launcher_log.txtFilesize
492B
MD5e46548fffbce5a4fcece402fddc5552a
SHA157d0231cff9cec3ecd9c330c7614377a907f7f9a
SHA2560e74e56a8a3772950090a954834013e4cd723c060a3591c5bb967a15edaeccc5
SHA5126dffa73578f0dab580172c7afed070ef5271bafb0d6057d78552052b00badaa03d0ab9c6c2070873cc8a006cfed2512b4c2fba31886179f4b5ae1ac792ef5b23
-
C:\Windows\Installer\MSIDB65.tmpFilesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
C:\Windows\Installer\MSIDC7F.tmpFilesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
C:\Windows\Installer\MSIE1BE.tmpFilesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
\Program Files (x86)\Minecraft Launcher\MinecraftLauncher.exeFilesize
3.3MB
MD50501b8eb39f00dcaa3c89ccec2fbde17
SHA1cb7b82a5d02a2b5ea9c16b5083015c832b556405
SHA256161ba4c1b21cd20b15573f0ccfc4a5cbab8dedd94c722cd60afb8551d8d91dc2
SHA5124ab6a3fd31c7551578f07ada264bb93a22eb16f75fdbcfaecf4c0861535a2f631082da5f6003ff9f57fda231e783cbf200caa6a6d6bdefbe08d64f33c67855b3
-
\Users\Admin\AppData\Local\Temp\MSI6907.tmpFilesize
87KB
MD548eaf9d4ccf75bc06bbc5d33e78b7fff
SHA1c710753c265b148f27ff3f358bb0ee980ab46423
SHA2569ae2608edd49d2c319bb7bcfc24550bd9fb88b2f100fe90222a6fc55ca43c589
SHA512505f4366f7258df3a88af77dde8335709063dd43298bf0ff8529992d53a60ad8de7d7ac65533f1ffc3a7f3ad4ca3a04c85366bfb9a14b47221609e6d36951d77
-
\Users\Admin\AppData\Local\Temp\MSIEE9B.tmpFilesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
\Windows\Installer\MSIDB65.tmpFilesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
\Windows\Installer\MSIDC7F.tmpFilesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
\Windows\Installer\MSIE1BE.tmpFilesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
memory/1012-56-0x0000000000000000-mapping.dmp
-
memory/1012-57-0x0000000074AB1000-0x0000000074AB3000-memory.dmpFilesize
8KB
-
memory/1412-72-0x0000000000000000-mapping.dmp
-
memory/1904-66-0x0000000000000000-mapping.dmp
-
memory/1976-54-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmpFilesize
8KB
-
memory/2016-80-0x0000000000000000-mapping.dmp