Resubmissions

04-02-2023 21:24

230204-z9c8naaa4y 1

04-02-2023 21:21

230204-z7dreaaa31 4

Analysis

  • max time kernel
    132s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2023 21:21

General

  • Target

    LauncherFenix-Minecraft-v7.exe

  • Size

    397KB

  • MD5

    d99bb55b57712065bc88be297c1da38c

  • SHA1

    fb6662dd31e8e5be380fbd7a33a50a45953fe1e7

  • SHA256

    122bfbb9f67e355340991deeacb167be9c12ad726b5a7c5779448dd0cc4af0cb

  • SHA512

    3eb5d57faea4c0146c2af40102deaac18235b379f5e81fe35a977b642e3edf70704c8cedd835e94f27b04c8413968f7469fccf82c1c9339066d38d3387c71b17

  • SSDEEP

    3072:puzvch1rugYc4wqYSRR756K7ItBjgXHUYCnlK:Wch1aIqYSRVM+unlK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe
    "C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"
      2⤵
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://launcherfenix.com.ar/wope/register/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1800 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:108
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://launcherfenix.com.ar/wope/register/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1608
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1504
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1576

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{72371643-A4DA-11ED-A70D-7AAB9C3024C2}.dat

      Filesize

      4KB

      MD5

      3938ecc285b065852e2949100c28b12b

      SHA1

      2a6eb016d67cee65e4a1a167a7daca3cd8037cb4

      SHA256

      4e4ea6221ba5af704617e7976cf7d140622bc96bebffb91e54a2cb530e0938d2

      SHA512

      a851c5ee6d1e1d0f4c0a750266d6f45b3e87a12a6cf8ae4e43a2ce0aece13b8a7952021a3c4af13603e4d3212a98b7261a82ee34b50b374b5bd91054d2074cfd

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{C7DBABF0-61D8-11ED-83F7-5E34C4AB0FA3}.dat

      Filesize

      3KB

      MD5

      4387145d08a6c313d164881a1a163bbf

      SHA1

      e0878f12ba7c14c19a40e6cfb3bac3aa7fa43ae5

      SHA256

      b9664c45e098a2f4ca4d0965cf647d133ec406a6d14d02287f4b4786ac061de8

      SHA512

      4b802c189c6f70cfcd623ee23a6a026cc7166f0d4eba76764eabc59d39d7b779c1bcfe415d47a2a893240e6809c86caba0d3d834a7846c2ef3c963d0e513885c

    • memory/1528-74-0x0000000001FE0000-0x0000000001FEA000-memory.dmp

      Filesize

      40KB

    • memory/1528-77-0x0000000002310000-0x0000000005310000-memory.dmp

      Filesize

      48.0MB

    • memory/1528-70-0x0000000000280000-0x000000000028A000-memory.dmp

      Filesize

      40KB

    • memory/1528-71-0x0000000001FE0000-0x0000000001FEA000-memory.dmp

      Filesize

      40KB

    • memory/1528-72-0x0000000001FE0000-0x0000000001FEA000-memory.dmp

      Filesize

      40KB

    • memory/1528-73-0x0000000001FE0000-0x0000000001FEA000-memory.dmp

      Filesize

      40KB

    • memory/1528-69-0x0000000002310000-0x0000000005310000-memory.dmp

      Filesize

      48.0MB

    • memory/1528-78-0x0000000000280000-0x000000000028A000-memory.dmp

      Filesize

      40KB

    • memory/1528-79-0x0000000001FE0000-0x0000000001FEA000-memory.dmp

      Filesize

      40KB

    • memory/1528-80-0x0000000001FE0000-0x0000000001FEA000-memory.dmp

      Filesize

      40KB

    • memory/1528-81-0x0000000001FE0000-0x0000000001FEA000-memory.dmp

      Filesize

      40KB

    • memory/1528-82-0x0000000001FE0000-0x0000000001FEA000-memory.dmp

      Filesize

      40KB

    • memory/1528-56-0x000007FEFB851000-0x000007FEFB853000-memory.dmp

      Filesize

      8KB

    • memory/1820-54-0x00000000757B1000-0x00000000757B3000-memory.dmp

      Filesize

      8KB