Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
417s -
max time network
419s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/02/2023, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
MinecraftInstaller.msi
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
MinecraftInstaller.msi
Resource
win10v2004-20221111-en
General
-
Target
MinecraftInstaller.msi
-
Size
2.2MB
-
MD5
16d3f94ba8d38a212ef92277404754ec
-
SHA1
eb9ab8cffb6aad1c1263bf224fc5bb700d16515f
-
SHA256
688b5b5478ed0b53ff9ca7a7ce9290a865294b9476b68401f104a974cd14b742
-
SHA512
6c34d6bbce7b0d5c2e0a995fe4585cf69d0964beabcc6381ed731f67738c7a154bc69f7a0dd76386ae44a1d54e0216abc95deead1983d35c8fca67dbe987f304
-
SSDEEP
24576:iM3SlUxz8F2xvXI+h9WxLUWeSKGEk1sMW9LTV7o+0+n/GvmWInE0WTM9AudAUYvt:tmP2xg+7oAsEk1sMyLT2+/Wmo0Wfb
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 2 1684 msiexec.exe 4 1684 msiexec.exe 6 1684 msiexec.exe 8 2016 msiexec.exe -
Executes dropped EXE 4 IoCs
pid Process 1700 MinecraftLauncher.exe 1228 MinecraftLauncher.exe 1268 MinecraftLauncher.exe 1620 MinecraftLauncher.exe -
Loads dropped DLL 8 IoCs
pid Process 1308 MsiExec.exe 1308 MsiExec.exe 1660 MsiExec.exe 1660 MsiExec.exe 540 MsiExec.exe 1308 MsiExec.exe 1308 MsiExec.exe 1308 MsiExec.exe -
resource yara_rule behavioral1/files/0x000c0000000139f2-80.dat upx behavioral1/files/0x000c0000000139f2-83.dat upx behavioral1/files/0x000c0000000139f2-86.dat upx behavioral1/files/0x000c0000000139f2-84.dat upx behavioral1/memory/1700-90-0x0000000000070000-0x0000000000396000-memory.dmp upx behavioral1/files/0x000c0000000139f2-93.dat upx behavioral1/memory/1228-95-0x0000000000070000-0x0000000000396000-memory.dmp upx behavioral1/memory/1700-96-0x0000000000070000-0x0000000000396000-memory.dmp upx behavioral1/files/0x000c0000000139f2-97.dat upx behavioral1/memory/1268-99-0x0000000001100000-0x0000000001426000-memory.dmp upx behavioral1/memory/1268-104-0x0000000001100000-0x0000000001426000-memory.dmp upx behavioral1/files/0x000c0000000139f2-105.dat upx behavioral1/memory/1620-109-0x0000000001100000-0x0000000001426000-memory.dmp upx behavioral1/memory/1620-110-0x0000000001100000-0x0000000001426000-memory.dmp upx -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Minecraft\nativelog.txt MinecraftLauncher.exe File created C:\Program Files (x86)\Minecraft\MinecraftLauncher.exe msiexec.exe File created C:\Program Files (x86)\Minecraft\nativelog.txt MinecraftLauncher.exe File opened for modification C:\Program Files (x86)\Minecraft\nativelog.txt MinecraftLauncher.exe -
Drops file in Windows directory 17 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIAE90.tmp msiexec.exe File opened for modification C:\Windows\Installer\{1C16BCA3-EBC1-49F6-8623-8FBFB9CCC872}\minecraft.ico msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\Installer\MSIAB9F.tmp msiexec.exe File created C:\Windows\Installer\6ca803.msi msiexec.exe File created C:\Windows\Installer\6ca808.msi msiexec.exe File opened for modification C:\Windows\Installer\6ca803.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSIAB9E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAE30.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAE61.tmp msiexec.exe File created C:\Windows\Installer\{1C16BCA3-EBC1-49F6-8623-8FBFB9CCC872}\minecraft.ico msiexec.exe File opened for modification C:\Windows\Installer\MSIAF9C.tmp msiexec.exe File opened for modification C:\Windows\Installer\6ca804.ipi msiexec.exe File created C:\Windows\Installer\6ca804.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Modifies data under HKEY_USERS 50 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2F msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\30 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2F msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe -
Modifies registry class 23 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\5F77101306DD19B4FB2B5B9726B7169C\3ACB61C11CBE6F946832F8FB9BCC8C27 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\SourceList\Net msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\ProductIcon = "C:\\Windows\\Installer\\{1C16BCA3-EBC1-49F6-8623-8FBFB9CCC872}\\minecraft.ico" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\PackageCode = "11DD2E2DBFC479F469BE0CF06C9B9C50" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\SourceList\PackageName = "MinecraftInstaller.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\3ACB61C11CBE6F946832F8FB9BCC8C27 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\ProductName = "Minecraft" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\Version = "16777219" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\3ACB61C11CBE6F946832F8FB9BCC8C27\ProductFeature msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\5F77101306DD19B4FB2B5B9726B7169C msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3ACB61C11CBE6F946832F8FB9BCC8C27\DeploymentFlags = "3" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2016 msiexec.exe 2016 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1620 MinecraftLauncher.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1684 msiexec.exe Token: SeIncreaseQuotaPrivilege 1684 msiexec.exe Token: SeRestorePrivilege 2016 msiexec.exe Token: SeTakeOwnershipPrivilege 2016 msiexec.exe Token: SeSecurityPrivilege 2016 msiexec.exe Token: SeCreateTokenPrivilege 1684 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1684 msiexec.exe Token: SeLockMemoryPrivilege 1684 msiexec.exe Token: SeIncreaseQuotaPrivilege 1684 msiexec.exe Token: SeMachineAccountPrivilege 1684 msiexec.exe Token: SeTcbPrivilege 1684 msiexec.exe Token: SeSecurityPrivilege 1684 msiexec.exe Token: SeTakeOwnershipPrivilege 1684 msiexec.exe Token: SeLoadDriverPrivilege 1684 msiexec.exe Token: SeSystemProfilePrivilege 1684 msiexec.exe Token: SeSystemtimePrivilege 1684 msiexec.exe Token: SeProfSingleProcessPrivilege 1684 msiexec.exe Token: SeIncBasePriorityPrivilege 1684 msiexec.exe Token: SeCreatePagefilePrivilege 1684 msiexec.exe Token: SeCreatePermanentPrivilege 1684 msiexec.exe Token: SeBackupPrivilege 1684 msiexec.exe Token: SeRestorePrivilege 1684 msiexec.exe Token: SeShutdownPrivilege 1684 msiexec.exe Token: SeDebugPrivilege 1684 msiexec.exe Token: SeAuditPrivilege 1684 msiexec.exe Token: SeSystemEnvironmentPrivilege 1684 msiexec.exe Token: SeChangeNotifyPrivilege 1684 msiexec.exe Token: SeRemoteShutdownPrivilege 1684 msiexec.exe Token: SeUndockPrivilege 1684 msiexec.exe Token: SeSyncAgentPrivilege 1684 msiexec.exe Token: SeEnableDelegationPrivilege 1684 msiexec.exe Token: SeManageVolumePrivilege 1684 msiexec.exe Token: SeImpersonatePrivilege 1684 msiexec.exe Token: SeCreateGlobalPrivilege 1684 msiexec.exe Token: SeCreateTokenPrivilege 1684 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1684 msiexec.exe Token: SeLockMemoryPrivilege 1684 msiexec.exe Token: SeIncreaseQuotaPrivilege 1684 msiexec.exe Token: SeMachineAccountPrivilege 1684 msiexec.exe Token: SeTcbPrivilege 1684 msiexec.exe Token: SeSecurityPrivilege 1684 msiexec.exe Token: SeTakeOwnershipPrivilege 1684 msiexec.exe Token: SeLoadDriverPrivilege 1684 msiexec.exe Token: SeSystemProfilePrivilege 1684 msiexec.exe Token: SeSystemtimePrivilege 1684 msiexec.exe Token: SeProfSingleProcessPrivilege 1684 msiexec.exe Token: SeIncBasePriorityPrivilege 1684 msiexec.exe Token: SeCreatePagefilePrivilege 1684 msiexec.exe Token: SeCreatePermanentPrivilege 1684 msiexec.exe Token: SeBackupPrivilege 1684 msiexec.exe Token: SeRestorePrivilege 1684 msiexec.exe Token: SeShutdownPrivilege 1684 msiexec.exe Token: SeDebugPrivilege 1684 msiexec.exe Token: SeAuditPrivilege 1684 msiexec.exe Token: SeSystemEnvironmentPrivilege 1684 msiexec.exe Token: SeChangeNotifyPrivilege 1684 msiexec.exe Token: SeRemoteShutdownPrivilege 1684 msiexec.exe Token: SeUndockPrivilege 1684 msiexec.exe Token: SeSyncAgentPrivilege 1684 msiexec.exe Token: SeEnableDelegationPrivilege 1684 msiexec.exe Token: SeManageVolumePrivilege 1684 msiexec.exe Token: SeImpersonatePrivilege 1684 msiexec.exe Token: SeCreateGlobalPrivilege 1684 msiexec.exe Token: SeCreateTokenPrivilege 1684 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1684 msiexec.exe 1684 msiexec.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1308 2016 msiexec.exe 28 PID 2016 wrote to memory of 1308 2016 msiexec.exe 28 PID 2016 wrote to memory of 1308 2016 msiexec.exe 28 PID 2016 wrote to memory of 1308 2016 msiexec.exe 28 PID 2016 wrote to memory of 1308 2016 msiexec.exe 28 PID 2016 wrote to memory of 1308 2016 msiexec.exe 28 PID 2016 wrote to memory of 1308 2016 msiexec.exe 28 PID 2016 wrote to memory of 1660 2016 msiexec.exe 32 PID 2016 wrote to memory of 1660 2016 msiexec.exe 32 PID 2016 wrote to memory of 1660 2016 msiexec.exe 32 PID 2016 wrote to memory of 1660 2016 msiexec.exe 32 PID 2016 wrote to memory of 1660 2016 msiexec.exe 32 PID 2016 wrote to memory of 1660 2016 msiexec.exe 32 PID 2016 wrote to memory of 1660 2016 msiexec.exe 32 PID 2016 wrote to memory of 540 2016 msiexec.exe 33 PID 2016 wrote to memory of 540 2016 msiexec.exe 33 PID 2016 wrote to memory of 540 2016 msiexec.exe 33 PID 2016 wrote to memory of 540 2016 msiexec.exe 33 PID 2016 wrote to memory of 540 2016 msiexec.exe 33 PID 2016 wrote to memory of 540 2016 msiexec.exe 33 PID 2016 wrote to memory of 540 2016 msiexec.exe 33 PID 1308 wrote to memory of 1700 1308 MsiExec.exe 35 PID 1308 wrote to memory of 1700 1308 MsiExec.exe 35 PID 1308 wrote to memory of 1700 1308 MsiExec.exe 35 PID 1308 wrote to memory of 1700 1308 MsiExec.exe 35 PID 1308 wrote to memory of 1700 1308 MsiExec.exe 35 PID 1308 wrote to memory of 1700 1308 MsiExec.exe 35 PID 1308 wrote to memory of 1700 1308 MsiExec.exe 35
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\MinecraftInstaller.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1684
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5E29DBC1AD57D05154CA53524E912733 C2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files (x86)\Minecraft\MinecraftLauncher.exe"C:\Program Files (x86)\Minecraft\MinecraftLauncher.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1700
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 27DDA4D93CF1C2716E461915D47747B22⤵
- Loads dropped DLL
PID:1660
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 03715E71DB32B10E50F5C0892DDC1CB6 M Global\MSI00002⤵
- Loads dropped DLL
PID:540
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1488
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000548" "00000000000003B4"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:1888
-
C:\Program Files (x86)\Minecraft\MinecraftLauncher.exe"C:\Program Files (x86)\Minecraft\MinecraftLauncher.exe"1⤵
- Executes dropped EXE
PID:1228
-
C:\Program Files (x86)\Minecraft\MinecraftLauncher.exe"C:\Program Files (x86)\Minecraft\MinecraftLauncher.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1268
-
C:\Program Files (x86)\Minecraft\MinecraftLauncher.exe"C:\Program Files (x86)\Minecraft\MinecraftLauncher.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
PID:1620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD59cf260dc7e123428c10e43053e52446f
SHA1175f2b59d63d17f580f664c195ca8bb82666d0eb
SHA25640d5474244a702ed702cf0d594aca8295ee0c70046e786cead4d15b2f5dd03cd
SHA512c6950bd62f81b8e0b1be396f31bbe8f6cfc0013c81b4c3d2269b1dfa8c3af1d7151c0bf12ba5e776be544885fd568f1d7e2aa92572da1440876c5ff1410f412c
-
Filesize
1.2MB
MD59cf260dc7e123428c10e43053e52446f
SHA1175f2b59d63d17f580f664c195ca8bb82666d0eb
SHA25640d5474244a702ed702cf0d594aca8295ee0c70046e786cead4d15b2f5dd03cd
SHA512c6950bd62f81b8e0b1be396f31bbe8f6cfc0013c81b4c3d2269b1dfa8c3af1d7151c0bf12ba5e776be544885fd568f1d7e2aa92572da1440876c5ff1410f412c
-
Filesize
1.2MB
MD59cf260dc7e123428c10e43053e52446f
SHA1175f2b59d63d17f580f664c195ca8bb82666d0eb
SHA25640d5474244a702ed702cf0d594aca8295ee0c70046e786cead4d15b2f5dd03cd
SHA512c6950bd62f81b8e0b1be396f31bbe8f6cfc0013c81b4c3d2269b1dfa8c3af1d7151c0bf12ba5e776be544885fd568f1d7e2aa92572da1440876c5ff1410f412c
-
Filesize
1.2MB
MD59cf260dc7e123428c10e43053e52446f
SHA1175f2b59d63d17f580f664c195ca8bb82666d0eb
SHA25640d5474244a702ed702cf0d594aca8295ee0c70046e786cead4d15b2f5dd03cd
SHA512c6950bd62f81b8e0b1be396f31bbe8f6cfc0013c81b4c3d2269b1dfa8c3af1d7151c0bf12ba5e776be544885fd568f1d7e2aa92572da1440876c5ff1410f412c
-
Filesize
1.2MB
MD59cf260dc7e123428c10e43053e52446f
SHA1175f2b59d63d17f580f664c195ca8bb82666d0eb
SHA25640d5474244a702ed702cf0d594aca8295ee0c70046e786cead4d15b2f5dd03cd
SHA512c6950bd62f81b8e0b1be396f31bbe8f6cfc0013c81b4c3d2269b1dfa8c3af1d7151c0bf12ba5e776be544885fd568f1d7e2aa92572da1440876c5ff1410f412c
-
Filesize
29B
MD552bf5d7690aacdc698c78196938ed721
SHA1e0fb3fca6245afb16f74b13f71cac68720f6d07e
SHA25643c320c681d29770af23c8751cd1569d0bb62f6f16a61b58676e20ef5caca47c
SHA512b6337ee4cf766ae85d260d672d0d4535c4b3f5f53997e0dd68d17246881206eccd6993e768ef9ce14402873d3c5ee8544d2ae40b3179403ed662475b43d95617
-
Filesize
146B
MD569b93e1f03567ec35a86e916f9bdbba7
SHA1103f0fd4447eb5fdb4569c9503662a4536831839
SHA25608c2dfc5b29aeeb23fb6a50eb6611c451aa70274928f70bcb30e7b9272108eb4
SHA512ed931374fb2229f0e17fcf477299fe5d83a6a48d1d2b5206432200b90baab7ebea5aee5dc56727aad6165f9787bdf06fd64949249e54e3a4733f47a8380f7505
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B8944BA8AD0EFDF0E01A43EF62BECD0_E21BF4DFE9EFE6B8BA7BC7ECD465A083
Filesize1KB
MD552349ca53c32c3f1318958984f5b5a9e
SHA133c2fc003e55cf4138d0b67c645ead757ad17a4b
SHA2566293f47e60c1bd711e9bf732bf6e957927f2bbc2a0da8123bc08e82feceeba31
SHA5122ddd2d554e6f034188a04a193d181f04d7c532c0ecac63c37d39a96c7b39fdf04b5fbb8b2d22d3067cb44ca1d10e6613e1231edaa8e3baabf7520ac611459d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
834B
MD52697ffc1489ca9a1a388fda347debd01
SHA10eb33674ffb03de5e747e7259b02b6896ac76a7b
SHA256dee80fd8c130e8ca99a83a844f0359414d6ad990184a036096d57d0fcec68588
SHA512ccbe7d84d9931855a55761da5fd15a43525cc8c57ea2b1c2d56294b7b66e92cf147e27e314f66c0ff8a1bf54933089d43835abf1a2e594cc05b9a145727aef6a
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5bd031b999c99b7c28b6f2df4f34b287e
SHA1582495d6583ac6932d3acfe0573b8492de5479fb
SHA256939e693e80af2a9bfde02e6bf9262a36a8cd919beaf1d500cf57b204fca7ace4
SHA51206e9038df0c8cc070d3ab0e4a4dd29e2cb817b970dd1bb6c7dcff90b314122f9f503acec3e95eea853776b96854e10c810d5e4ca2459830025e6234ee9457cf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B8944BA8AD0EFDF0E01A43EF62BECD0_E21BF4DFE9EFE6B8BA7BC7ECD465A083
Filesize408B
MD5ba139c62ac7e47ef624841c33a093ea0
SHA1859c8ca8552495364acacaac022c5b75598175f0
SHA256d1d2df62a6d13b7976363fb6d80885a3de026d1adba7d8880d869e34800bffae
SHA512aae959fd12a784276f92d464444f51c095f213f32cdf29898a3b9384e55fb482f4f32d76edad14923bee9d31bf20f9bd2583b884764d85c9c0fb9630cca5b809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6
Filesize404B
MD5cd6f0cf488a14442af8d8fdcfdeacaac
SHA17129d0b9e98023ce10b87b1c2b63b1aee38146cf
SHA25603258275f6189b1391bec0220e41ef78144a60fe24fc67e34e9a8c19d9235e81
SHA51267986bec939dfae4deef8bef444be9a7f441f15faff35fb3d09eda0f123377a4ec9cf66a97375b12eb6cb84a747ac70b2d6a2a22194d384dbfedcb2f92821c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F
Filesize188B
MD5a917b8fbb09645002a03956f70ba468d
SHA1981b6ede28c3818e0dd43f809e1cd5066a854408
SHA25681ef965e6691bad3010b1c4ae4223a1567fbec3ff55f8760ee4a17af1d369975
SHA5121becfa79a6b74c609131a9a7cb8103667c41c8c5c05ea9745e7edd8e29bebe5305ab0d93ea05dfdf91e383fb7fe5d3d6ac4849ac11ad82bca07a293671f2391f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d42501d4c908c4b1a80a4dd0217de49
SHA1a6b87d63bbc76a34e5ff37e6bed2cb087cf4d197
SHA256775e88bd07184e1b37713434bd2e7c47fd3b2d2dad59d07ab3364a1a9c45cfa3
SHA512cb3719cff6e9cba9ad29babede1e77da7bba367d6e7128dc67d86d086ea0604556b210e87b35879412c189626a941ee3a62bfcdd66f16059f512c3f08c072afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dbb3d76335b0e6bd9875199c42131ec
SHA1d6aa723e2eda14a526b930634766a7196081bcd3
SHA2560dec8acc73aa4da3f590902c44608aa1267f33487f7c2d38abe739f1304e468b
SHA512315208452d2a1ac78f3982829a45d919a360549c45efbef48ece78b494b1ad5b3ad99630b61f807ccf8affd589821fa175dda4cda05f200ef26c3d44cb2c4f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df3cc669996ddc7b9c256f367c602cb5
SHA18382eeced8d60082c1123c2d62116e7fabc377f7
SHA2564af7a3551ccac9b1dc2a6201f5dfd8004821b606d7071bd85a1fb49731ac257a
SHA5127bf36f0114647943cdd7b378cf0f62a4851f0c1004354836ebfb4ac8062120b808c801ac616050bc969ad7896d2f155571f318dfa35019a457200957ae09687b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b7fddf720e1b39c395025880b8805f87
SHA15ebdbb31dcf6eeacf92bcc998f07ba84295fb1ca
SHA256f633abd4d254d093be845100f577c0f89bd10cc22da17ab9019736bda728218f
SHA5121541dab11e0a83637d20ac5614edb4f51ed314e7de6ade9d4cb1b727f151d2452ba8b738ef5c027faa6dd5699dc7a75ee616237da677a93437f9d6b14dfa7348
-
Filesize
87KB
MD548eaf9d4ccf75bc06bbc5d33e78b7fff
SHA1c710753c265b148f27ff3f358bb0ee980ab46423
SHA2569ae2608edd49d2c319bb7bcfc24550bd9fb88b2f100fe90222a6fc55ca43c589
SHA512505f4366f7258df3a88af77dde8335709063dd43298bf0ff8529992d53a60ad8de7d7ac65533f1ffc3a7f3ad4ca3a04c85366bfb9a14b47221609e6d36951d77
-
Filesize
87KB
MD548eaf9d4ccf75bc06bbc5d33e78b7fff
SHA1c710753c265b148f27ff3f358bb0ee980ab46423
SHA2569ae2608edd49d2c319bb7bcfc24550bd9fb88b2f100fe90222a6fc55ca43c589
SHA512505f4366f7258df3a88af77dde8335709063dd43298bf0ff8529992d53a60ad8de7d7ac65533f1ffc3a7f3ad4ca3a04c85366bfb9a14b47221609e6d36951d77
-
Filesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
Filesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
Filesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
Filesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
Filesize
1.2MB
MD59cf260dc7e123428c10e43053e52446f
SHA1175f2b59d63d17f580f664c195ca8bb82666d0eb
SHA25640d5474244a702ed702cf0d594aca8295ee0c70046e786cead4d15b2f5dd03cd
SHA512c6950bd62f81b8e0b1be396f31bbe8f6cfc0013c81b4c3d2269b1dfa8c3af1d7151c0bf12ba5e776be544885fd568f1d7e2aa92572da1440876c5ff1410f412c
-
Filesize
1.2MB
MD59cf260dc7e123428c10e43053e52446f
SHA1175f2b59d63d17f580f664c195ca8bb82666d0eb
SHA25640d5474244a702ed702cf0d594aca8295ee0c70046e786cead4d15b2f5dd03cd
SHA512c6950bd62f81b8e0b1be396f31bbe8f6cfc0013c81b4c3d2269b1dfa8c3af1d7151c0bf12ba5e776be544885fd568f1d7e2aa92572da1440876c5ff1410f412c
-
Filesize
87KB
MD548eaf9d4ccf75bc06bbc5d33e78b7fff
SHA1c710753c265b148f27ff3f358bb0ee980ab46423
SHA2569ae2608edd49d2c319bb7bcfc24550bd9fb88b2f100fe90222a6fc55ca43c589
SHA512505f4366f7258df3a88af77dde8335709063dd43298bf0ff8529992d53a60ad8de7d7ac65533f1ffc3a7f3ad4ca3a04c85366bfb9a14b47221609e6d36951d77
-
Filesize
87KB
MD548eaf9d4ccf75bc06bbc5d33e78b7fff
SHA1c710753c265b148f27ff3f358bb0ee980ab46423
SHA2569ae2608edd49d2c319bb7bcfc24550bd9fb88b2f100fe90222a6fc55ca43c589
SHA512505f4366f7258df3a88af77dde8335709063dd43298bf0ff8529992d53a60ad8de7d7ac65533f1ffc3a7f3ad4ca3a04c85366bfb9a14b47221609e6d36951d77
-
Filesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
Filesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
Filesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed
-
Filesize
181KB
MD5785ee78478d43f00870e91fa96b94646
SHA197e3f06230bb97333db9574e56a187c2b5dfce50
SHA256b8665993cd5f7224e35c122a5c1965f8c4f2b4d9d41f75160b515e66f9affc53
SHA512d34cd716d1925c2286a0d75a4e31d8a3deaaf381322cbd1931d3e26a51addd1d37f6c72f6511f6e7058c8ad1f016f4fa26e9594b02bb7bbba874c1b2406ac3ed