Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    56s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/02/2023, 17:53

General

  • Target

    https://launcherfenix.com.ar/download?u=https%3A%2F%2Ffiles.launcherfenix.com.ar%2Fprelauncher%2Fv7%2FLauncherFenix-Minecraft-v7.exe&f=LauncherFenixV7.exe&n=PreLauncherV7_EXE_Local&c

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://launcherfenix.com.ar/download?u=https%3A%2F%2Ffiles.launcherfenix.com.ar%2Fprelauncher%2Fv7%2FLauncherFenix-Minecraft-v7.exe&f=LauncherFenixV7.exe&n=PreLauncherV7_EXE_Local&c
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3368
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3368 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3816
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\LauncherFenix-Minecraft-v7.exe
      "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\LauncherFenix-Minecraft-v7.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
        "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\LauncherFenix-Minecraft-v7.exe"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:2304
  • C:\Windows\System32\GameBarPresenceWriter.exe
    "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
    1⤵
      PID:2248
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:728

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      1817d9f8c83af5a97f742f07f32fac7e

      SHA1

      fac61ba5502036b356304703939a905467a7bd04

      SHA256

      07448a3b03c29db66b8782361cc553ad689bc75964c8070d2cd795d0c03f5268

      SHA512

      b9a071c1eb497a26f837c6826b6c7372cf1403d68a8b7adf1251f069492ec1539199303d13fd46e2fb85692b193ab87492624ed34a51b9cfc92d67ecbd638686

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      e13af378e67aa8949d0dfcc5e007e128

      SHA1

      c4e133f49307b1d601569a23f944f13fc6dc5172

      SHA256

      e65bbdbddfb9ee265d36277b5f717776edfd16a78d76b38eef0a740a2b1ce53b

      SHA512

      19cb4b057d85138672be6a9ba0a597f59ee4e480a386e33d307bf560c45c4b10683f0a293270357165817d1b9fc6d4f96702a637e19f9d4e9c6d07bbc34d9541

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ckj4gk4\imagestore.dat

      Filesize

      9KB

      MD5

      a83ec32f5364cd1aabaf2e1c3f03c932

      SHA1

      d210287cf0c75b885207826774a09f4ef44185cb

      SHA256

      6e94ac7731be123323d74c50c3f4cb6d0814e43ace05bbbf50f79c2a103b7c3f

      SHA512

      21c31d9e77a6bf6892720516f44284f720d311e68d35f49ea2bf150e6a4b5a0461423c7070472476bce3e33708da564c719f47e73391e2ca0a6aa0817dfdd3b1

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\LauncherFenix-Minecraft-v7.exe

      Filesize

      397KB

      MD5

      d99bb55b57712065bc88be297c1da38c

      SHA1

      fb6662dd31e8e5be380fbd7a33a50a45953fe1e7

      SHA256

      122bfbb9f67e355340991deeacb167be9c12ad726b5a7c5779448dd0cc4af0cb

      SHA512

      3eb5d57faea4c0146c2af40102deaac18235b379f5e81fe35a977b642e3edf70704c8cedd835e94f27b04c8413968f7469fccf82c1c9339066d38d3387c71b17

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\LauncherFenix-Minecraft-v7.exe.nborywj.partial

      Filesize

      397KB

      MD5

      d99bb55b57712065bc88be297c1da38c

      SHA1

      fb6662dd31e8e5be380fbd7a33a50a45953fe1e7

      SHA256

      122bfbb9f67e355340991deeacb167be9c12ad726b5a7c5779448dd0cc4af0cb

      SHA512

      3eb5d57faea4c0146c2af40102deaac18235b379f5e81fe35a977b642e3edf70704c8cedd835e94f27b04c8413968f7469fccf82c1c9339066d38d3387c71b17

    • memory/2304-148-0x00000000032A0000-0x00000000042A0000-memory.dmp

      Filesize

      16.0MB

    • memory/2304-162-0x00000000032A0000-0x00000000042A0000-memory.dmp

      Filesize

      16.0MB

    • memory/2304-166-0x00000000032A0000-0x00000000042A0000-memory.dmp

      Filesize

      16.0MB

    • memory/2304-168-0x00000000032A0000-0x00000000042A0000-memory.dmp

      Filesize

      16.0MB

    • memory/2304-169-0x00000000032A0000-0x00000000042A0000-memory.dmp

      Filesize

      16.0MB

    • memory/2304-172-0x00000000032A0000-0x00000000042A0000-memory.dmp

      Filesize

      16.0MB