Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    65s
  • max time network
    71s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2023, 13:19

General

  • Target

    MinecraftInstaller.exe

  • Size

    32.0MB

  • MD5

    24b3de3538133086e007899bce1a9f4d

  • SHA1

    584bed740c7d119b3fdca99dc8652979b70e3716

  • SHA256

    998709df716b9a097b34ed83531129fbf044c0785096a7f4df187d06f1b831b5

  • SHA512

    ff0bb03da6a6cc5eb63b15a706779f27bc05f06fb9c3d27d72cc6a187e2d2d39f4e31ff39f8a44785b138903173301c7c6c3f74bc564fdb7b2386d77c7cdcf05

  • SSDEEP

    393216:1bekuyo9nMK50UGRXLePuq2ZWy/c5zFviMKe2OHmwv9CsTmsueFFza9yJ:8Zn/G4Gqk1cWe2iTVCMue3L

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MinecraftInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\MinecraftInstaller.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:404
    • C:\Users\Admin\AppData\Local\Temp\GmingRepair.exe
      "C:\Users\Admin\AppData\Local\Temp\GmingRepair.exe" scenarioMinecraft
      2⤵
      • Executes dropped EXE
      PID:3364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\MinecraftInstaller\deviceId.txt

    Filesize

    36B

    MD5

    8391fde9ac61d53321ebf6515fa41f6c

    SHA1

    5dfb944374f2c30d8b6a8db008d0899d30a42112

    SHA256

    be8277653f41298b14ac79f5b2eadb70de5101ec118a62db28a7db0cacfa24c2

    SHA512

    12c11b1c8bafa6fcd4cb7427b670a1a2113174a7ac1006cf13d7659873d3d2f9a78c2ef682057775e8caaa627a55b01bf6c9e58345e2135fba22069c2ddf1458

  • C:\Users\Admin\AppData\Local\Temp\GmingRepair.exe

    Filesize

    201KB

    MD5

    106c3f9a621ad00459a8ed5ed45cc8bc

    SHA1

    d16d3067588d8c3a17a8b1bdfc847eaa92f738d1

    SHA256

    57fb4b0cf15822e1a3dbbd6d0f31ff615feba2ae2150301063f618cc63eb5132

    SHA512

    7f4b2ebce91b7c44ee9282b1235eac714ce1f265013f550e41d2dcb47a901d1bcd49effdeaca14852357bb34a553eafaaec2738cb1cca12f59aff30bc0c4aec3

  • C:\Users\Admin\AppData\Local\Temp\GmingRepair.exe

    Filesize

    201KB

    MD5

    106c3f9a621ad00459a8ed5ed45cc8bc

    SHA1

    d16d3067588d8c3a17a8b1bdfc847eaa92f738d1

    SHA256

    57fb4b0cf15822e1a3dbbd6d0f31ff615feba2ae2150301063f618cc63eb5132

    SHA512

    7f4b2ebce91b7c44ee9282b1235eac714ce1f265013f550e41d2dcb47a901d1bcd49effdeaca14852357bb34a553eafaaec2738cb1cca12f59aff30bc0c4aec3

  • memory/404-143-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/404-139-0x000000000B450000-0x000000000B458000-memory.dmp

    Filesize

    32KB

  • memory/404-140-0x000000000BB20000-0x000000000BB58000-memory.dmp

    Filesize

    224KB

  • memory/404-141-0x0000000008010000-0x000000000801E000-memory.dmp

    Filesize

    56KB

  • memory/404-142-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/404-133-0x0000000000AF0000-0x0000000002AEC000-memory.dmp

    Filesize

    32.0MB

  • memory/404-144-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/404-145-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/404-147-0x0000000007FB0000-0x0000000007FBA000-memory.dmp

    Filesize

    40KB

  • memory/404-148-0x0000000008C50000-0x0000000008C76000-memory.dmp

    Filesize

    152KB

  • memory/404-137-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/404-136-0x00000000086D0000-0x00000000086D8000-memory.dmp

    Filesize

    32KB

  • memory/404-135-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB