Analysis

  • max time kernel
    82s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2023, 14:39

General

  • Target

    MinecraftInstaller.msi

  • Size

    2.5MB

  • MD5

    12d99a0cf723e0d62bc1aaf0738f858c

  • SHA1

    cee9e6bea0fc63ca043d9aa4d2c6e531e4f2c46d

  • SHA256

    8a058a12d69d1091913694ae51624d84c560aa919efdb0f3daf838c7674bed53

  • SHA512

    8b1a9e128d734e1e8a39bf0fc203a1a7934f59bf431066b0f9c6a042cd18d3cffa750bccf7504ff7b7e2dd449827f2bc408b4b35ba6d4a88d944d5fcfba362c4

  • SSDEEP

    49152:FZSE75avYUNqJQGRixUoUuZKJDXCJUcPBIHH0WCb:jSisQLJQMixUokJjCJPEa

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\MinecraftInstaller.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3376
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads