Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 22:02

General

  • Target

    assets/minecraft/blockstates/birch_slab.json

  • Size

    210B

  • MD5

    f7fd1f98f6a62c7ba6b871c4b4c8ea03

  • SHA1

    d8bbffeed1075ad46f725ec21ea50196c1f196cb

  • SHA256

    f3381ae1d318a4237208a9a0c140c90706c604358e67095b187c21e99413fa6e

  • SHA512

    4b34783ad1f417f0f8f08bc77a21657c25044f83cc4a7ab9a8f3a7e0d3e9fb6ec49a96f18d29e80d37387d82856172bad305251f3782dcae7755a22250517173

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\assets\minecraft\blockstates\birch_slab.json
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\assets\minecraft\blockstates\birch_slab.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\assets\minecraft\blockstates\birch_slab.json"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    57f0ba21e3d1810ca6babc1ce06ec1df

    SHA1

    8b8f78903de048c09673a443d43aa4eb5f2ebc18

    SHA256

    09b116479014f39ff13e598229b3d2ab4291a5cc084ade59c3685355c3ce2df1

    SHA512

    8bf50a8d865581d6e73ead6ed0f76cd311c84b52b4a97ec56048c4ca78e4d5b2a37d98a5fcfccf6066e4bf8bad703f1dfbb859d065900f4cd28c7522c88b35cc