Analysis

  • max time kernel
    128s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2024, 01:01

General

  • Target

    EasyMC Launcher.exe

  • Size

    133.1MB

  • MD5

    e311796a24989bf6785699a2d3b482c2

  • SHA1

    e07b67cdcd393e558b94f9b8800361b69b4d1228

  • SHA256

    e65265cd415da534eb3984e50aec17f83596d6a37e7345f165e90fe788027b77

  • SHA512

    e52dc0f12da63f025f52fbfd32a2d52c596b50fca40535d8e783e844df60f5e01fbc0c770956bbe5825063453d090b80fd6af5197c1b74c375c77c272f698ff7

  • SSDEEP

    1572864:52HVo9Ck+yOBBdJAVwlymAETslfp409t:x9Ctx3tu

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Windows\System32\reg.exe
        C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
        3⤵
          PID:2836
      • C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe
        "C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\easymc-launcher /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\easymc-launcher\Crashpad --url=https://f.a.k/e --annotation=_productName=easymc-launcher --annotation=_version=1.6.14 --annotation=prod=Electron --annotation=ver=16.2.8 --initial-client-data=0x2fc,0x310,0x2f0,0x304,0x308,0x147bd29d8,0x147bd29e8,0x147bd29f8
        2⤵
          PID:2848
        • C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe
          "C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe" --type=gpu-process --field-trial-handle=1032,4474047330759247208,3527696021816676109,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --user-data-dir="C:\Users\Admin\AppData\Roaming\easymc-launcher" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1068 /prefetch:2
          2⤵
            PID:2884
          • C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe
            "C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\easymc-launcher" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --field-trial-handle=1032,4474047330759247208,3527696021816676109,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1532 /prefetch:1
            2⤵
            • Checks computer location settings
            • Suspicious behavior: EnumeratesProcesses
            PID:1948
          • C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe
            "C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1032,4474047330759247208,3527696021816676109,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\easymc-launcher" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=1188 /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2564
          • C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe
            "C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe" --type=gpu-process --field-trial-handle=1032,4474047330759247208,3527696021816676109,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --user-data-dir="C:\Users\Admin\AppData\Roaming\easymc-launcher" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1260 /prefetch:2
            2⤵
              PID:2804

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            fa872eccedf57098bb66c51046af0178

            SHA1

            132942d10db822672de0d7304a57bfddbc6843d5

            SHA256

            c1d542c6378f32d11787435614a652c06573ba86765ffb298f5bc741e77cd737

            SHA512

            b5ec9be71b1274bf1e97a808ecb357a46edb10a05f292e80c805cef2cde615746872bff69309a64f50102178ac3408ee6ec1894ada03fe41a9acb727e1390f0a

          • C:\Users\Admin\AppData\Local\Temp\Cab738D.tmp

            Filesize

            65KB

            MD5

            ac05d27423a85adc1622c714f2cb6184

            SHA1

            b0fe2b1abddb97837ea0195be70ab2ff14d43198

            SHA256

            c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

            SHA512

            6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

          • C:\Users\Admin\AppData\Local\Temp\Tar746A.tmp

            Filesize

            171KB

            MD5

            9c0c641c06238516f27941aa1166d427

            SHA1

            64cd549fb8cf014fcd9312aa7a5b023847b6c977

            SHA256

            4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

            SHA512

            936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

          • C:\Users\Admin\AppData\Roaming\easymc-launcher\Crashpad\settings.dat

            Filesize

            40B

            MD5

            cbab840bfeebe15a5a7673db08516867

            SHA1

            ac4142fb0164fc6d12763ae8fbc2e23b183bbbe8

            SHA256

            0ae31fdf1d20f747b24d095ab45e75118153fa3feec9afa877061f5cc314ed3b

            SHA512

            1456119649b0fb8fa96982699dbd73f633d8baec809a2593d84d6da16310c848966bbde2534c53a029529b350fed234df63f7c68f54284acc3366559159404cf

          • C:\Users\Admin\AppData\Roaming\easymc-launcher\sentry\scope_v2.json

            Filesize

            171KB

            MD5

            bc0fc8e7a69cdfef3f45e0df4f0a6609

            SHA1

            52c61c882e2bf7206b6eb4845b0391de411100bd

            SHA256

            d2594ece7f5450a44f7ca50f8ab905060b34474969e7fb80a4d0611f994ce626

            SHA512

            b2ba57d0d323be9ee046d8b101101d1701195f1dc5c75b202769f45e5361c2ed56d085c0e1fc73a48419b8b4ccfe8182cea98c05f42939dee2f420ae72b593b0

          • memory/2188-44-0x0000000002460000-0x0000000002461000-memory.dmp

            Filesize

            4KB

          • memory/2884-5-0x0000000000060000-0x0000000000061000-memory.dmp

            Filesize

            4KB

          • memory/2884-43-0x0000000077070000-0x0000000077071000-memory.dmp

            Filesize

            4KB