Analysis

  • max time kernel
    141s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2024, 01:01

General

  • Target

    EasyMC Launcher.exe

  • Size

    133.1MB

  • MD5

    e311796a24989bf6785699a2d3b482c2

  • SHA1

    e07b67cdcd393e558b94f9b8800361b69b4d1228

  • SHA256

    e65265cd415da534eb3984e50aec17f83596d6a37e7345f165e90fe788027b77

  • SHA512

    e52dc0f12da63f025f52fbfd32a2d52c596b50fca40535d8e783e844df60f5e01fbc0c770956bbe5825063453d090b80fd6af5197c1b74c375c77c272f698ff7

  • SSDEEP

    1572864:52HVo9Ck+yOBBdJAVwlymAETslfp409t:x9Ctx3tu

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3056
      • C:\Windows\System32\reg.exe
        C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
        3⤵
          PID:3588
      • C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe
        "C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\easymc-launcher /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\easymc-launcher\Crashpad --url=https://f.a.k/e --annotation=_productName=easymc-launcher --annotation=_version=1.6.14 --annotation=prod=Electron --annotation=ver=16.2.8 --initial-client-data=0x458,0x468,0x47c,0x460,0x49c,0x7ff72fb729d8,0x7ff72fb729e8,0x7ff72fb729f8
        2⤵
          PID:1352
        • C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe
          "C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe" --type=gpu-process --field-trial-handle=1528,8135126098708978994,993224973972037765,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --user-data-dir="C:\Users\Admin\AppData\Roaming\easymc-launcher" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 /prefetch:2
          2⤵
            PID:4992
          • C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe
            "C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1528,8135126098708978994,993224973972037765,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\easymc-launcher" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=1844 /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2256
          • C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe
            "C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\easymc-launcher" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --field-trial-handle=1528,8135126098708978994,993224973972037765,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2336 /prefetch:1
            2⤵
            • Checks computer location settings
            • Suspicious behavior: EnumeratesProcesses
            PID:544
          • C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe
            "C:\Users\Admin\AppData\Local\Temp\EasyMC Launcher.exe" --type=gpu-process --field-trial-handle=1528,8135126098708978994,993224973972037765,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\easymc-launcher" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAIAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1332 /prefetch:2
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4980
        • C:\Windows\System32\CompPkgSrv.exe
          C:\Windows\System32\CompPkgSrv.exe -Embedding
          1⤵
            PID:3584

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Roaming\easymc-launcher\Crashpad\settings.dat

            Filesize

            40B

            MD5

            221f825ec48862aaac5157e5db7ace39

            SHA1

            70aa083899485f8bbc9cc4201ec2adf42a96bb88

            SHA256

            8199aa8e7dc6d41f05fa3967af9e4c510481e395dfb3cb00d66bd768b5f4c98c

            SHA512

            f30a6b669781d2ec78962742f165c15126260cb524e2d48861025596f9a4b5596df5728ba17dc7cba4b3fd1ce2aade9f5d9189850c3ebbb4651b0e8f051f416e

          • C:\Users\Admin\AppData\Roaming\easymc-launcher\Network Persistent State

            Filesize

            875B

            MD5

            cf1f98a30ef55aa3d618cad0aa7607f4

            SHA1

            527af837af1f3cfe101c8771044c1a51ad63dce4

            SHA256

            d608d1b1538ceb7fd3d1eaa1f0fd6e1c91b4ffa1af47b4409d12ed69e7c878e2

            SHA512

            ce018a8db57d342ea871d2486b7681ce263ecbf6643172f159acd2da85c0f0bb00c26b94ff453fb0917ebff1805c2aab831cfe432a6fb549e2b44ab97bcbfb60

          • C:\Users\Admin\AppData\Roaming\easymc-launcher\Network Persistent State~RFe58a563.TMP

            Filesize

            59B

            MD5

            2800881c775077e1c4b6e06bf4676de4

            SHA1

            2873631068c8b3b9495638c865915be822442c8b

            SHA256

            226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

            SHA512

            e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

          • C:\Users\Admin\AppData\Roaming\easymc-launcher\TransportSecurity

            Filesize

            371B

            MD5

            8db7cf0de21397667394b342c8784de9

            SHA1

            7fbf8d57b11f977f627c135efae07acc0f4a72b5

            SHA256

            9ac151ffa153fe6e84d98d89b07bd5b06260b743b014627418839a0eb29f1207

            SHA512

            922b52f708855f43ab9fafd4dbd5da511127786dcaabe64fbfa6fcd146cb86eac2a0c89d26443e813a5be1945266072a2a6c673fb70d00819773bcb66ad31582

          • C:\Users\Admin\AppData\Roaming\easymc-launcher\TransportSecurity~RFe58a738.TMP

            Filesize

            371B

            MD5

            8a154089d173ff3e4e885d9b02af2997

            SHA1

            e416bfc01f05725a07e06da370e8678773bc255b

            SHA256

            4bed46da1253c6d0d0a0df116cb6e60bfb59e0a1c5f53c8144049b85dad0da9c

            SHA512

            5747e421a1ecb0e181325f9a261e7e6f60d9b1acc5e42d23cf7444023d1bfdde0d76b5a5d3486b95eeb7df401c84a4b633921a79baee035a75c2e8363fccf49f

          • C:\Users\Admin\AppData\Roaming\easymc-launcher\dc9354ac-457e-42bb-9b42-3cd6c1c68db9.tmp

            Filesize

            996B

            MD5

            7900c11e6f07aa844450fe091e752e8d

            SHA1

            51d798af2a88e774277a7e40c350286e6f7273ae

            SHA256

            ef587247c4c24075d3e5ee8c59ca11e399ce4bd82c50047a427bf6118e80933a

            SHA512

            d6fa09b5d2ee2195a281836352b7ab1b4e24e28d5402e7828504a545186f11c7930fe1850d40267466e48e4181093d3802a3983f8f55b38a1bf56d821e24e8b3

          • C:\Users\Admin\AppData\Roaming\easymc-launcher\sentry\scope_v2.json

            Filesize

            171KB

            MD5

            1b93a2c2a1ba3b384031faf10a906b67

            SHA1

            d80dc947c2fc891280537eadef2eee33d05c2cb5

            SHA256

            01597756ed71cc7d06f9628ddec50af4f4a80a1c24ada01bcbb1ee1b30384bdf

            SHA512

            b5f8903a6e17da6ffc801ebfdb9741ee732c20d2dd10df5b352973b58d29cb0c74fa4fefd3a984d9b33fd1f219964abc44654bc2f5c8bf8668d0bc549006bea3

          • memory/4980-132-0x000001DB90BF0000-0x000001DB90BF1000-memory.dmp

            Filesize

            4KB

          • memory/4980-131-0x000001DB90BF0000-0x000001DB90BF1000-memory.dmp

            Filesize

            4KB

          • memory/4980-133-0x000001DB90BF0000-0x000001DB90BF1000-memory.dmp

            Filesize

            4KB

          • memory/4980-138-0x000001DB90BF0000-0x000001DB90BF1000-memory.dmp

            Filesize

            4KB

          • memory/4980-137-0x000001DB90BF0000-0x000001DB90BF1000-memory.dmp

            Filesize

            4KB

          • memory/4980-140-0x000001DB90BF0000-0x000001DB90BF1000-memory.dmp

            Filesize

            4KB

          • memory/4980-139-0x000001DB90BF0000-0x000001DB90BF1000-memory.dmp

            Filesize

            4KB

          • memory/4980-142-0x000001DB90BF0000-0x000001DB90BF1000-memory.dmp

            Filesize

            4KB

          • memory/4980-141-0x000001DB90BF0000-0x000001DB90BF1000-memory.dmp

            Filesize

            4KB

          • memory/4980-143-0x000001DB90BF0000-0x000001DB90BF1000-memory.dmp

            Filesize

            4KB

          • memory/4992-12-0x00007FFB8B360000-0x00007FFB8B361000-memory.dmp

            Filesize

            4KB