Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 00:16

General

  • Target

    LauncherFenix-Minecraft-v7.exe

  • Size

    397KB

  • MD5

    d99bb55b57712065bc88be297c1da38c

  • SHA1

    fb6662dd31e8e5be380fbd7a33a50a45953fe1e7

  • SHA256

    122bfbb9f67e355340991deeacb167be9c12ad726b5a7c5779448dd0cc4af0cb

  • SHA512

    3eb5d57faea4c0146c2af40102deaac18235b379f5e81fe35a977b642e3edf70704c8cedd835e94f27b04c8413968f7469fccf82c1c9339066d38d3387c71b17

  • SSDEEP

    3072:puzvch1rugYc4wqYSRR756K7ItBjgXHUYCnlK:Wch1aIqYSRVM+unlK

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 38 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe
    "C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://launcherfenix.com.ar/wope/register/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1756
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1960
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://launcherfenix.com.ar/wope/register/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:272
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:272 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2752
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{BA76E2A0-D0CB-11EE-AB17-C695CBC44580}.dat

    Filesize

    5KB

    MD5

    64290ba4f90435543025a79cdbf25028

    SHA1

    a4cbe1c675ebda6a0673827dd2bf30dcd11cb73a

    SHA256

    3a41c82ab265a78674ebfbb4248318c71e18a9138647b79f054b6d4fc8dcdbb2

    SHA512

    7f6d4fe1989fce6c88788f0abfc36eda74a34893fc14bde92f361dafffcedf644ee38e5cb9bc13b4516930c0d653e59e380933ab2eabe1f06bd1c1ca593f6181

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{7CCDBD84-08E2-11EF-A336-7EEA931DE775}.dat

    Filesize

    4KB

    MD5

    254730b90b5e48bcef6ac29783a4d99d

    SHA1

    9c005ef8844e78cabe500dd395ed6f05166df2a8

    SHA256

    4fa459ec12ccbace146b237adf4b067d03da9186b782f024f722bbbd8d9629f0

    SHA512

    564a1ef075f37c7277cb25ea98e1d1a89fa01e7bb839e3dca9b690f9f4b41cc874130475e3e24206d121f909f9217807c63087a26cf8c538a0ee1f9e01dcc816

  • C:\Users\Admin\AppData\Local\Temp\~DF96FB40E3F3917CE7.TMP

    Filesize

    16KB

    MD5

    356b0471deb8c5365ed94301cf98be40

    SHA1

    c2cf22349e88ac986a1aa214d744560f7b44374b

    SHA256

    e6d6ddc5c9dbdaa22c44f098c9bf16579d2b918cec0708808eeb18d0c5cf074d

    SHA512

    2cb2f1791ca4b9429678c27e8306e76f611db6b11e6d6a4cd5d2cf6dee207d12e15f0eed583d2e8d646a1b4b42ff1451419af0c8f26ae665891e8781f61b9bbc

  • C:\Users\Admin\AppData\Roaming\.minecraft\launcherfenix.jar

    Filesize

    500KB

    MD5

    84591cf8bbe4b94d5a83b2cdd605d4b5

    SHA1

    85f1dbf03d2b4c52e067849b93c3f4c7ec284886

    SHA256

    b8c2bf47cb70a77582c302284554ecd4a29f9ee55c09fc2193b3ba942d5884ae

    SHA512

    31ff3523bedc87efd5040c46fdaff325c29fa109a912b729c81660c0737505e9dbd2f9bc0a443bfce12ede2569d023cc1f56f6bea0943a669f4f85e0f420830d

  • memory/1640-640-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/1640-639-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2012-76-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2012-28-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2012-56-0x00000000020A0000-0x00000000020AA000-memory.dmp

    Filesize

    40KB

  • memory/2012-55-0x00000000020A0000-0x00000000020AA000-memory.dmp

    Filesize

    40KB

  • memory/2012-65-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2012-68-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2012-69-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2012-74-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2012-2-0x0000000002260000-0x00000000024D0000-memory.dmp

    Filesize

    2.4MB

  • memory/2012-77-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2012-81-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2012-51-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2012-96-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2012-290-0x0000000002260000-0x00000000024D0000-memory.dmp

    Filesize

    2.4MB

  • memory/2012-398-0x0000000000180000-0x000000000018A000-memory.dmp

    Filesize

    40KB

  • memory/2012-399-0x0000000000180000-0x000000000018A000-memory.dmp

    Filesize

    40KB

  • memory/2012-500-0x00000000020A0000-0x00000000020AA000-memory.dmp

    Filesize

    40KB

  • memory/2012-501-0x00000000020A0000-0x00000000020AA000-memory.dmp

    Filesize

    40KB

  • memory/2012-26-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2012-17-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2012-14-0x0000000000180000-0x000000000018A000-memory.dmp

    Filesize

    40KB

  • memory/2012-638-0x0000000002260000-0x00000000024D0000-memory.dmp

    Filesize

    2.4MB

  • memory/2012-13-0x0000000000180000-0x000000000018A000-memory.dmp

    Filesize

    40KB

  • memory/2256-16-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB