Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
LauncherFenix-Minecraft-v7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
LauncherFenix-Minecraft-v7.exe
Resource
win10v2004-20240419-en
General
-
Target
LauncherFenix-Minecraft-v7.exe
-
Size
397KB
-
MD5
d99bb55b57712065bc88be297c1da38c
-
SHA1
fb6662dd31e8e5be380fbd7a33a50a45953fe1e7
-
SHA256
122bfbb9f67e355340991deeacb167be9c12ad726b5a7c5779448dd0cc4af0cb
-
SHA512
3eb5d57faea4c0146c2af40102deaac18235b379f5e81fe35a977b642e3edf70704c8cedd835e94f27b04c8413968f7469fccf82c1c9339066d38d3387c71b17
-
SSDEEP
3072:puzvch1rugYc4wqYSRR756K7ItBjgXHUYCnlK:Wch1aIqYSRVM+unlK
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7CCDBD81-08E2-11EF-A336-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C709411-08E2-11EF-A336-7EEA931DE775} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1640 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1640 taskmgr.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 1756 iexplore.exe 272 iexplore.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2012 javaw.exe 2012 javaw.exe 1756 iexplore.exe 1756 iexplore.exe 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 272 iexplore.exe 272 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2012 javaw.exe 2012 javaw.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2012 2256 LauncherFenix-Minecraft-v7.exe 28 PID 2256 wrote to memory of 2012 2256 LauncherFenix-Minecraft-v7.exe 28 PID 2256 wrote to memory of 2012 2256 LauncherFenix-Minecraft-v7.exe 28 PID 2256 wrote to memory of 2012 2256 LauncherFenix-Minecraft-v7.exe 28 PID 2012 wrote to memory of 1756 2012 javaw.exe 31 PID 2012 wrote to memory of 1756 2012 javaw.exe 31 PID 2012 wrote to memory of 1756 2012 javaw.exe 31 PID 1756 wrote to memory of 1960 1756 iexplore.exe 33 PID 1756 wrote to memory of 1960 1756 iexplore.exe 33 PID 1756 wrote to memory of 1960 1756 iexplore.exe 33 PID 1756 wrote to memory of 1960 1756 iexplore.exe 33 PID 1756 wrote to memory of 1960 1756 iexplore.exe 33 PID 1756 wrote to memory of 1960 1756 iexplore.exe 33 PID 1756 wrote to memory of 1960 1756 iexplore.exe 33 PID 2012 wrote to memory of 272 2012 javaw.exe 35 PID 2012 wrote to memory of 272 2012 javaw.exe 35 PID 2012 wrote to memory of 272 2012 javaw.exe 35 PID 272 wrote to memory of 2752 272 iexplore.exe 36 PID 272 wrote to memory of 2752 272 iexplore.exe 36 PID 272 wrote to memory of 2752 272 iexplore.exe 36 PID 272 wrote to memory of 2752 272 iexplore.exe 36 PID 272 wrote to memory of 2752 272 iexplore.exe 36 PID 272 wrote to memory of 2752 272 iexplore.exe 36 PID 272 wrote to memory of 2752 272 iexplore.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Minecraft-v7.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://launcherfenix.com.ar/wope/register/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://launcherfenix.com.ar/wope/register/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:272 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{BA76E2A0-D0CB-11EE-AB17-C695CBC44580}.dat
Filesize5KB
MD564290ba4f90435543025a79cdbf25028
SHA1a4cbe1c675ebda6a0673827dd2bf30dcd11cb73a
SHA2563a41c82ab265a78674ebfbb4248318c71e18a9138647b79f054b6d4fc8dcdbb2
SHA5127f6d4fe1989fce6c88788f0abfc36eda74a34893fc14bde92f361dafffcedf644ee38e5cb9bc13b4516930c0d653e59e380933ab2eabe1f06bd1c1ca593f6181
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{7CCDBD84-08E2-11EF-A336-7EEA931DE775}.dat
Filesize4KB
MD5254730b90b5e48bcef6ac29783a4d99d
SHA19c005ef8844e78cabe500dd395ed6f05166df2a8
SHA2564fa459ec12ccbace146b237adf4b067d03da9186b782f024f722bbbd8d9629f0
SHA512564a1ef075f37c7277cb25ea98e1d1a89fa01e7bb839e3dca9b690f9f4b41cc874130475e3e24206d121f909f9217807c63087a26cf8c538a0ee1f9e01dcc816
-
Filesize
16KB
MD5356b0471deb8c5365ed94301cf98be40
SHA1c2cf22349e88ac986a1aa214d744560f7b44374b
SHA256e6d6ddc5c9dbdaa22c44f098c9bf16579d2b918cec0708808eeb18d0c5cf074d
SHA5122cb2f1791ca4b9429678c27e8306e76f611db6b11e6d6a4cd5d2cf6dee207d12e15f0eed583d2e8d646a1b4b42ff1451419af0c8f26ae665891e8781f61b9bbc
-
Filesize
500KB
MD584591cf8bbe4b94d5a83b2cdd605d4b5
SHA185f1dbf03d2b4c52e067849b93c3f4c7ec284886
SHA256b8c2bf47cb70a77582c302284554ecd4a29f9ee55c09fc2193b3ba942d5884ae
SHA51231ff3523bedc87efd5040c46fdaff325c29fa109a912b729c81660c0737505e9dbd2f9bc0a443bfce12ede2569d023cc1f56f6bea0943a669f4f85e0f420830d