Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-05-2024 02:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.curseforge.com/minecraft/mc-mods/citadel/download/4556677
Resource
win11-20240508-en
General
-
Target
https://www.curseforge.com/minecraft/mc-mods/citadel/download/4556677
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608168190193129" chrome.exe -
NTFS ADS 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\citadel-2.1.4-1.19.jar:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3672 chrome.exe 3672 chrome.exe 2752 chrome.exe 2752 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe Token: SeShutdownPrivilege 3672 chrome.exe Token: SeCreatePagefilePrivilege 3672 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe 3672 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3672 wrote to memory of 1820 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 1820 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 4508 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 1688 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 1688 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe PID 3672 wrote to memory of 3684 3672 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.curseforge.com/minecraft/mc-mods/citadel/download/45566771⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff72f7ab58,0x7fff72f7ab68,0x7fff72f7ab782⤵PID:1820
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1968,i,11494764356732709166,16697666750155178372,131072 /prefetch:22⤵PID:4508
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1860 --field-trial-handle=1968,i,11494764356732709166,16697666750155178372,131072 /prefetch:82⤵PID:1688
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1968,i,11494764356732709166,16697666750155178372,131072 /prefetch:82⤵PID:3684
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1968,i,11494764356732709166,16697666750155178372,131072 /prefetch:12⤵PID:3512
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1968,i,11494764356732709166,16697666750155178372,131072 /prefetch:12⤵PID:336
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4200 --field-trial-handle=1968,i,11494764356732709166,16697666750155178372,131072 /prefetch:12⤵PID:3872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1968,i,11494764356732709166,16697666750155178372,131072 /prefetch:82⤵PID:4920
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1968,i,11494764356732709166,16697666750155178372,131072 /prefetch:82⤵PID:1308
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1968,i,11494764356732709166,16697666750155178372,131072 /prefetch:82⤵
- NTFS ADS
PID:3248 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1064 --field-trial-handle=1968,i,11494764356732709166,16697666750155178372,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c144a59edaaa3be6d7682e9138a919f9
SHA1114dda2b9622943378ec20ac0a2cf65d314a676c
SHA256efaac100fa304408f97d51e9c1856370a13db3127ef45166afd89c9b8fd4c2f4
SHA512c461eca13c296c66b9ee043a29781c441111e4c2ad6f6d01505e6a75504eab7f2c9a9690eede76d45c9501e948a3b8ee1972a6d0772616e560bb6dd9df0c91e9
-
Filesize
7KB
MD54ac98398393ce625b4b2104267d7f9d1
SHA139efdb2fb7ac4e93d21b848277e1abcc975ccbec
SHA2564a07cc12fb55c62d0bbfec039edc429d87cf3b7c30484d90e78aeabf859054a3
SHA51273453dc74f9eae3b0aa3907fccda391821a40e9897938b0996c5a703543babab323960e37902661c03dd2505874b66c2db4fab8d2e18af8e93736d5f5b646e78
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD51439500c24267e119643e8e04bc6bb05
SHA11d3a1f2367253d52efe42f363f234b6550ff5dbd
SHA256238f07d6bef85c8210039da4b294dc1fda3b1e58d77f734aab38750adffdecb6
SHA512db89628d71fc6aafdfbe8ce65db693ed638c3299fe93533298c5cbb07e9509188e96e4304285d3d59861c43085a16ed66f4ad88ef5be4f4b0b40757eece4ca55
-
Filesize
7KB
MD599d00ea8b82c7a2cbf6bc579a44e11a4
SHA1eced7b8b64eb27f94f1ad99fd3e3556df01b6385
SHA25676b209e6088a4b3ab09f11498f6cd380481d48e2538c282b2c120da0328d49fa
SHA51241ad7b796f88e156e9ea452bc46294991bf4ae0bf39c7e5cd9b3e3344273edc9c73cb8d7d2b5cdc4549bd82dd37e02734e37daeca950f5e121aecbd5fcee381e
-
Filesize
129KB
MD5f56d81d22fbb8fdaeb2ebe899d10be31
SHA13b56dd37d2bdbb4655e672f2055e9500c1d8a589
SHA2562d014bbffb3d200fc701b4b6a159590a95542d63809ee140c0973e2e2a87b2db
SHA5124511cfefd0b0d2accff7b26e93f4f4efbf43302ae1673268a6c3023d932d5e94feefa96d438985888fa10bbfe1c7f135f5dba88041162b02b05bd35f32eba7ff
-
Filesize
67B
MD5db588ab551d662f356009c3b5c861f33
SHA1d41c9a079c2deccd09b7738f1eb40ea32788cf77
SHA256cf8a316e99c937ec5ba0d5c571bb61c5cd66dab9f992d04f56656ad2a44834a2
SHA512deb08842891f8fbad76b96e37fe6ec8a266962ff7cf064bab6b65b71ff4efb32159e0bf13b42ffa75d1282086129c7c28fc508615cc381537b38640aa462c0c1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e