Analysis
-
max time kernel
18s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
minecraft_alpha_1.2.1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
minecraft_alpha_1.2.1.exe
Resource
win10v2004-20240426-en
General
-
Target
minecraft_alpha_1.2.1.exe
-
Size
227KB
-
MD5
d14ba7be37e9a859c35027fbc48156e3
-
SHA1
7c8edcd841e8be4cfc1c03277e70e44e563d7d10
-
SHA256
ff7335a7afc9c65a24e53fc4f0d8b16bc0323fbb31f556d4318e2a720c0388f4
-
SHA512
706069d04fa28920d263d37e27bd88280620ab659680a795714c15e78b31d5e6007bba88295747c92257d33669d830e5804add558f25e10ab69cfe8daf263105
-
SSDEEP
1536:dGtgHEjS2MkDvXR/TMZtQkZpcHHHkLL/LL/LL/LLkNHRv879NHpovcfNwV7cNHzt:ALjSeDvhoZK4mpYpccpWIzMjNCxpdl
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 3068 OpenWith.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
javaw.exeOpenWith.exepid process 4580 javaw.exe 4580 javaw.exe 3068 OpenWith.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
minecraft_alpha_1.2.1.exejavaw.exedescription pid process target process PID 388 wrote to memory of 4580 388 minecraft_alpha_1.2.1.exe javaw.exe PID 388 wrote to memory of 4580 388 minecraft_alpha_1.2.1.exe javaw.exe PID 4580 wrote to memory of 5036 4580 javaw.exe icacls.exe PID 4580 wrote to memory of 5036 4580 javaw.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\minecraft_alpha_1.2.1.exe"C:\Users\Admin\AppData\Local\Temp\minecraft_alpha_1.2.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Xms512m -Xmx1024m -jar "C:\Users\Admin\AppData\Local\Temp\minecraft_alpha_1.2.1.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:5036
-
-
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:456
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5adb50dfa4d963de46daad882c6dbbb76
SHA14e713ab6245bea9bc4bd92d50f77f363e80b4e2d
SHA2567d0683962d523ea74f4b56165470411f5ef976ad5de01713281a504041d88ad6
SHA512b0455168b7bcb1cdcf9da0ae1d22d67652f55974fb10098630b0af96d453fb1e2e7c7af8a2f043548db4516b96b17b7f083cbdf28a7dd370c6f044be3bf391ca