Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
minecraft_history.sh
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
minecraft_history.sh
Resource
win10v2004-20240426-en
General
-
Target
minecraft_history.sh
-
Size
1KB
-
MD5
911fec946bf841b6a60d75f1560fde11
-
SHA1
dd0e7472e6cb2c6d2810f36f059a7caeabf6c314
-
SHA256
3036819691abea5b212ed0fbf24d90cefd8b3eed320497e3818d90deac16344d
-
SHA512
3c9322229ad3aec44d3d012579cd8e9c90e31f7dac75ea4b125249018eae04fff6e154f9fc82ac2320ad5260ce5b40f3779890c02ba5d56807f0410452eab805
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.sh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2760 AcroRd32.exe 2760 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2992 1252 cmd.exe 29 PID 1252 wrote to memory of 2992 1252 cmd.exe 29 PID 1252 wrote to memory of 2992 1252 cmd.exe 29 PID 2992 wrote to memory of 2760 2992 rundll32.exe 30 PID 2992 wrote to memory of 2760 2992 rundll32.exe 30 PID 2992 wrote to memory of 2760 2992 rundll32.exe 30 PID 2992 wrote to memory of 2760 2992 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\minecraft_history.sh1⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\minecraft_history.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\minecraft_history.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5286f2b2bf204de09bcf163888c6d218a
SHA10bacef90bfc8fd4552348ac61f40301b1c36e427
SHA256475df48960eb3b37814c776f09e3e99f9161de4af441d9200b94ea678899c137
SHA512ab77d09c64729d58435bebb60580d7d00d45afec164b7a11805f83a6d364d743b4d0477aa66c60fa77bc36bf3c364d90f4beac444bba88f22120aa8da098e28b