Analysis
-
max time kernel
490s -
max time network
492s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
02/06/2024, 04:18
Static task
static1
Behavioral task
behavioral1
Sample
MCG Server Launcher/MCG Server Launcher.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
MCG Server Launcher/MCG Server Launcher.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
MCG Server Launcher/MCG Server Launcher.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
MCG Server Launcher/MCG Server Launcher.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
MCG Server Launcher/MCG Server Launcher.exe
Resource
win11-20240508-en
General
-
Target
MCG Server Launcher/MCG Server Launcher.exe
-
Size
2.1MB
-
MD5
3584a02b77f639b7d7fabe08797bb6eb
-
SHA1
906e6a9044eae39ab17e60e28c4de5a9807c65b3
-
SHA256
1c5c9ce6f9339eb57d39c35b166b5f64e8ea7f427d988aaa3a7d95ce81225e72
-
SHA512
72942199d4ee6146055919de00a224ae90a08e0c5c58f9155a9beca7f986169bbcb8e09e59cae16e83e29e59521cbad77ccf958550abd92a4fbeb0db6e9a43a0
-
SSDEEP
49152:j8mi6FoJtr7uht5r+LXKX6wZYKWHPo6lW9ssdrdjeN:j8mi6F4RujsLXmxMvnA91xeN
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2412 powershell.exe -
Executes dropped EXE 5 IoCs
pid Process 4188 FiveM.exe 3404 CitizenFX.exe.new 4820 FiveM.exe 1824 FiveM.exe 1496 FiveM_b2699_DumpServer -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\FiveM\FiveM.app\desktop.ini FiveM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 FiveM.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 FiveM.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff FiveM.exe Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" FiveM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance FiveM.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff FiveM.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell FiveM.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags FiveM.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings FiveM.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 FiveM.exe Set value (int) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" FiveM.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 FiveM.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2412 powershell.exe 2412 powershell.exe 2412 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2412 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4188 FiveM.exe 1824 FiveM.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1824 FiveM.exe 1824 FiveM.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1396 wrote to memory of 4960 1396 MCG Server Launcher.exe 74 PID 1396 wrote to memory of 4960 1396 MCG Server Launcher.exe 74 PID 1396 wrote to memory of 4960 1396 MCG Server Launcher.exe 74 PID 1396 wrote to memory of 4188 1396 MCG Server Launcher.exe 76 PID 1396 wrote to memory of 4188 1396 MCG Server Launcher.exe 76 PID 4960 wrote to memory of 2412 4960 cmd.exe 77 PID 4960 wrote to memory of 2412 4960 cmd.exe 77 PID 4960 wrote to memory of 2412 4960 cmd.exe 77 PID 4188 wrote to memory of 3404 4188 FiveM.exe 78 PID 4188 wrote to memory of 3404 4188 FiveM.exe 78 PID 3404 wrote to memory of 4820 3404 CitizenFX.exe.new 79 PID 3404 wrote to memory of 4820 3404 CitizenFX.exe.new 79 PID 4820 wrote to memory of 1824 4820 FiveM.exe 80 PID 4820 wrote to memory of 1824 4820 FiveM.exe 80 PID 1824 wrote to memory of 1496 1824 FiveM.exe 82 PID 1824 wrote to memory of 1496 1824 FiveM.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\MCG Server Launcher\MCG Server Launcher.exe"C:\Users\Admin\AppData\Local\Temp\MCG Server Launcher\MCG Server Launcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Start-Process 'C:\Users\Admin\AppData\Local\Temp\temp.bat' -Verb RunAs -WindowStyle Hidden"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
-
C:\Users\Admin\AppData\Local\Temp\FiveM.exe"C:\Users\Admin\AppData\Local\Temp\FiveM.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\CitizenFX.exe.newCitizenFX.exe.new -bootstrap "C:\Users\Admin\AppData\Local\Temp\FiveM.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\FiveM.exe"C:\Users\Admin\AppData\Local\Temp\FiveM.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\FiveM\FiveM.exe"C:\Users\Admin\AppData\Local\FiveM\FiveM.exe"5⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\FiveM\FiveM.app\data\cache\subprocess\FiveM_b2699_DumpServer"C:\Users\Admin\AppData\Local\FiveM\FiveM.app\data\cache\subprocess\FiveM_b2699_DumpServer" -dumpserver:1196 -parentpid:18246⤵
- Executes dropped EXE
PID:1496
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD53656c6636cd9dbceaf83230c3c9a2be9
SHA1989f27c6736a943fd4690091fed26f7c17e3c17f
SHA256f9ae094812ce9fbd56b58dab7739451792aba8f56c5f21eee15ef96682b413a6
SHA51252bbb8f2b2d6183f30b908d9171a2ec8c2128bbce145b7af0095d4c199b1ec431d650ec4ed0b1b6cbc7bcc8d29da3285cdcc61368faa8c4e57b45315ced4e4ad
-
Filesize
39KB
MD5619814b8b98007c1698576b7e4efb3ec
SHA1e60f3ceaf5ca78f74e6867f0b042951bffb91786
SHA25671ad5591441d62d02d2b62155abcf2cab587af49b86e2db5be6729a5b39df5d1
SHA51255ab0bd3c1750d63ad3304e63b7c26251f01c8994f385e5643e2bbd37fc6595fd0e9f5fc0d76aa655fe8ad3bc6fdee33248d9f4a76cce11a25d84c3f5de16236
-
Filesize
6B
MD5bc0d2ef702db446712420b39a4e92250
SHA1fbf03c92c01bd42022829b761b2bc1f6f6ccc810
SHA2560c7271249d4e34ef9ca98d5c3b622096a7f08568cc88336ac6c0a2d89953e35c
SHA5125c03d84075574f4eeeac5eceff55f590d9ffb289e20ab8a904ec79a221fa105b0f07979c4bf295a7f4e4e1ad81a4c6e6ec4f851f0c80e0c678d710e37b5840d8
-
Filesize
1.8MB
MD5559cc98140d4eff894bdf2b3f6ce2a73
SHA11665ac2284d16bcc1fdd319b023b1d12f1cad343
SHA256dba50975b85ca95d0c41d10ff885c48576aa938731dd56c06af03f46d046e267
SHA512d96ee466b2b7bd7e44a72fac7ddc624b8882252ae9fd1a07c0dad084113a93061551d0bad6b0898a1638d2688ee599dd84b050c14473807986b3e697511a6d66
-
Filesize
2.1MB
MD5c3d94830b2a220533e08ffcc9d44974f
SHA1388ff56c07acfc78d22608406fdfc9d0467cd228
SHA25630f48ffe2637e8f4fcebb8dbf30f6207923755336d8f5568ba578300b03a3418
SHA51262464defcd58e956a7c2a98380a7b9397d19f93f9f3cc61d5fda0cf564becf41f6c5f89eaba9d516840f9f8a043a98e09226ee5193bd1e7ab0e5c3d6bf8ddc12
-
Filesize
1.9MB
MD5681d1b756761d9c7409b072884a8edce
SHA108a14e48347f3bef0bd95aa66099b62b67fa07f4
SHA25651f19f2031f8213ae5a2502b19bb8e60ce42d37da066704c41c1bc9d6f85d387
SHA5129568f50550b8352cfff31ca36fd585b704145beda629421d337b803d0df35b8658ba2a4b9e3908c66d363a3414d989ec321da6f1e21ff1d48e92cabd393fab63
-
Filesize
157B
MD5f9d948aa9426cb1a2a82e651b81a1912
SHA12d496caeef3b0bff6b91b99e58736cea51366348
SHA256b1fe21f251cf7875783ea162ef86c2a5b5022a1c5157bbb7972b6b34e14ec08a
SHA512a962fae3853f43e4a8e2b33aa5f51a917673d76648845dffcc32037c25cb3f300e4c4fc3ea633bf78b714449dbda84416e41cc16256373c170fb82d8485e3369
-
Filesize
14KB
MD554f7305e1f3db03f5e0189c0d4eeca3c
SHA17da7b4c4b47ffb05e353f76099b221938e47fd6d
SHA256d859e714a5af2ed2e7aacf13226d6549abdad90ebf45034b3684a42425ede5ee
SHA5124db6d2ed31cd059fcf1f379965ad8050c6d7b049b5dae0fdfe0d242daf74948432c20b7cdcf068030c8e3630d2c85fb0d47e70ea41901d7e303ca94117508961
-
Filesize
5.0MB
MD5b85b0aa54aec3edcb4ebac2c3a32bc26
SHA146b008cce9250dc2f96a1d1cb9b681ac4528866d
SHA25675d805a8d5ec7281de40c9cbe31445a3ad0f0fe73852c55d06f4dcfefa4a9e4d
SHA512f14fc451b5e954934521878e31b2231e154eccc380a68d6742531cba1edd5405ca307d29b244d8a703c87115c8393a26620f298dca1571e08e4aa11edf8744d9
-
Filesize
5.0MB
MD5e8c3fd1b35507fa301fac9367f28757f
SHA1fd03919c9370248a62c9d540f6cd9fbeccac09f6
SHA25605a99a0067ddde35a8b6c92721fc8ee058ffe1cee9a9dceb2bafb1a8e2d92368
SHA5127f4f60aa0978a5f3f49cac744c11b6fe410cf32ec8dcd83fd6ad2120e9830b242b6f6a758c03ca76e8ffa800dbfec1b92f759c176f829f94492ed81e65befcdd
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
556B
MD5f225cc48602e5003d67679155841c917
SHA15f5d572f385155377f39086dcfcbc0a126dcc375
SHA25673309641458311a723800f190f859e1a7c211b8b5d127ebcb1444f399faa1c34
SHA5121bcfff70302146428aa0b2677c76f146d0b72404e64db4663ea203fdd68d6acac70fecfa9318cce33b1b9380fea77f18680b1435cf220ceb797b51eaa400787e
-
Filesize
2KB
MD5af88f1fb7de00a74bffd5432bc67541d
SHA1a2b296e24e53b9681ea691039e6832692ffb9b04
SHA256237a9ef01d162d12de6229d7cf5828c7013ce0c66cbfa91bb4bde3adc0cdf233
SHA512bb47f1f9048da26a79fb44c001f24f28625248f963e1d9704796eb02a19b11b05b7d43785e8139311d2920dd59b955ee8018f15eb40df05e2c9db617991800c3