Analysis
-
max time kernel
599s -
max time network
589s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 08:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/NobodyAbsolutely/minecraft-Alpha-v1.2.3_03-edited-cuz-why-not
Resource
win10v2004-20240426-en
General
-
Target
https://github.com/NobodyAbsolutely/minecraft-Alpha-v1.2.3_03-edited-cuz-why-not
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133618771479511773" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4036 chrome.exe 4036 chrome.exe 3364 chrome.exe 3364 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4036 chrome.exe 4036 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe Token: SeShutdownPrivilege 4036 chrome.exe Token: SeCreatePagefilePrivilege 4036 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe 4036 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4036 wrote to memory of 2720 4036 chrome.exe 81 PID 4036 wrote to memory of 2720 4036 chrome.exe 81 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 2768 4036 chrome.exe 82 PID 4036 wrote to memory of 4528 4036 chrome.exe 83 PID 4036 wrote to memory of 4528 4036 chrome.exe 83 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84 PID 4036 wrote to memory of 536 4036 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/NobodyAbsolutely/minecraft-Alpha-v1.2.3_03-edited-cuz-why-not1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9584eab58,0x7ff9584eab68,0x7ff9584eab782⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1884,i,1606097143501380231,6473912190691141760,131072 /prefetch:22⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1884,i,1606097143501380231,6473912190691141760,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1884,i,1606097143501380231,6473912190691141760,131072 /prefetch:82⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1884,i,1606097143501380231,6473912190691141760,131072 /prefetch:12⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1884,i,1606097143501380231,6473912190691141760,131072 /prefetch:12⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 --field-trial-handle=1884,i,1606097143501380231,6473912190691141760,131072 /prefetch:82⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1884,i,1606097143501380231,6473912190691141760,131072 /prefetch:82⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1884,i,1606097143501380231,6473912190691141760,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5982b34c8cc429f8469b05d26495d27aa
SHA170f44e432ff484da916152d795e739e4d0cfdbea
SHA25608bf09c0b62a089f8fbab7e316cae8b11db7822f7ec7929e11148dbee4a4f970
SHA512154e64c0bf3a1a11a312f5d41f4bcbe09e2503a9e235ea804589531c44e2311d3f2dee04049e2d93232e1a41159fa1100f1ee39ce01d468c5d9d521b89e85b7b
-
Filesize
1KB
MD5df3dc732603515e0e06d137e092b54be
SHA1f83f09488dd477989654938202b0bc7e418ff409
SHA25633a521ff3ebda55aee62e2643054c43dd71d7a9ca7c713d92267830b058cf19f
SHA512a542ad2471fad6e567a74e00d01a4fa85808051587248b1b581444d010490fcfa7c0a452ba96374d6f908e10743b1e064bdef4cb9e75a3e858b49dc5f9cff1d4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5573dca45088560c0999cbb7c6459dfd1
SHA191a2399d5bfe5804987a9df93572fb35d0443b84
SHA256f203934f2f961e92d8ed4d69b58220eec67365adf9bd3f4e4b268ed3cd4ce804
SHA512609d20587e1c19c7113f6964c93e555e9078b6467b3ef1b55663344273163880188ef2c07ffaa095acf2eb1b329b9ea511904795f79991778f2c20df14c5382b
-
Filesize
7KB
MD584031c33735827c9de078ddeae5b5a2d
SHA1d9392f41e9fd597970148cbea77af6bbaf748b5e
SHA2568663577967546569ff71ad608176cfca8f50ba9701d2c0858e9abbcf1bf5adcb
SHA51273a130d03fd108b0c95ef287ffd5b81e40d9d2279cecd37d29226ef332d869f56a86caf198c3c0307e5eeca6f184a92c231fbb9897df485f3df2e6bd5acf5443
-
Filesize
130KB
MD58a29b5c5de43e2f6e1f52361046c643b
SHA1b81deb8d90f1e6d2628c0b34c51a734b17a907bd
SHA25618431843ce87ffb3797c313160289e66f6b117400d1d50a55d32f86e40d80911
SHA5124a916c09bae1e694ed7f712e951c8bed5d8dff792984d7c7e7402f59032918f5e8bc2469ff8f77eb5da4d8e37d7bd28d9dad7c7b0ad3d85bf99001d78a081f8c