Overview
overview
8Static
static
3Arquivos M...al.rar
windows10-1703-x64
3Arquivos M...re.dll
windows10-1703-x64
1Arquivos M...ME.txt
windows10-1703-x64
1Arquivos M...er.exe
windows10-1703-x64
8Arquivos M...nt.exe
windows10-1703-x64
1Arquivos M...OM.dll
windows10-1703-x64
1Arquivos M...r5.sys
windows10-1703-x64
1Arquivos M...ok.dll
windows10-1703-x64
1Arquivos M...ME.txt
windows10-1703-x64
1Arquivos M...er.exe
windows10-1703-x64
8Arquivos M...OM.dll
windows10-1703-x64
7Arquivos M...r5.sys
windows10-1703-x64
1Arquivos M...32.exe
windows10-1703-x64
1Arquivos M...er.cfg
windows10-1703-x64
3Arquivos M...le.ini
windows10-1703-x64
1Arquivos M...er.ico
windows10-1703-x64
3Arquivos M...le.nsi
windows10-1703-x64
3Arquivos M...er.nsi
windows10-1703-x64
3Arquivos M...er.bmp
windows10-1703-x64
4Arquivos M...er.nsh
windows10-1703-x64
3Arquivos M...er.nsh
windows10-1703-x64
3Arquivos M...sh.bmp
windows10-1703-x64
4Arquivos M...le.exe
windows10-1703-x64
8Arquivos M...le.ini
windows10-1703-x64
1Analysis
-
max time kernel
72s -
max time network
22s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
25/06/2024, 17:26
Static task
static1
Behavioral task
behavioral1
Sample
Arquivos Minecraft GalegaoTutorial.rar
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
Arquivos Minecraft/System32/Windows.ApplicationModel.Store.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Arquivos Minecraft/UnlockerPortable/App/Unlocker/README.txt
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Arquivos Minecraft/UnlockerPortable/App/Unlocker/Unlocker.exe
Resource
win10-20240611-en
Behavioral task
behavioral5
Sample
Arquivos Minecraft/UnlockerPortable/App/Unlocker/UnlockerAssistant.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Arquivos Minecraft/UnlockerPortable/App/Unlocker/UnlockerCOM.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
Arquivos Minecraft/UnlockerPortable/App/Unlocker/UnlockerDriver5.sys
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
Arquivos Minecraft/UnlockerPortable/App/Unlocker/UnlockerHook.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
Arquivos Minecraft/UnlockerPortable/App/Unlocker64/README.txt
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
Arquivos Minecraft/UnlockerPortable/App/Unlocker64/Unlocker.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
Arquivos Minecraft/UnlockerPortable/App/Unlocker64/UnlockerCOM.dll
Resource
win10-20240611-en
Behavioral task
behavioral12
Sample
Arquivos Minecraft/UnlockerPortable/App/Unlocker64/UnlockerDriver5.sys
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
Arquivos Minecraft/UnlockerPortable/App/Unlocker64/UnlockerInject32.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
Arquivos Minecraft/UnlockerPortable/Data/Unlocker64/Unlocker.cfg
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
Arquivos Minecraft/UnlockerPortable/Data/UnlockerPortable.ini
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
Arquivos Minecraft/UnlockerPortable/Other/Source/Unlocker.ico
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
Arquivos Minecraft/UnlockerPortable/Other/Source/_UnlockerPortable.nsi
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
Arquivos Minecraft/UnlockerPortable/Other/Source/_UnlockerPortableInstaller.nsi
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
Arquivos Minecraft/UnlockerPortable/Other/_Include/Installer.bmp
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
Arquivos Minecraft/UnlockerPortable/Other/_Include/Installer.nsh
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
Arquivos Minecraft/UnlockerPortable/Other/_Include/Launcher.nsh
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
Arquivos Minecraft/UnlockerPortable/Other/_Include/Splash.bmp
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
Arquivos Minecraft/UnlockerPortable/UnlockerPortable.exe
Resource
win10-20240611-en
Behavioral task
behavioral24
Sample
Arquivos Minecraft/UnlockerPortable/UnlockerPortable.ini
Resource
win10-20240404-en
General
-
Target
Arquivos Minecraft GalegaoTutorial.rar
-
Size
750KB
-
MD5
13d475d64d971278ca705fa98bae3c1a
-
SHA1
181df136d7d89bd84739246373ef32f483e40324
-
SHA256
b2d67f85171a7e394f28cc8df0f0a36f80e7fb7aeada7f9709fd1543b53e4579
-
SHA512
dc6bfd5f80f8a4a1ee92ac083ead3063112caf9d3a8101bbc121fdcbb8cf25da23b0153bad673eacc4b64c8e7bf53c6b885c2924990f2b3a5683f71d4ca43458
-
SSDEEP
12288:DUP1eJoMWQZDInXAKX1ua/9oTpt4cr7BalYHIqiN2E6hI4aFjibpYqNkc/qBie6N:oP1eaMf2nX1MaF2BaxqiXbFyWqfqge6N
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3352 OpenWith.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 3352 OpenWith.exe 2244 AcroRd32.exe 2244 AcroRd32.exe 2244 AcroRd32.exe 2244 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3352 wrote to memory of 2244 3352 OpenWith.exe 73 PID 3352 wrote to memory of 2244 3352 OpenWith.exe 73 PID 3352 wrote to memory of 2244 3352 OpenWith.exe 73 PID 2244 wrote to memory of 2036 2244 AcroRd32.exe 75 PID 2244 wrote to memory of 2036 2244 AcroRd32.exe 75 PID 2244 wrote to memory of 2036 2244 AcroRd32.exe 75 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 3156 2036 RdrCEF.exe 76 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77 PID 2036 wrote to memory of 4132 2036 RdrCEF.exe 77
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Arquivos Minecraft GalegaoTutorial.rar"1⤵
- Modifies registry class
PID:2772
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Arquivos Minecraft GalegaoTutorial.rar"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3492A45AF0B5F3B611871F3C33608F39 --mojo-platform-channel-handle=1604 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3156
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3214F435160DF126DE63577148A5823D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3214F435160DF126DE63577148A5823D --renderer-client-id=2 --mojo-platform-channel-handle=1476 --allow-no-sandbox-job /prefetch:14⤵PID:4132
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8F96EA214A43FEE1D6FD2877EDB0556E --mojo-platform-channel-handle=2184 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2464
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2D68BFF42768CC3DDCC210BFDB67CF28 --mojo-platform-channel-handle=2368 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:2368
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=15FFE90CDAB5D6792AED151F711BA633 --mojo-platform-channel-handle=2476 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4436
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:424