Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
Minecraft Launcher.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Minecraft Launcher.exe
Resource
win10v2004-20240226-en
General
-
Target
Minecraft Launcher.exe
-
Size
4.4MB
-
MD5
d973610e8b55146759ae1b8cea3dcd9c
-
SHA1
2e07ec8fb61f9dd14a174ca1bfe5f402fedc094f
-
SHA256
99369a9b242918bb894783f709c523cc38845251581fc328168cbcae0803fc44
-
SHA512
17b4e7719311a8801802eff05b6534afdce29a74f8f6974dd77aeb9b483efe9ffdcc6591362c017513d01e5c0dfd9d16ec7e9f9c97f9a18f4abc84b9873f77da
-
SSDEEP
98304:pQfU48WhP2ncbEzoXw0kyIG5DcITcAMajj/urVA:pYbhP2ncFg0kyIGZTczajDuri
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3184 icacls.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3808065738-1666277613-1125846146-1000\{43AABE27-9675-4D32-912C-FC42677AE1BC} svchost.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3424 javaw.exe 3424 javaw.exe 3424 javaw.exe 3424 javaw.exe 3424 javaw.exe 5424 OpenWith.exe 3424 javaw.exe 3424 javaw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3296 wrote to memory of 3424 3296 Minecraft Launcher.exe 91 PID 3296 wrote to memory of 3424 3296 Minecraft Launcher.exe 91 PID 3424 wrote to memory of 3184 3424 javaw.exe 92 PID 3424 wrote to memory of 3184 3424 javaw.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Minecraft Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Minecraft Launcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Xms256m -Xmx512m -jar "C:\Users\Admin\AppData\Local\Temp\Minecraft Launcher.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3184
-
-
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:2228
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4468 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:4892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5c5d3c66388b5e9354959f2ec6719cb44
SHA163778d0e221f8a585d3771f27761519b1e17e6e9
SHA25691e2d5c92932c3ff524581c5920897279799a7c062f18457d053269a068f25cb
SHA512961e404219961450f08a49f3085c067de06cd862be643bc110bf1183e9b342d53de463f85bbde00d98471abc1fe53d3ac37d13f758a5df39532e5fa22077767f
-
Filesize
344B
MD5d141cc8e71a3351f1aacb88a74b45fa4
SHA1323cb27d8b7772b4b928a00706d4efe3b1104f52
SHA2562788675e062e1111ead50a9a05971a7c11fe6246a89f571cf9f59ed68c72bb17
SHA512315dfcf01f450b907f2cdfc9661db728789ec2440dd6985d914d024bd3c0798e602f7e230e60a8ffee8f39c95de68477d3b4def580a292e263d48bc23babae09
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c