Overview
overview
7Static
static
3Minecraft....io.exe
windows11-21h2-x64
7Data/Pytho...le.pyc
windows11-21h2-x64
3Data/Pytho...y3.pyc
windows11-21h2-x64
3Data/Pytho...ig.pyc
windows11-21h2-x64
3Data/Pytho...ke.pyc
windows11-21h2-x64
3Data/Pytho...cs.pyc
windows11-21h2-x64
3Data/Pytho...rs.pyc
windows11-21h2-x64
3Data/Pytho...as.pyc
windows11-21h2-x64
3Data/Pytho...le.pyc
windows11-21h2-x64
3Data/Pytho...me.pyc
windows11-21h2-x64
3Data/Pytho...ng.pyc
windows11-21h2-x64
3Data/Pytho...on.pyc
windows11-21h2-x64
3Data/Pytho...ort.py
windows11-21h2-x64
3Data/audio.dll
windows11-21h2-x64
3Data/file.dll
windows11-21h2-x64
3Data/gmbinaryfile.dll
windows11-21h2-x64
3Data/midiinput.dll
windows11-21h2-x64
3Data/move.bat
windows11-21h2-x64
1Data/wallpaper.bat
windows11-21h2-x64
1Data/window.dll
windows11-21h2-x64
3DialogModule.dll
windows11-21h2-x64
3ExecuteShell.dll
windows11-21h2-x64
3FileDropper.dll
windows11-21h2-x64
3Minecraft ...io.exe
windows11-21h2-x64
3NBS Player Mode.bat
windows11-21h2-x64
3NekoPresence.dll
windows11-21h2-x64
3ffmpeg.exe
windows11-21h2-x64
3ffprobe.exe
windows11-21h2-x64
3pygml.dll
windows11-21h2-x64
3python38.dll
windows11-21h2-x64
3uninstall.exe
windows11-21h2-x64
7window_set_icon.dll
windows11-21h2-x64
3Analysis
-
max time kernel
440s -
max time network
452s -
platform
windows11-21h2_x64 -
resource
win11-20240730-en -
resource tags
arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-08-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
Minecraft.Note.Block.Studio.exe
Resource
win11-20240730-en
Behavioral task
behavioral2
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/simple.pyc
Resource
win11-20240730-en
Behavioral task
behavioral3
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/simple_py3.pyc
Resource
win11-20240730-en
Behavioral task
behavioral4
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/ufunc_config.pyc
Resource
win11-20240730-en
Behavioral task
behavioral5
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/ufunclike.pyc
Resource
win11-20240730-en
Behavioral task
behavioral6
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/ufuncs.pyc
Resource
win11-20240730-en
Behavioral task
behavioral7
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/warnings_and_errors.pyc
Resource
win11-20240730-en
Behavioral task
behavioral8
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_generic_alias.pyc
Resource
win11-20240730-en
Behavioral task
behavioral9
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_isfile.pyc
Resource
win11-20240730-en
Behavioral task
behavioral10
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_runtime.pyc
Resource
win11-20240730-en
Behavioral task
behavioral11
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_typing.pyc
Resource
win11-20240730-en
Behavioral task
behavioral12
Sample
Data/Python/Lib/site-packages/numpy/version.pyc
Resource
win11-20240730-en
Behavioral task
behavioral13
Sample
Data/Python/audio_export.py
Resource
win11-20240730-en
Behavioral task
behavioral14
Sample
Data/audio.dll
Resource
win11-20240730-en
Behavioral task
behavioral15
Sample
Data/file.dll
Resource
win11-20240730-en
Behavioral task
behavioral16
Sample
Data/gmbinaryfile.dll
Resource
win11-20240729-en
Behavioral task
behavioral17
Sample
Data/midiinput.dll
Resource
win11-20240730-en
Behavioral task
behavioral18
Sample
Data/move.bat
Resource
win11-20240730-en
Behavioral task
behavioral19
Sample
Data/wallpaper.bat
Resource
win11-20240730-en
Behavioral task
behavioral20
Sample
Data/window.dll
Resource
win11-20240730-en
Behavioral task
behavioral21
Sample
DialogModule.dll
Resource
win11-20240730-en
Behavioral task
behavioral22
Sample
ExecuteShell.dll
Resource
win11-20240730-en
Behavioral task
behavioral23
Sample
FileDropper.dll
Resource
win11-20240730-en
Behavioral task
behavioral24
Sample
Minecraft Note Block Studio.exe
Resource
win11-20240730-en
Behavioral task
behavioral25
Sample
NBS Player Mode.bat
Resource
win11-20240730-en
Behavioral task
behavioral26
Sample
NekoPresence.dll
Resource
win11-20240730-en
Behavioral task
behavioral27
Sample
ffmpeg.exe
Resource
win11-20240730-en
Behavioral task
behavioral28
Sample
ffprobe.exe
Resource
win11-20240730-en
Behavioral task
behavioral29
Sample
pygml.dll
Resource
win11-20240730-en
Behavioral task
behavioral30
Sample
python38.dll
Resource
win11-20240730-en
Behavioral task
behavioral31
Sample
uninstall.exe
Resource
win11-20240730-en
Behavioral task
behavioral32
Sample
window_set_icon.dll
Resource
win11-20240730-en
General
-
Target
Data/file.dll
-
Size
370KB
-
MD5
71823ef94ce64e72783720f689d7658a
-
SHA1
510a78755e555b099514c31975069443729f2fab
-
SHA256
c4ea167d8ad20110a12870b6c232fc38a84cc2911de2688f72a961e22264ff1c
-
SHA512
11a1bcbffb83ae05a82133034a11a8285ab15ddc62dba2f49e01dc53844394d6e97b6fa143d2064eecefbc847cf669d9a39d5f5985922667f8ade2ca3326b08e
-
SSDEEP
6144:zBDO2+HofgRqxCPssBzT9TYDoTBGlQoEiZw8:zBDh+I48xCPssBzODoT0lQxA
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 644 588 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3908 wrote to memory of 588 3908 rundll32.exe 81 PID 3908 wrote to memory of 588 3908 rundll32.exe 81 PID 3908 wrote to memory of 588 3908 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Data\file.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Data\file.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 588 -s 5003⤵
- Program crash
PID:644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 588 -ip 5881⤵PID:2560