Overview
overview
7Static
static
3Minecraft....io.exe
windows11-21h2-x64
7Data/Pytho...le.pyc
windows11-21h2-x64
3Data/Pytho...y3.pyc
windows11-21h2-x64
3Data/Pytho...ig.pyc
windows11-21h2-x64
3Data/Pytho...ke.pyc
windows11-21h2-x64
3Data/Pytho...cs.pyc
windows11-21h2-x64
3Data/Pytho...rs.pyc
windows11-21h2-x64
3Data/Pytho...as.pyc
windows11-21h2-x64
3Data/Pytho...le.pyc
windows11-21h2-x64
3Data/Pytho...me.pyc
windows11-21h2-x64
3Data/Pytho...ng.pyc
windows11-21h2-x64
3Data/Pytho...on.pyc
windows11-21h2-x64
3Data/Pytho...ort.py
windows11-21h2-x64
3Data/audio.dll
windows11-21h2-x64
3Data/file.dll
windows11-21h2-x64
3Data/gmbinaryfile.dll
windows11-21h2-x64
3Data/midiinput.dll
windows11-21h2-x64
3Data/move.bat
windows11-21h2-x64
1Data/wallpaper.bat
windows11-21h2-x64
1Data/window.dll
windows11-21h2-x64
3DialogModule.dll
windows11-21h2-x64
3ExecuteShell.dll
windows11-21h2-x64
3FileDropper.dll
windows11-21h2-x64
3Minecraft ...io.exe
windows11-21h2-x64
3NBS Player Mode.bat
windows11-21h2-x64
3NekoPresence.dll
windows11-21h2-x64
3ffmpeg.exe
windows11-21h2-x64
3ffprobe.exe
windows11-21h2-x64
3pygml.dll
windows11-21h2-x64
3python38.dll
windows11-21h2-x64
3uninstall.exe
windows11-21h2-x64
7window_set_icon.dll
windows11-21h2-x64
3Analysis
-
max time kernel
600s -
max time network
467s -
platform
windows11-21h2_x64 -
resource
win11-20240730-en -
resource tags
arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-08-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
Minecraft.Note.Block.Studio.exe
Resource
win11-20240730-en
Behavioral task
behavioral2
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/simple.pyc
Resource
win11-20240730-en
Behavioral task
behavioral3
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/simple_py3.pyc
Resource
win11-20240730-en
Behavioral task
behavioral4
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/ufunc_config.pyc
Resource
win11-20240730-en
Behavioral task
behavioral5
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/ufunclike.pyc
Resource
win11-20240730-en
Behavioral task
behavioral6
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/ufuncs.pyc
Resource
win11-20240730-en
Behavioral task
behavioral7
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/warnings_and_errors.pyc
Resource
win11-20240730-en
Behavioral task
behavioral8
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_generic_alias.pyc
Resource
win11-20240730-en
Behavioral task
behavioral9
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_isfile.pyc
Resource
win11-20240730-en
Behavioral task
behavioral10
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_runtime.pyc
Resource
win11-20240730-en
Behavioral task
behavioral11
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_typing.pyc
Resource
win11-20240730-en
Behavioral task
behavioral12
Sample
Data/Python/Lib/site-packages/numpy/version.pyc
Resource
win11-20240730-en
Behavioral task
behavioral13
Sample
Data/Python/audio_export.py
Resource
win11-20240730-en
Behavioral task
behavioral14
Sample
Data/audio.dll
Resource
win11-20240730-en
Behavioral task
behavioral15
Sample
Data/file.dll
Resource
win11-20240730-en
Behavioral task
behavioral16
Sample
Data/gmbinaryfile.dll
Resource
win11-20240729-en
Behavioral task
behavioral17
Sample
Data/midiinput.dll
Resource
win11-20240730-en
Behavioral task
behavioral18
Sample
Data/move.bat
Resource
win11-20240730-en
Behavioral task
behavioral19
Sample
Data/wallpaper.bat
Resource
win11-20240730-en
Behavioral task
behavioral20
Sample
Data/window.dll
Resource
win11-20240730-en
Behavioral task
behavioral21
Sample
DialogModule.dll
Resource
win11-20240730-en
Behavioral task
behavioral22
Sample
ExecuteShell.dll
Resource
win11-20240730-en
Behavioral task
behavioral23
Sample
FileDropper.dll
Resource
win11-20240730-en
Behavioral task
behavioral24
Sample
Minecraft Note Block Studio.exe
Resource
win11-20240730-en
Behavioral task
behavioral25
Sample
NBS Player Mode.bat
Resource
win11-20240730-en
Behavioral task
behavioral26
Sample
NekoPresence.dll
Resource
win11-20240730-en
Behavioral task
behavioral27
Sample
ffmpeg.exe
Resource
win11-20240730-en
Behavioral task
behavioral28
Sample
ffprobe.exe
Resource
win11-20240730-en
Behavioral task
behavioral29
Sample
pygml.dll
Resource
win11-20240730-en
Behavioral task
behavioral30
Sample
python38.dll
Resource
win11-20240730-en
Behavioral task
behavioral31
Sample
uninstall.exe
Resource
win11-20240730-en
Behavioral task
behavioral32
Sample
window_set_icon.dll
Resource
win11-20240730-en
General
-
Target
Minecraft Note Block Studio.exe
-
Size
15.2MB
-
MD5
f59330f3e9be9f9b700a387d73b4bd20
-
SHA1
f426bc953200341d073cf836ff806756f9315035
-
SHA256
766cc85b942faa30fdad76ced3b0ef1af2b09edd74eab09c6384db6f3bd7bdab
-
SHA512
373d2773d9e64ffa8e88f3bd9a4b5ec661856c99ef8f1421c38c548baee1348cbe4057128e6457790156820830fb358792a78bda6a07e465009d3afb676a3092
-
SSDEEP
98304:ZmHeNU7b4PIPMIkaF0JnyxCzCmqz2o5Dq76ZjF/CCMSeCiCDD+k2mChBcCGVjF:ZmHeskA08FfXmqzd8yVPUmJ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Minecraft Note Block Studio.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1974522869-4251526421-3305193628-1000_Classes\discord-848873736702132246\DefaultIcon Minecraft Note Block Studio.exe Set value (str) \REGISTRY\USER\S-1-5-21-1974522869-4251526421-3305193628-1000_Classes\discord-848873736702132246\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Minecraft Note Block Studio.exe" Minecraft Note Block Studio.exe Key created \REGISTRY\USER\S-1-5-21-1974522869-4251526421-3305193628-1000_Classes\discord-848873736702132246\shell\open\command Minecraft Note Block Studio.exe Key created \REGISTRY\USER\S-1-5-21-1974522869-4251526421-3305193628-1000_Classes\discord-848873736702132246\shell Minecraft Note Block Studio.exe Set value (str) \REGISTRY\USER\S-1-5-21-1974522869-4251526421-3305193628-1000_Classes\discord-848873736702132246\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Minecraft Note Block Studio.exe" Minecraft Note Block Studio.exe Key created \REGISTRY\USER\S-1-5-21-1974522869-4251526421-3305193628-1000_Classes\discord-848873736702132246 Minecraft Note Block Studio.exe Set value (str) \REGISTRY\USER\S-1-5-21-1974522869-4251526421-3305193628-1000_Classes\discord-848873736702132246\ = "URL:Run game 848873736702132246 protocol" Minecraft Note Block Studio.exe Set value (str) \REGISTRY\USER\S-1-5-21-1974522869-4251526421-3305193628-1000_Classes\discord-848873736702132246\URL Protocol Minecraft Note Block Studio.exe Key created \REGISTRY\USER\S-1-5-21-1974522869-4251526421-3305193628-1000_Classes\discord-848873736702132246\shell\open Minecraft Note Block Studio.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4752 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4752 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 Minecraft Note Block Studio.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2640 Minecraft Note Block Studio.exe 2640 Minecraft Note Block Studio.exe 2640 Minecraft Note Block Studio.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2640 wrote to memory of 4764 2640 Minecraft Note Block Studio.exe 81 PID 2640 wrote to memory of 4764 2640 Minecraft Note Block Studio.exe 81 PID 2640 wrote to memory of 4764 2640 Minecraft Note Block Studio.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Minecraft Note Block Studio.exe"C:\Users\Admin\AppData\Local\Temp\Minecraft Note Block Studio.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Data\wallpaper.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4764
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004D41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD56d7960a52b61551fed5ae46fc1f475aa
SHA168424a542d1d8b2ba26486753c9fa63d733172eb
SHA2569fcc5fc179dc359ce73e4ba4b7730a5ce57fb6575ad9b26171970812de25c5db
SHA51261a65528964576ea79e9f75b2e39d7562c0f4bf730b605fe6cd67fed41ffae40abe2ece54e277ed3346dff951d59902d5fe4329374e11f813dd571ffaf3c94d9
-
Filesize
1KB
MD5469c5f98677a71dfc5f2e853416d2c7b
SHA1410a6d254a0108e2b2bb66c43a9367b41605f770
SHA25635fcb0a3a0489ca58b5cdeab711ac326221e9203d57026830bb19764ec9b0973
SHA5126a3bd56c542bfc1063c134c9744b254c43cc33f08df73e6fe37f1293f5517b1bc5525735d32d4211205498e819fcafeab7e526f973cbaefd6793f84e9b14525b
-
Filesize
376B
MD5b230552ef1205c3f7a6326eb52f7d2df
SHA17b51201b3f74ab9d0740c4864a889202480f0181
SHA256e713a393ea12565b07e0ae571190cbc66efc0ec50c0a9ffffeddd2bb3a749d67
SHA512bbd7b18e6322b7a7d31f9cff331a2018b1859759154260deddfc4aed395846c092d9c60a39d5d6e450b44ea4affc7b5a5cd752a261bc37fb51b23fb2e14380b5
-
Filesize
2KB
MD520293631f946b38d6316e43c20018806
SHA1da0fad081326e46f38ba3ebd06230bd732c39b29
SHA2566af24c9eba53acd5f788f6dc30260699c74384292965198ca052fa635bdb6216
SHA512b3959fb02dcecef4ffcc6cfde07c50a1a92591b84369eef1875c8a2788d8bace15e68ea00c616529297a0ca7d678e8280541b8f251a24236e3a507f8eaca15d1
-
Filesize
2KB
MD58f2c30a9a7162dcbc3b9e32b005f4682
SHA14e3b2320acf608fef790bda4a85e3121d5e29320
SHA2563bddabea2fff3fb5ce3d08174754da272948064bd6b10eb90f5ba073e06f286c
SHA512af31a5987eeae388f11803987b9b28ae9dd5deee0628975ac50778ca98d9126b130e6dce3c8d98250527aa3e04e56fb2d2fe43622c6438a5b1ea3c2f0cb6a55e
-
Filesize
2KB
MD5c5e18211761f24311cc25f65b830083a
SHA1d0316b71bc6bd0e148699cbefd4dbdab713fe642
SHA256adb803501baa0cd9ad0967848c8e317431302684c642feb7c080bbf5e76d8c14
SHA512dbf7fa2a3b8f11bbc337e959a2f6b72a58307272a19a9648dacb2fbc12ee6bca40593e121ca2992152ffcf991464a0b09107b7450621fc9bef401366712055cc
-
Filesize
2KB
MD540f136e5a2dae69806280d4da1ff941e
SHA199a71e5232bd60adab30671c999d9befeb0afc52
SHA25602804d9113393815c384e1cd32b2e1b9335207627a9406991eabc372265f1653
SHA512908b7e73b6c28234578bdbda00a8af436e5875b37ddefd92a9d48a6339c476d0614774ff5d150f95555ad9d85e6dab7c70ff851a946db73251cde014f72d72cc
-
Filesize
3KB
MD549a46c036929edc3be16b6c2563f1a4d
SHA1c4174a8a85b95d431813235e813a224386b049bb
SHA2563c243be755091e4c2f8162be62821e79a4950965d747ca982b98e1073b8d073b
SHA512c26716bf74b7819ce0b86d153c351dd939a9234249517e060f7278f6586ddcf44cdb52446038e4c6ec73b5436cdd746877424f35dd2b114b0a8f0a0884acc0dc
-
Filesize
3KB
MD5c00f2eda7f9b4e069219cee57575fb8a
SHA133f4f0dc75eff08e63b96fbbf57b6a7adcc252c8
SHA256f6d1ab80a13a5698e306e9863b906b4bf69299bdc619d1032d9fbfa7501b13a0
SHA51232ebeb857b993b837bd8d74b909f30a9aaed0964d24beb1f35b5c0269506f75001bf0a775005603ab48c9bef8a71f1e87e864bb2e6c24d00a6b25dc582ed3198
-
Filesize
4KB
MD5c3cb9da6b2cc3a83de8a435f68a6504b
SHA1fd5a1b3654f5638d69dcda55ce585f0ff0058216
SHA25664d72797ea5f187edf41418164be9dc35054050fe6a227195818ecb25a3cf89b
SHA512b00d49a386e3c93f4efe2ad44ed81cc504657f797a93dc55f5a8bc598211b45f88d71efa87ebb30fb6e9a3ba2e83cf0c8980e0d1496fc852a4bda8d6a1b44601
-
Filesize
835B
MD5c9134e4446648e03c512bb7ba89af06d
SHA187f9bf71159227abcb69ebca4f75c05498cd54aa
SHA256fae3eaeec908b10768e45268db2627acab5d4ecd92782c7b38e3150fd5939ebc
SHA5121a6a190fa8510f74a6503f59514726734c3c6c82bca7c71cc7be5e23536d659b90eb420464367c76304efcb50291256892cdd02c494459454c50c2b97939eb25
-
Filesize
991B
MD58fc75b3db378a9cf6a18b835373cd206
SHA195f45505aa5fae1c06920a8597352801c1964ca7
SHA256b5421fc66904f4c904be3379b5c6f0a845661a2f64b195f6132e35183ffd0d4c
SHA5120549df9711883c33260efac7906a3005ced10bb2356510b7246d11fe5a9233a7f5ee6352d75309d1e1e6bdd989bdc39e9fdd98fbc241e044c4e479bd3c8e1cfc