Overview
overview
7Static
static
3Minecraft....io.exe
windows11-21h2-x64
7Data/Pytho...le.pyc
windows11-21h2-x64
3Data/Pytho...y3.pyc
windows11-21h2-x64
3Data/Pytho...ig.pyc
windows11-21h2-x64
3Data/Pytho...ke.pyc
windows11-21h2-x64
3Data/Pytho...cs.pyc
windows11-21h2-x64
3Data/Pytho...rs.pyc
windows11-21h2-x64
3Data/Pytho...as.pyc
windows11-21h2-x64
3Data/Pytho...le.pyc
windows11-21h2-x64
3Data/Pytho...me.pyc
windows11-21h2-x64
3Data/Pytho...ng.pyc
windows11-21h2-x64
3Data/Pytho...on.pyc
windows11-21h2-x64
3Data/Pytho...ort.py
windows11-21h2-x64
3Data/audio.dll
windows11-21h2-x64
3Data/file.dll
windows11-21h2-x64
3Data/gmbinaryfile.dll
windows11-21h2-x64
3Data/midiinput.dll
windows11-21h2-x64
3Data/move.bat
windows11-21h2-x64
1Data/wallpaper.bat
windows11-21h2-x64
1Data/window.dll
windows11-21h2-x64
3DialogModule.dll
windows11-21h2-x64
3ExecuteShell.dll
windows11-21h2-x64
3FileDropper.dll
windows11-21h2-x64
3Minecraft ...io.exe
windows11-21h2-x64
3NBS Player Mode.bat
windows11-21h2-x64
3NekoPresence.dll
windows11-21h2-x64
3ffmpeg.exe
windows11-21h2-x64
3ffprobe.exe
windows11-21h2-x64
3pygml.dll
windows11-21h2-x64
3python38.dll
windows11-21h2-x64
3uninstall.exe
windows11-21h2-x64
7window_set_icon.dll
windows11-21h2-x64
3Analysis
-
max time kernel
435s -
max time network
488s -
platform
windows11-21h2_x64 -
resource
win11-20240730-en -
resource tags
arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-08-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
Minecraft.Note.Block.Studio.exe
Resource
win11-20240730-en
Behavioral task
behavioral2
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/simple.pyc
Resource
win11-20240730-en
Behavioral task
behavioral3
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/simple_py3.pyc
Resource
win11-20240730-en
Behavioral task
behavioral4
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/ufunc_config.pyc
Resource
win11-20240730-en
Behavioral task
behavioral5
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/ufunclike.pyc
Resource
win11-20240730-en
Behavioral task
behavioral6
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/ufuncs.pyc
Resource
win11-20240730-en
Behavioral task
behavioral7
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/data/pass/warnings_and_errors.pyc
Resource
win11-20240730-en
Behavioral task
behavioral8
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_generic_alias.pyc
Resource
win11-20240730-en
Behavioral task
behavioral9
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_isfile.pyc
Resource
win11-20240730-en
Behavioral task
behavioral10
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_runtime.pyc
Resource
win11-20240730-en
Behavioral task
behavioral11
Sample
Data/Python/Lib/site-packages/numpy/typing/tests/test_typing.pyc
Resource
win11-20240730-en
Behavioral task
behavioral12
Sample
Data/Python/Lib/site-packages/numpy/version.pyc
Resource
win11-20240730-en
Behavioral task
behavioral13
Sample
Data/Python/audio_export.py
Resource
win11-20240730-en
Behavioral task
behavioral14
Sample
Data/audio.dll
Resource
win11-20240730-en
Behavioral task
behavioral15
Sample
Data/file.dll
Resource
win11-20240730-en
Behavioral task
behavioral16
Sample
Data/gmbinaryfile.dll
Resource
win11-20240729-en
Behavioral task
behavioral17
Sample
Data/midiinput.dll
Resource
win11-20240730-en
Behavioral task
behavioral18
Sample
Data/move.bat
Resource
win11-20240730-en
Behavioral task
behavioral19
Sample
Data/wallpaper.bat
Resource
win11-20240730-en
Behavioral task
behavioral20
Sample
Data/window.dll
Resource
win11-20240730-en
Behavioral task
behavioral21
Sample
DialogModule.dll
Resource
win11-20240730-en
Behavioral task
behavioral22
Sample
ExecuteShell.dll
Resource
win11-20240730-en
Behavioral task
behavioral23
Sample
FileDropper.dll
Resource
win11-20240730-en
Behavioral task
behavioral24
Sample
Minecraft Note Block Studio.exe
Resource
win11-20240730-en
Behavioral task
behavioral25
Sample
NBS Player Mode.bat
Resource
win11-20240730-en
Behavioral task
behavioral26
Sample
NekoPresence.dll
Resource
win11-20240730-en
Behavioral task
behavioral27
Sample
ffmpeg.exe
Resource
win11-20240730-en
Behavioral task
behavioral28
Sample
ffprobe.exe
Resource
win11-20240730-en
Behavioral task
behavioral29
Sample
pygml.dll
Resource
win11-20240730-en
Behavioral task
behavioral30
Sample
python38.dll
Resource
win11-20240730-en
Behavioral task
behavioral31
Sample
uninstall.exe
Resource
win11-20240730-en
Behavioral task
behavioral32
Sample
window_set_icon.dll
Resource
win11-20240730-en
General
-
Target
uninstall.exe
-
Size
90KB
-
MD5
f5646188f5baf7bc59c700b7c01befa1
-
SHA1
5f5a3c36742a327e48d9f98f6438b20965ee84eb
-
SHA256
937e3c58a791330c0e035916a9966cfab6f5e9deee0d44be8d4e144073a77206
-
SHA512
285ef47515b49e235630df5d4f64fb6a394ffd4e285f2624a738d4d515ec9e85679834610d60e5a4c314124cf31bedfd41c685f8d19a690d13896a6dfb5564c7
-
SSDEEP
1536:GcVxMtkyfWqPG1QIcVdWToWw2hgHJlnqbl6W2adu7328M6huLeAyNsfBI:G4MrfWdbcDWToWNhOJlnqbl6W2aduz2E
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1356 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un_A.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1532 wrote to memory of 1356 1532 uninstall.exe 81 PID 1532 wrote to memory of 1356 1532 uninstall.exe 81 PID 1532 wrote to memory of 1356 1532 uninstall.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninstall.exe"C:\Users\Admin\AppData\Local\Temp\uninstall.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5f5646188f5baf7bc59c700b7c01befa1
SHA15f5a3c36742a327e48d9f98f6438b20965ee84eb
SHA256937e3c58a791330c0e035916a9966cfab6f5e9deee0d44be8d4e144073a77206
SHA512285ef47515b49e235630df5d4f64fb6a394ffd4e285f2624a738d4d515ec9e85679834610d60e5a4c314124cf31bedfd41c685f8d19a690d13896a6dfb5564c7