Analysis

  • max time kernel
    88s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-uk
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-uklocale:uk-uaos:windows10-2004-x64systemwindows
  • submitted
    02/08/2024, 22:17

General

  • Target

    assets/minecraft/lang/brb.json

  • Size

    3KB

  • MD5

    19398410fb343bf8dcf0bb2e179e1af2

  • SHA1

    beb1abb8c554fc12c70c51de09e4efd1c1392f8e

  • SHA256

    d46c213587ed9c49b434bb9f8f911f41719c7560af5c7030d442a590661d01fb

  • SHA512

    a00920b98b1096bd67202a54e49fcf1b45ffc8e1b7f5383cafd3e184fe0bd2b9b5a20d9e3c10e470673d4d26f3e3ad3c294339096b4aa41c22921b2b2f95cc63

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\assets\minecraft\lang\brb.json
    1⤵
    • Modifies registry class
    PID:2176
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads