Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
03/08/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
Minecraft.exe
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
Minecraft.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Minecraft.exe
Resource
win11-20240802-en
General
-
Target
Minecraft.exe
-
Size
1.6MB
-
MD5
046a78d20889a0b96b84646b2e59729f
-
SHA1
607ecb749d947d8289fac8073f2764b94acf6b98
-
SHA256
6dfeadbd0411202222726bad50f62547246494d82acb1cb8a2a9448541cf3823
-
SHA512
7a38ab0fe23baa5a5edef05ce299a33e37a924225d8322d0f1cb7a1e5a0deae83199e52ef8371fc7489e87f99064d497658098539575b0d650beed4d979261fe
-
SSDEEP
49152:7NtWy+NF1xMO1UgHrnRAST8XrhaRY0T+nqO4P4s:Jzsbrn3T8hiVT+ne4s
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2312 icacls.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini bcastdvr.exe -
pid Process 1828 GameBarPresenceWriter.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Minecraft.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags GamePanel.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4620 javaw.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4620 javaw.exe 4620 javaw.exe 4620 javaw.exe 4620 javaw.exe 4620 javaw.exe 4620 javaw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 4620 1548 Minecraft.exe 70 PID 1548 wrote to memory of 4620 1548 Minecraft.exe 70 PID 4620 wrote to memory of 2312 4620 javaw.exe 71 PID 4620 wrote to memory of 2312 4620 javaw.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\Minecraft.exe"C:\Users\Admin\AppData\Local\Temp\Minecraft.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Xms256m -Xmx512m -jar "C:\Users\Admin\AppData\Local\Temp\Minecraft.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:2312
-
-
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
- Network Service Discovery
PID:1828
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 0000000000040268 /startuptips1⤵
- Checks SCSI registry key(s)
PID:3032
-
C:\Windows\System32\bcastdvr.exe"C:\Windows\System32\bcastdvr.exe" -ServerName:Windows.Media.Capture.Internal.BroadcastDVRServer1⤵
- Drops desktop.ini file(s)
PID:2852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5b7609f300187028b1950727d11638bd6
SHA199912fdc767487b590b571f2a8525a6eaa9e9915
SHA256c879b76cbe892cb9fb868d9ff700dadf19069dce59219baf195022d8bec486b8
SHA5127fd2d55de7e1ddf2818eecd8607636688fb3d3143821198b084f4e49d02fa1f7c9ea48dacddd88b298bf50dd8dde74f68244f79592919ef412bdcb6776c8aa86
-
Filesize
344B
MD5d141cc8e71a3351f1aacb88a74b45fa4
SHA1323cb27d8b7772b4b928a00706d4efe3b1104f52
SHA2562788675e062e1111ead50a9a05971a7c11fe6246a89f571cf9f59ed68c72bb17
SHA512315dfcf01f450b907f2cdfc9661db728789ec2440dd6985d914d024bd3c0798e602f7e230e60a8ffee8f39c95de68477d3b4def580a292e263d48bc23babae09
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c