Overview
overview
3Static
static
3mineways/Mineways.exe
windows11-21h2-x64
1mineways/T...er.exe
windows11-21h2-x64
1mineways/T...er.exe
windows11-21h2-x64
1mineways/d...y.html
windows11-21h2-x64
3mineways/d...t.html
windows11-21h2-x64
3mineways/d...s.html
windows11-21h2-x64
3mineways/d...x.html
windows11-21h2-x64
3mineways/d...s.html
windows11-21h2-x64
3mineways/d...e.html
windows11-21h2-x64
3mineways/d...ipt.js
windows11-21h2-x64
3mineways/d...g.html
windows11-21h2-x64
3mineways/d...s.html
windows11-21h2-x64
3mineways/f...32.exe
windows11-21h2-x64
3mineways/mineways.bat
windows11-21h2-x64
1mineways/m...og.bat
windows11-21h2-x64
1mineways/m...ug.bat
windows11-21h2-x64
1mineways/m...ds.bat
windows11-21h2-x64
1mineways/s...map.py
windows11-21h2-x64
3mineways/s...es.bat
windows11-21h2-x64
1mineways/s...te.bat
windows11-21h2-x64
1mineways/s...eld.py
windows11-21h2-x64
3mineways/s...ker.py
windows11-21h2-x64
3mineways/s...aps.py
windows11-21h2-x64
3mineways/s...ap.bat
windows11-21h2-x64
1mineways/s...or.bat
windows11-21h2-x64
1Analysis
-
max time kernel
87s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/08/2024, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
mineways/Mineways.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
mineways/TileMaker/ChannelMixer.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
mineways/TileMaker/TileMaker.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
mineways/docs/community.html
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
mineways/docs/contact.html
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
mineways/docs/downloads.html
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
mineways/docs/index.html
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
mineways/docs/mineways.html
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
mineways/docs/reference.html
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
mineways/docs/script.js
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
mineways/docs/scripting.html
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
mineways/docs/textures.html
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
mineways/for_old_machines_Mineways32.exe
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
mineways/mineways.bat
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
mineways/mineways_debug_log.bat
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
mineways/mineways_min_debug.bat
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
mineways/mineways_without_worlds.bat
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
mineways/scripting/annotate_map.py
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
mineways/scripting/build_jgrtx_terrain_files.bat
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
mineways/scripting/export_and_annotate.bat
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
mineways/scripting/heightfield.py
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
mineways/scripting/hunk_maker.py
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
mineways/scripting/make_slice_maps.py
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
mineways/scripting/mineways_annotate_map.bat
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
mineways/scripting/register-Mineways-run-as-administrator.bat
Resource
win11-20240802-en
General
-
Target
mineways/for_old_machines_Mineways32.exe
-
Size
3.7MB
-
MD5
61cf9ff5cf455be100acb5a01f2cd354
-
SHA1
93a7538aa65b88e327cd5e23173821daa3555301
-
SHA256
e46a403ab0c0644ae081e8a77ecfcbb31e46d2027548c5f37cd0389d1baf809e
-
SHA512
649d0e7f0e6ffa4be33f4100f396b1a10525eaebf4da74711841b92ac08e8e202f92004b63392bfc7ae67c7bb16a7c1498d165cc4ae412ccc8d9b47f4d0c1e53
-
SSDEEP
49152:jXUM9dH2g7fhV7aeSNIjlHUEuPa00ffE6fT6aPguGGu9TJ/H7aZ:oM94afhVmH6iEuPEffEHwGGu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language for_old_machines_Mineways32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 56 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 for_old_machines_Mineways32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff for_old_machines_Mineways32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg for_old_machines_Mineways32.exe Key created \Registry\User\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\NotificationData for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "2" for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 for_old_machines_Mineways32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" for_old_machines_Mineways32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 3a002e803accbfb42cdb4c42b0297fe99a87c641260001002600efbe11000000dd194941ede4da012e42ddedf0e4da01e6c381eef0e4da0114000000 for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" for_old_machines_Mineways32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" for_old_machines_Mineways32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 for_old_machines_Mineways32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 for_old_machines_Mineways32.exe Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg for_old_machines_Mineways32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 444 msedge.exe 444 msedge.exe 1420 msedge.exe 1420 msedge.exe 4844 identity_helper.exe 4844 identity_helper.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1804 for_old_machines_Mineways32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1804 for_old_machines_Mineways32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 1420 1804 for_old_machines_Mineways32.exe 81 PID 1804 wrote to memory of 1420 1804 for_old_machines_Mineways32.exe 81 PID 1420 wrote to memory of 4172 1420 msedge.exe 82 PID 1420 wrote to memory of 4172 1420 msedge.exe 82 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 1776 1420 msedge.exe 83 PID 1420 wrote to memory of 444 1420 msedge.exe 84 PID 1420 wrote to memory of 444 1420 msedge.exe 84 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85 PID 1420 wrote to memory of 4632 1420 msedge.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\mineways\for_old_machines_Mineways32.exe"C:\Users\Admin\AppData\Local\Temp\mineways\for_old_machines_Mineways32.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://mineways.com/textures.html#dl2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcf2883cb8,0x7ffcf2883cc8,0x7ffcf2883cd83⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1960 /prefetch:23⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:83⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:13⤵PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:13⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:13⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:13⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2775553413200945804,9824870752480987500,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2612 /prefetch:13⤵PID:4456
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b4ae6009e2df12ce252d03722e8f4288
SHA144de96f65d69cbae416767040f887f68f8035928
SHA2567778069a1493fdb62e6326ba673f03d9a8f46bc0eea949aabbbbc00dcdaddf9d
SHA512bb810721e52c77793993470692bb2aab0466f13ed4576e4f4cfa6bc5fcfc59c13552299feb6dfd9642ea07b19a5513d90d0698d09ca1d15e0598133929c05fe1
-
Filesize
152B
MD54bf4b59c3deb1688a480f8e56aab059d
SHA1612c83e7027b3bfb0e9d2c9efad43c5318e731bb
SHA256867ab488aa793057395e9c10f237603cfb180689298871cdf0511132f9628c82
SHA5122ec6c89f9653f810e9f80f532abaff2a3c0276f6d299dce1b1eadf6a59e8072ed601a4f9835db25d4d2610482a00dd5a0852d0ef828678f5c5ed33fe64dddca9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5bb30c3e561e9edf203caa82e516cfff7
SHA1eaa845c3e0ba2d0e03db06546eb27575c7c92d56
SHA25668baf0c9a387d7c3c43e76f206d94e6d7d42077bda65f52e8b66b44032467cec
SHA512af8f81f1f9070f4b8e2f43b3b9f80e51be65d2e61510836b7bbb7bbca8b5590fef67750ba6ee34a59f5c6a7f8aaf4773a3f2325641bf7719c687358fcbe9d1cc
-
Filesize
6KB
MD5fced22484751dbce050796f97533f215
SHA126fe76a05ff642aaa59d28e95bcf49d67a322f4a
SHA25625dfcca9f353d8f40901c51fa8cee067ace46ad449e0269660d3eca2cf2f2f16
SHA512c53176c5baa904cdaff2bed4ad801f52a9932236e82a035c5d0277561730e66f6a340bccb60a07bf09ff185ffbe508e12efb6146821a8ee8de86ca4d62bee245
-
Filesize
5KB
MD5708a52115097e223e13e851667b17b0c
SHA1498f317c853fbecd3eb939e88e6406019424fd62
SHA256092066894e78783f2f694d489fdac832c9f64f8c8860f1ea6b412e207b37af26
SHA512c0e8d562c16ab3035e3b022b7726918f5c17ba5341ac6d1c1faa16506c6e4bb5b21e8b848d30aa01f87c76706bc977091202166f984eccadcdf576018c216d87
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\fead70c5-b04b-43f6-bb87-1494300c8ae4.tmp
Filesize6KB
MD51ef68596ea42c3959174fbe18bfb97d6
SHA166394d5dc086fa3ebbfa2b91b34c7856153776c1
SHA2561ce0a81aa33d9f0d499cc97b23fd07e3b3b57f93ff3eda9134a62755d9614505
SHA512f12e50c03defb2699dfb33b594d2f77536d77c02ad5a4095e412e3516ecab057b11cec75582a24ba82e49900df130732ef27db3bdec472b17a2928c68ef2010c
-
Filesize
10KB
MD55aeb8e9725d79cafc85f01c0e53e1c6e
SHA18e65d93bd10ddd481bafea6a9e9295e7dc02e26c
SHA2560b4691e4dbbba7b19404dca186168d3b3e11db86bbba7f26b17f4da0e0c3bcc3
SHA51253b4b30a82646d383cc9bd1c42cebc00cd37e391006e4193b808f6a7f061e711596c27083e970a76e62985f9d88f9d012ef44f6515d46bba1755a429e45a7e9c
-
Filesize
11KB
MD50cd05fd0b8734aabf308517e173a6a81
SHA101863a6c317b6740ad5ba74502e58325a55f67ad
SHA2566eaabcca3566e6f5b732393f1b4df5c556d16379d42ec3548044bddd2e4c6d5b
SHA5124bf13d664b7b48c01c3b79ea3fca4e67b773ec38f22af7ee183d1be51e5210cc6df5b2ee85c6c60cfcbd2a98f778ebe7a703cea9e747e38ade794d4dbbe4a405