Overview
overview
3Static
static
1MCC Dodgeb...uv.zip
windows7-x64
1MCC Dodgeb...uv.zip
windows10-2004-x64
1by Vitruv_...ids.gz
windows7-x64
3by Vitruv_...ids.gz
windows10-2004-x64
3by Vitruv_...end.gz
windows7-x64
3by Vitruv_...end.gz
windows10-2004-x64
3by Vitruv_...7.json
windows7-x64
3by Vitruv_...7.json
windows10-2004-x64
3by Vitruv_...f.json
windows7-x64
3by Vitruv_...f.json
windows10-2004-x64
3by Vitruv_...ids.gz
windows7-x64
3by Vitruv_...ids.gz
windows10-2004-x64
3by Vitruv_...ard.gz
windows7-x64
3by Vitruv_...ard.gz
windows10-2004-x64
3by Vitruv_...d.json
windows7-x64
3by Vitruv_...d.json
windows10-2004-x64
3by Vitruv_...k.json
windows7-x64
3by Vitruv_...k.json
windows10-2004-x64
3by Vitruv_...nction
windows7-x64
3by Vitruv_...nction
windows10-2004-x64
3by Vitruv_...nction
windows7-x64
3by Vitruv_...nction
windows10-2004-x64
3by Vitruv_...nction
windows7-x64
3by Vitruv_...nction
windows10-2004-x64
3by Vitruv_...nction
windows7-x64
3by Vitruv_...nction
windows10-2004-x64
3by Vitruv_...nction
windows7-x64
3by Vitruv_...nction
windows10-2004-x64
3by Vitruv_...nction
windows7-x64
3by Vitruv_...nction
windows10-2004-x64
3by Vitruv_...nction
windows7-x64
3by Vitruv_...nction
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
MCC Dodgebolt Remake 1 by Vitruv.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
MCC Dodgebolt Remake 1 by Vitruv.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
by Vitruv_/DIM-1/data/raids.gz
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
by Vitruv_/DIM-1/data/raids.gz
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
by Vitruv_/DIM1/data/raids_end.gz
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
by Vitruv_/DIM1/data/raids_end.gz
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
by Vitruv_/advancements/4ce875ea-ee32-4e68-bc36-9f0b04b100b7.json
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
by Vitruv_/advancements/4ce875ea-ee32-4e68-bc36-9f0b04b100b7.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
by Vitruv_/advancements/f0a296ad-383d-4ddc-a388-586f3304767f.json
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
by Vitruv_/advancements/f0a296ad-383d-4ddc-a388-586f3304767f.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
by Vitruv_/data/raids.gz
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
by Vitruv_/data/raids.gz
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
by Vitruv_/data/scoreboard.gz
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
by Vitruv_/data/scoreboard.gz
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/minecraft/tags/functions/load.json
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/minecraft/tags/functions/load.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/minecraft/tags/functions/tick.json
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/minecraft/tags/functions/tick.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/setup/functions/load.mcfunction
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/setup/functions/load.mcfunction
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/setup/functions/tick.mcfunction
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/setup/functions/tick.mcfunction
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/system/functions/arrow_manager.mcfunction
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/system/functions/arrow_manager.mcfunction
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/system/functions/arrow_pickup.mcfunction
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/system/functions/arrow_pickup.mcfunction
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/system/functions/color_settings_a.mcfunction
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/system/functions/color_settings_a.mcfunction
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/system/functions/color_settings_b.mcfunction
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/system/functions/color_settings_b.mcfunction
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/system/functions/end_game.mcfunction
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
by Vitruv_/datapacks/MCC Dodgebolt/data/system/functions/end_game.mcfunction
Resource
win10v2004-20240802-en
General
-
Target
by Vitruv_/datapacks/MCC Dodgebolt/data/minecraft/tags/functions/load.json
-
Size
59B
-
MD5
344784c81d996ce13884a46cb121e024
-
SHA1
d99f2abd7f1b53db1ec6502ecf25bbce5d27d01d
-
SHA256
1b6621b05283cb899e850ae45c262b67530818ed18768785e6c46caefb07d917
-
SHA512
aef7527c364502b3a45f05229f0397755b76d9cc81f6de7f62f36b2ea710e1b8203ddc81cb90b3bd1abf8fee0ef400234c6a3697ce173078d670cfdde5132d69
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2168 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2168 AcroRd32.exe 2168 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2864 2632 cmd.exe 31 PID 2632 wrote to memory of 2864 2632 cmd.exe 31 PID 2632 wrote to memory of 2864 2632 cmd.exe 31 PID 2864 wrote to memory of 2168 2864 rundll32.exe 32 PID 2864 wrote to memory of 2168 2864 rundll32.exe 32 PID 2864 wrote to memory of 2168 2864 rundll32.exe 32 PID 2864 wrote to memory of 2168 2864 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\by Vitruv_\datapacks\MCC Dodgebolt\data\minecraft\tags\functions\load.json"1⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\by Vitruv_\datapacks\MCC Dodgebolt\data\minecraft\tags\functions\load.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\by Vitruv_\datapacks\MCC Dodgebolt\data\minecraft\tags\functions\load.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52c0ab8d27c7fafa6074c54d4392dedaf
SHA11b8c511fe9385beece81ed1a2b2be6c12bdb8d29
SHA256de8480aba936dd09b4555dd035689fce8cca7ff3fae2ea29a1eb9623b29a4440
SHA5128fc1506f0c7bd597c6e1d70c999aea85bcb7844f79cd2eac97cdf67a2d3c2105e871a938edb770912465119a14ea2c4f196f08720103a15c66cf7cafffbe29da