Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03-09-2024 10:50

General

  • Target

    LBP 3.14.0/datapacks/LBP3/data/bastionbuilder/functions/internal/extensions/bridge/starting_pieces/e.mcfunction

  • Size

    853B

  • MD5

    4048c88d69d8de6ecaf617a5aed8ebb6

  • SHA1

    e395d60a1e4c10811d5d05d270f8eaaa40e84d74

  • SHA256

    dd5adaf1a9d0512af5cb7fe37a532e3cc51b8c22d4e94193bf92adc427e4a8e1

  • SHA512

    768d0fd66a42e32cf3ce6bc69cb85b9cf8c584a5ad1c8cd35bcdc2e03dc79ba7c022d039b86514cee1e7f30c137474a3b7157888f4bef6c2a19fd334eba3979e

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\LBP 3.14.0\datapacks\LBP3\data\bastionbuilder\functions\internal\extensions\bridge\starting_pieces\e.mcfunction"
    1⤵
    • Modifies registry class
    PID:4476
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads