Analysis

  • max time kernel
    13s
  • max time network
    14s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 03:15

General

  • Target

    OceanMinecraft.exe

  • Size

    7.7MB

  • MD5

    fb9c6da24b7b3008a5f51945d355dbeb

  • SHA1

    881fbd7805fd2b674a96124cd9bfcf3cc3ba42a0

  • SHA256

    47149b40b3904054ec00d226a3289176bf9d43122d01c9626147fa8cd8f02d90

  • SHA512

    9f42bbf4892f3ea4a2c297b28df7ffb42b87e60b11a94fe0e1ebbef24bcb13353357ac4e06b03c910590830d1ddff04b250de6f5adb46b46037ec2a36eebd8bc

  • SSDEEP

    196608:hdrYRZU8QNZv5te22VCQmisdryzZNcObv:bGi8Q75te2SPmj1yzZNcOj

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OceanMinecraft.exe
    "C:\Users\Admin\AppData\Local\Temp\OceanMinecraft.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4072

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4072-0-0x0000000140C74000-0x0000000140EAE000-memory.dmp

          Filesize

          2.2MB

        • memory/4072-2-0x00007FF9F6F40000-0x00007FF9F6F42000-memory.dmp

          Filesize

          8KB

        • memory/4072-8-0x0000000140000000-0x0000000141658000-memory.dmp

          Filesize

          22.3MB

        • memory/4072-3-0x0000000140000000-0x0000000141658000-memory.dmp

          Filesize

          22.3MB

        • memory/4072-1-0x00007FF9F6F30000-0x00007FF9F6F32000-memory.dmp

          Filesize

          8KB

        • memory/4072-9-0x0000000140000000-0x0000000141658000-memory.dmp

          Filesize

          22.3MB

        • memory/4072-10-0x0000000140C74000-0x0000000140EAE000-memory.dmp

          Filesize

          2.2MB

        • memory/4072-11-0x0000000140000000-0x0000000141658000-memory.dmp

          Filesize

          22.3MB