Analysis
-
max time kernel
599s -
max time network
428s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 19:55
General
-
Target
MinecraftModPackBedrock.exe
-
Size
447KB
-
MD5
7ffb057756968e3f079a8495fcdf3f29
-
SHA1
12f35b1e806a0246fb3d6bb7d43a86903f319a41
-
SHA256
6958e71ec05520b33c77de4fdfca9fb56c41699a0b47af066fca79e5df70eb73
-
SHA512
77c069eda9de18f967666e9ddc1daa5e3a8f14dfd01c2c5e4756b981ae879d87b8cf02fb7029f5d451ecffc951ab78e5474196d90a52c2057f2c733527ab821c
-
SSDEEP
1536:Rw+jjgnaoH9XqcnW85SbT+uIDMCLsYaZ69ImcWxoGhvvvjtTTTEKY55aaaaaaaaJ:Rw+jqa691UbT+BMrKImcWnTTT4v
Malware Config
Extracted
xenorat
127.0.0.1
Minecrafr_Mod
-
delay
5000
-
install_path
appdata
-
port
4782
-
startup_name
MinecraftIsCool
Signatures
-
Detect XenoRat Payload 2 IoCs
resource yara_rule behavioral1/memory/4612-1-0x0000000000A80000-0x0000000000AF6000-memory.dmp family_xenorat behavioral1/files/0x000700000002347d-6.dat family_xenorat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation MinecraftModPackBedrock.exe -
Executes dropped EXE 1 IoCs
pid Process 4988 MinecraftModPackBedrock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MinecraftModPackBedrock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MinecraftModPackBedrock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3092 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4612 wrote to memory of 4988 4612 MinecraftModPackBedrock.exe 82 PID 4612 wrote to memory of 4988 4612 MinecraftModPackBedrock.exe 82 PID 4612 wrote to memory of 4988 4612 MinecraftModPackBedrock.exe 82 PID 4988 wrote to memory of 3092 4988 MinecraftModPackBedrock.exe 83 PID 4988 wrote to memory of 3092 4988 MinecraftModPackBedrock.exe 83 PID 4988 wrote to memory of 3092 4988 MinecraftModPackBedrock.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\MinecraftModPackBedrock.exe"C:\Users\Admin\AppData\Local\Temp\MinecraftModPackBedrock.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Roaming\XenoManager\MinecraftModPackBedrock.exe"C:\Users\Admin\AppData\Roaming\XenoManager\MinecraftModPackBedrock.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "MinecraftIsCool" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9AE8.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3092
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f5f470e2965b765e7c01ea26fe92674e
SHA13eb9a3518ae95beb592ad893575de7dd50964e7c
SHA25631f19df246c4b2abf6e11a2d3ea489b2838373a67b935c290995a196133e5f3b
SHA512a1438093fcd68693532fc81a1be84002761aa85c6f0095cd7d9cf918008adca7ea4868fe4d47639fe0cddbda598b2db56539712e3417f7a3a48dd24d879e5891
-
Filesize
447KB
MD57ffb057756968e3f079a8495fcdf3f29
SHA112f35b1e806a0246fb3d6bb7d43a86903f319a41
SHA2566958e71ec05520b33c77de4fdfca9fb56c41699a0b47af066fca79e5df70eb73
SHA51277c069eda9de18f967666e9ddc1daa5e3a8f14dfd01c2c5e4756b981ae879d87b8cf02fb7029f5d451ecffc951ab78e5474196d90a52c2057f2c733527ab821c