Analysis
-
max time kernel
15s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 22:48
Behavioral task
behavioral1
Sample
minecraft.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
minecraft.exe
-
Size
397KB
-
MD5
2acb00b326f23809479fa9fa4cf6949a
-
SHA1
85e3272d4e827b4fc4fe0c4c829be27fae3d9d73
-
SHA256
3bc505fb53f8c8c37b366d5b0158e5396f6b0b664fb21973a1c02cde8c17250c
-
SHA512
71b61aa428e96151e2cd17ba2e64194dc0e93ce6a8c1d9ae5e763248961a3b98ccb33cf4b4dcee4cbe95a68a4d9131b1bbbcef87ee3aa93561f3c1a9d84b4817
-
SSDEEP
6144:MLy84u9nSO2GjZkD10BIY3rb1YfBdfpoZ3u/Ht52w6JSeiFPXmd7:Y+u9nx2GjMY3XKfd/H/9PS7
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/3232-1-0x0000000000400000-0x000000000046A000-memory.dmp modiloader_stage2 -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys minecraft.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc minecraft.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager minecraft.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys minecraft.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc minecraft.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power minecraft.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\minecraft.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\minecraft.exe" minecraft.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language minecraft.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe 3232 minecraft.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\minecraft.exe"C:\Users\Admin\AppData\Local\Temp\minecraft.exe"1⤵
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4236