| File name: | hack tool for minecraft.exe |
| Full analysis: | https://app.any.run/tasks/0b174c8a-67fa-4fea-9fb3-186cc9d890c4 |
| Verdict: | Malicious activity |
| Analysis date: | December 10, 2023, 05:03:04 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 1FF8649E8F8D0652D583B9A648161D3F |
| SHA1: | 3441FF983221742ED460F8310E49203B5DC59A15 |
| SHA256: | 9F3C538A1118F82D49A993967C520BE4C7F14AD994EB17C4D778E5D7F32241A7 |
| SSDEEP: | 12288:2w1pOfl/oUzs8vwfzNquSgkE9tSF/aXx6:3po/oUNwfpqVrktOc6 |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (63.1) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (23.8) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.6) |
| .exe | | | Win32 Executable (generic) (3.8) |
| .exe | | | Generic Win/DOS Executable (1.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:10:26 00:50:34+02:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 48 |
| CodeSize: | 428544 |
| InitializedDataSize: | 2560 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x6a97e |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 37.0.2.5583 |
| ProductVersionNumber: | 37.0.2.5583 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | Firefox |
| FileVersion: | 37.0.2.5583 |
| InternalName: | JigsawRansomware.exe |
| LegalCopyright: | Copyright 1999-2012 Firefox and Mozzilla developers. All rights reserved. |
| LegalTrademarks: | - |
| OriginalFileName: | JigsawRansomware.exe |
| ProductName: | Firefox |
| ProductVersion: | 37.0.2.5583 |
| AssemblyVersion: | 37.0.2.5583 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2864 | "C:\Users\admin\Desktop\avast_decryptor_jigsaw.exe" | C:\Users\admin\Desktop\avast_decryptor_jigsaw.exe | explorer.exe | ||||||||||||
User: admin Company: AVAST Software Integrity Level: MEDIUM Description: Ransomware Decryptor Exit code: 0 Version: 1.0.0.688 Modules
| |||||||||||||||
| 5432 | "C:\Users\admin\Desktop\hack tool for minecraft.exe" | C:\Users\admin\Desktop\hack tool for minecraft.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Firefox Exit code: 0 Version: 37.0.2.5583 Modules
| |||||||||||||||
| 5772 | "C:\Users\admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\admin\Desktop\hack?tool?for?minecraft.exe | C:\Users\admin\AppData\Local\Drpbx\drpbx.exe | hack tool for minecraft.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Firefox Exit code: 0 Version: 37.0.2.5583 Modules
| |||||||||||||||
| (PID) Process: | (5432) hack tool for minecraft.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (5432) hack tool for minecraft.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (5432) hack tool for minecraft.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (5432) hack tool for minecraft.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5432 | hack tool for minecraft.exe | C:\Users\admin\AppData\Local\Drpbx\drpbx.exe | executable | |
MD5:1FF8649E8F8D0652D583B9A648161D3F | SHA256:9F3C538A1118F82D49A993967C520BE4C7F14AD994EB17C4D778E5D7F32241A7 | |||
| 5772 | drpbx.exe | C:\Users\admin\Desktop\developkingdom.png.fun | binary | |
MD5:0DD4F46F0D432EFE1EB0F98A2EDDB845 | SHA256:04AA762A1E0562FE60C372DBD7BADE0C04FD83A7EE90E5A91B1C7D5331F71588 | |||
| 5432 | hack tool for minecraft.exe | C:\Users\admin\AppData\Roaming\Frfx\firefox.exe | executable | |
MD5:1FF8649E8F8D0652D583B9A648161D3F | SHA256:9F3C538A1118F82D49A993967C520BE4C7F14AD994EB17C4D778E5D7F32241A7 | |||
| 5432 | hack tool for minecraft.exe | C:\Users\admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\hack tool for minecraft.exe.log | text | |
MD5:7BBA658A9241C70ACB49137516C3D0A2 | SHA256:4302D33D36311F70811394BB5167CB5493B6B182FF7040B8827226F502F5A70D | |||
| 5772 | drpbx.exe | C:\ProgramData\Microsoft\User Account Pictures\admin.dat.fun | binary | |
MD5:CFDAE8214D34112DBEE6587664059558 | SHA256:33088CB514406F31E3D96A92C03294121EE9F24E176F7062625C2B36BEE7A325 | |||
| 5772 | drpbx.exe | C:\Users\admin\Desktop\fullylimited.rtf.fun | binary | |
MD5:7C47B68D054367C165D0EEB275928CC3 | SHA256:838DDAD956D4E411247C43F83905F0E950F0642408762208DE696A740F1D85CD | |||
| 5772 | drpbx.exe | C:\Users\admin\Desktop\givenoct.jpg.fun | binary | |
MD5:E6F8768F0E9D49BD2C793490D296B744 | SHA256:B701E2D1ACFDB7E9EEE446790C7CB17C25804EE76C157270CB751D830CB0851B | |||
| 5772 | drpbx.exe | C:\Users\admin\Downloads\faqdistrict.png.fun | binary | |
MD5:AC018644C1CB03A8A04E8813671BBA40 | SHA256:40A8D764DF801F53F28CB4F50A853AA37E16BEE4595643E47C5CF0C17A63C916 | |||
| 5772 | drpbx.exe | C:\Users\admin\Documents\monitoringemergency.rtf.fun | binary | |
MD5:3513E396EED9946AF0E6399D58940204 | SHA256:A4619CEF258388930D9A523E777855777283A48AF9C2665862E93B1C8AF15EDF | |||
| 5772 | drpbx.exe | C:\Users\admin\Documents\downloadsrequires.rtf.fun | binary | |
MD5:EAAA228408DC31AA88135796B157B819 | SHA256:8689813EBE093528FDE0DE405FD6A0D2098A4FF4FD8B1D4B2B119C970F00D5A7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3344 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | binary | 471 b | unknown |
4288 | SIHClient.exe | GET | 200 | 88.221.125.143:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | binary | 418 b | unknown |
4288 | SIHClient.exe | GET | 200 | 88.221.125.143:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | binary | 409 b | unknown |
6336 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA177el9ggmWelJjG4vdGL0%3D | unknown | binary | 471 b | unknown |
2344 | svchost.exe | GET | 200 | 2.16.164.72:80 | http://crl.microsoft.com/pki/crl/products/MicWinPCA_2010-07-06.crl | unknown | binary | 552 b | unknown |
2344 | svchost.exe | GET | 200 | 2.16.164.72:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | binary | 1.11 Kb | unknown |
2344 | svchost.exe | GET | 200 | 88.221.125.143:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl | unknown | binary | 814 b | unknown |
2344 | svchost.exe | GET | 200 | 88.221.125.143:80 | http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl | unknown | binary | 1.05 Kb | unknown |
2344 | svchost.exe | GET | 200 | 2.16.164.72:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | binary | 824 b | unknown |
2152 | OfficeClickToRun.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D | unknown | binary | 471 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3764 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
3344 | svchost.exe | 20.190.159.64:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3344 | svchost.exe | 192.229.221.95:80 | — | EDGECAST | US | whitelisted |
6336 | backgroundTaskHost.exe | 20.105.99.58:443 | arc.msn.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
6336 | backgroundTaskHost.exe | 192.229.221.95:80 | — | EDGECAST | US | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4288 | SIHClient.exe | 40.127.169.103:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4288 | SIHClient.exe | 88.221.125.143:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
4288 | SIHClient.exe | 13.95.31.18:443 | fe3cr.delivery.mp.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
login.live.com |
| whitelisted |
arc.msn.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |