Analysis

  • max time kernel
    111s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/01/2023, 21:37

General

  • Target

    MultiMC/MultiMC.exe

  • Size

    8.6MB

  • MD5

    86ec72e400abe379ed8453af49bbef32

  • SHA1

    374abd6b7aa5687fc738ceee1df52be0994fd8bc

  • SHA256

    10e44003255706995674e8dfdd43ce8242ee5f8402cafc8ec01e614d7c93dfa7

  • SHA512

    846619daf0bce719aa8ce63962b5e68f498010a36608c842dd94f7235fa5ef36e35be77aba528169eb132f7971e4f6f6298b102cf49b0ed3a41e9dbbff98b4ae

  • SSDEEP

    196608:jSFXkbPNSzhxpI+nIrTGEhiKhxJunHR/OcdpIX9uVvVV5cVY7VjVMSrV4rNVVjVJ:aXWWwwdiYVvVV5cVY7VjVMSrV4rNVVj7

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe
    "C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3388

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3388-133-0x0000000001440000-0x00000000019B5000-memory.dmp

    Filesize

    5.5MB

  • memory/3388-132-0x0000000001441000-0x0000000001806000-memory.dmp

    Filesize

    3.8MB

  • memory/3388-134-0x00000000001C1000-0x00000000001C3000-memory.dmp

    Filesize

    8KB

  • memory/3388-135-0x0000000001441000-0x000000000157C000-memory.dmp

    Filesize

    1.2MB

  • memory/3388-136-0x0000000070940000-0x000000007095C000-memory.dmp

    Filesize

    112KB

  • memory/3388-137-0x0000000061740000-0x0000000061771000-memory.dmp

    Filesize

    196KB

  • memory/3388-138-0x000000006C8C0000-0x000000006C8FF000-memory.dmp

    Filesize

    252KB

  • memory/3388-140-0x0000000068880000-0x0000000068DAF000-memory.dmp

    Filesize

    5.2MB

  • memory/3388-139-0x0000000000400000-0x00000000009FB000-memory.dmp

    Filesize

    6.0MB

  • memory/3388-142-0x0000000070940000-0x000000007095C000-memory.dmp

    Filesize

    112KB

  • memory/3388-141-0x0000000001440000-0x00000000014FF000-memory.dmp

    Filesize

    764KB

  • memory/3388-143-0x0000000061740000-0x0000000061771000-memory.dmp

    Filesize

    196KB

  • memory/3388-144-0x000000006C8C0000-0x000000006C8FF000-memory.dmp

    Filesize

    252KB

  • memory/3388-145-0x0000000063400000-0x0000000063415000-memory.dmp

    Filesize

    84KB

  • memory/3388-146-0x0000000000400000-0x00000000009FB000-memory.dmp

    Filesize

    6.0MB

  • memory/3388-147-0x0000000061DC0000-0x0000000062404000-memory.dmp

    Filesize

    6.3MB

  • memory/3388-148-0x00000000053F0000-0x0000000005602000-memory.dmp

    Filesize

    2.1MB

  • memory/3388-150-0x0000000068880000-0x0000000068DAF000-memory.dmp

    Filesize

    5.2MB

  • memory/3388-151-0x0000000070940000-0x000000007095C000-memory.dmp

    Filesize

    112KB

  • memory/3388-152-0x0000000061740000-0x0000000061771000-memory.dmp

    Filesize

    196KB

  • memory/3388-154-0x0000000063400000-0x0000000063415000-memory.dmp

    Filesize

    84KB

  • memory/3388-153-0x000000006C8C0000-0x000000006C8FF000-memory.dmp

    Filesize

    252KB

  • memory/3388-155-0x0000000000400000-0x00000000009FB000-memory.dmp

    Filesize

    6.0MB

  • memory/3388-156-0x0000000061DC0000-0x0000000062404000-memory.dmp

    Filesize

    6.3MB