Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2023 02:20

General

  • Target

    MultiMC/MultiMC.exe

  • Size

    8.6MB

  • MD5

    86ec72e400abe379ed8453af49bbef32

  • SHA1

    374abd6b7aa5687fc738ceee1df52be0994fd8bc

  • SHA256

    10e44003255706995674e8dfdd43ce8242ee5f8402cafc8ec01e614d7c93dfa7

  • SHA512

    846619daf0bce719aa8ce63962b5e68f498010a36608c842dd94f7235fa5ef36e35be77aba528169eb132f7971e4f6f6298b102cf49b0ed3a41e9dbbff98b4ae

  • SSDEEP

    196608:jSFXkbPNSzhxpI+nIrTGEhiKhxJunHR/OcdpIX9uVvVV5cVY7VjVMSrV4rNVVjVJ:aXWWwwdiYVvVV5cVY7VjVMSrV4rNVVj7

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe
    "C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar
      2⤵
        PID:5016
      • C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe
        "C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar
        2⤵
          PID:4016
        • C:\ProgramData\Oracle\Java\javapath\javaw.exe
          javaw -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar
          2⤵
            PID:1804
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x2f8 0x4c4
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2552

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1664-147-0x000000006C8C0000-0x000000006C8FF000-memory.dmp

          Filesize

          252KB

        • memory/1664-137-0x0000000061740000-0x0000000061771000-memory.dmp

          Filesize

          196KB

        • memory/1664-132-0x00000000015B0000-0x0000000001B25000-memory.dmp

          Filesize

          5.5MB

        • memory/1664-136-0x0000000070940000-0x000000007095C000-memory.dmp

          Filesize

          112KB

        • memory/1664-148-0x0000000005410000-0x0000000005622000-memory.dmp

          Filesize

          2.1MB

        • memory/1664-138-0x000000006C8C0000-0x000000006C8FF000-memory.dmp

          Filesize

          252KB

        • memory/1664-140-0x0000000068880000-0x0000000068DAF000-memory.dmp

          Filesize

          5.2MB

        • memory/1664-139-0x0000000000400000-0x00000000009FB000-memory.dmp

          Filesize

          6.0MB

        • memory/1664-141-0x00000000015B0000-0x0000000001B25000-memory.dmp

          Filesize

          5.5MB

        • memory/1664-142-0x0000000070940000-0x000000007095C000-memory.dmp

          Filesize

          112KB

        • memory/1664-143-0x0000000061740000-0x0000000061771000-memory.dmp

          Filesize

          196KB

        • memory/1664-150-0x0000000068880000-0x0000000068DAF000-memory.dmp

          Filesize

          5.2MB

        • memory/1664-145-0x0000000061DC0000-0x0000000062404000-memory.dmp

          Filesize

          6.3MB

        • memory/1664-146-0x0000000000400000-0x00000000009FB000-memory.dmp

          Filesize

          6.0MB

        • memory/1664-135-0x00000000015B0000-0x0000000001B25000-memory.dmp

          Filesize

          5.5MB

        • memory/1664-134-0x0000000000C81000-0x0000000000C83000-memory.dmp

          Filesize

          8KB

        • memory/1664-144-0x0000000063400000-0x0000000063415000-memory.dmp

          Filesize

          84KB

        • memory/1664-151-0x00000000015B0000-0x0000000001B25000-memory.dmp

          Filesize

          5.5MB

        • memory/1664-152-0x0000000070940000-0x000000007095C000-memory.dmp

          Filesize

          112KB

        • memory/1664-153-0x0000000061740000-0x0000000061771000-memory.dmp

          Filesize

          196KB

        • memory/1664-154-0x0000000063400000-0x0000000063415000-memory.dmp

          Filesize

          84KB

        • memory/1664-155-0x0000000061DC0000-0x0000000062404000-memory.dmp

          Filesize

          6.3MB

        • memory/1664-174-0x00000000001A0000-0x00000000001B0000-memory.dmp

          Filesize

          64KB

        • memory/1664-159-0x0000000005BB0000-0x0000000005BC1000-memory.dmp

          Filesize

          68KB

        • memory/1804-158-0x0000000000000000-mapping.dmp

        • memory/4016-157-0x0000000000000000-mapping.dmp

        • memory/5016-172-0x0000000002570000-0x0000000003570000-memory.dmp

          Filesize

          16.0MB

        • memory/5016-173-0x0000000002570000-0x0000000003570000-memory.dmp

          Filesize

          16.0MB

        • memory/5016-156-0x0000000000000000-mapping.dmp