Analysis
-
max time kernel
22s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-es -
resource tags
arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
16/02/2023, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
TechnicLauncher.exe
Resource
win10-20220901-es
10 signatures
1200 seconds
Behavioral task
behavioral2
Sample
TechnicLauncher.exe
Resource
win7-20220812-es
9 signatures
1200 seconds
Behavioral task
behavioral3
Sample
TechnicLauncher.exe
Resource
win10v2004-20221111-es
2 signatures
1200 seconds
General
-
Target
TechnicLauncher.exe
-
Size
6.7MB
-
MD5
1c862976cb403f75c4d0a254f7d436f8
-
SHA1
6aca30f3f524eb8028b65c64cc95d4dcf8bb200e
-
SHA256
f897ccfbeba62f5e1abb3f0d7a72ab83b4b9ae3e9b2d5c4eac0b79cabd4036fd
-
SHA512
e109f829a3a8287ddcceb640543fbecfb22fead9ed237f8af0e753b54d6bfdfcbf37ca51cbc9a6544feabdb20dddf88a61e4c954dd8509b347fe4bb75ee8c96e
-
SSDEEP
98304:dNY+dGXz4c3fQy7kOd7BM0eSNbm89Wdn5ZCdqrZM75n+hb:d5e8cB7kOd7BVq89u5Z8Y4q
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 732 javaw.exe 732 javaw.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1820 wrote to memory of 732 1820 TechnicLauncher.exe 82 PID 1820 wrote to memory of 732 1820 TechnicLauncher.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\TechnicLauncher.exe"C:\Users\Admin\AppData\Local\Temp\TechnicLauncher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Djava.net.preferIPv4Stack=true -Dawt.useSystemAAFontSettings=lcd -Dswing.aatext=true -classpath "C:\Users\Admin\AppData\Local\Temp\TechnicLauncher.exe;anything" net.technicpack.launcher.LauncherMain2⤵
- Suspicious use of SetWindowsHookEx
PID:732
-