Analysis

  • max time kernel
    390s
  • max time network
    1590s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-es
  • resource tags

    arch:x64arch:x86image:win10-20230220-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    28-02-2023 22:16

General

  • Target

    MultiMC/libLauncher_nbt++.dll.a

  • Size

    149KB

  • MD5

    6c893ff18da6543d0de29b5b4958bac9

  • SHA1

    9fe8e46e8f47274bdefc44d2ae5647648940ac32

  • SHA256

    e9de6c05b3f2e1d9a5a7ccf2db0d651914c3fefbabb8e113f1322cc99cf5e93c

  • SHA512

    7acbeb9225fa74be63d06b999dff1fcc54464519958587f8f8c035c7ca0619781736288346f1b8d4b2d81212b643a5cc7981c8b160254250a9ac9fed3c7eb6c4

  • SSDEEP

    768:6Pr973mdgwgqQViHriaNUHOw757weHXSuF9ubkKTKuDTkDZ+mVRQDmfRrl7KqulN:ur973mLa6KrsoMMBlV857kYmi

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\MultiMC\libLauncher_nbt++.dll.a
    1⤵
    • Modifies registry class
    PID:4180
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads