Analysis
-
max time kernel
396s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12-03-2023 00:52
Static task
static1
Behavioral task
behavioral1
Sample
mmc-develop-win32.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
mmc-develop-win32.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
MultiMC/MultiMC.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
MultiMC/MultiMC.exe
Resource
win10v2004-20230220-en
General
-
Target
MultiMC/MultiMC.exe
-
Size
8.8MB
-
MD5
38c782c12952ecaeb3af973a7338790d
-
SHA1
3167c8152fde81d9b3aebbb41d38a607ba5b48b7
-
SHA256
4fc7abd9769e631fe1831b8b0da7b924322b77fee774dba6c5d0ccf6f69242f4
-
SHA512
e72b69bee5cf6ca2c45d8b84f128126dd1c81f03e7dfae4d03e3d906f79bb7e1f9ecad6030e4447783657e59c75017df72f590ca786edcfd2996c88345542a1a
-
SSDEEP
196608:LjeHzMAqhnF5SdEy/vgiBkxqSdXh9NWompJIwFsBEeVgVvV3rABVLVVkNWV+O8VU:OHOer/vAUpyRVgVvV3rABVLVVkNWV+On
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 4 IoCs
Processes:
MultiMC.exeMultiMC.exeMultiMC.exeMultiMC.exepid process 1988 MultiMC.exe 1908 MultiMC.exe 1296 MultiMC.exe 1656 MultiMC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
MultiMC.exetaskmgr.exepid process 1988 MultiMC.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
MultiMC.exetaskmgr.exepid process 1988 MultiMC.exe 1364 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
AUDIODG.EXEtaskmgr.exedescription pid process Token: 33 1776 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1776 AUDIODG.EXE Token: 33 1776 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1776 AUDIODG.EXE Token: SeDebugPrivilege 1364 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe 1364 taskmgr.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
MultiMC.exeMultiMC.exeMultiMC.exeMultiMC.exepid process 1988 MultiMC.exe 1988 MultiMC.exe 1988 MultiMC.exe 1908 MultiMC.exe 1296 MultiMC.exe 1656 MultiMC.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MultiMC.exedescription pid process target process PID 1988 wrote to memory of 732 1988 MultiMC.exe javaw.exe PID 1988 wrote to memory of 732 1988 MultiMC.exe javaw.exe PID 1988 wrote to memory of 732 1988 MultiMC.exe javaw.exe PID 1988 wrote to memory of 732 1988 MultiMC.exe javaw.exe PID 1988 wrote to memory of 1764 1988 MultiMC.exe javaw.exe PID 1988 wrote to memory of 1764 1988 MultiMC.exe javaw.exe PID 1988 wrote to memory of 1764 1988 MultiMC.exe javaw.exe PID 1988 wrote to memory of 1764 1988 MultiMC.exe javaw.exe PID 1988 wrote to memory of 1532 1988 MultiMC.exe javaw.exe PID 1988 wrote to memory of 1532 1988 MultiMC.exe javaw.exe PID 1988 wrote to memory of 1532 1988 MultiMC.exe javaw.exe PID 1988 wrote to memory of 1532 1988 MultiMC.exe javaw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
-
C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe"C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -Xms512m -Xmx1024m -XX:PermSize=128m -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar2⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5741⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC-0.logFilesize
35KB
MD551783c1ed7e90917ce6cafc9a5c0da13
SHA11a6f6efc0cb037bb109c290f47d12a24831d0fa7
SHA256e8d2ddf3892af62a1745ce52bdcabf075cd09bedd9503e99f708441da90e3cb0
SHA5123e23944d7dacf714d286014daca1daf4856ac5dbb73458fe4f57ffd3806a09661f4e2724add15c7d8cbe3e847df309a9c59e2244be8fa0f5557ad539c9a67b97
-
C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC-1.logFilesize
35KB
MD551783c1ed7e90917ce6cafc9a5c0da13
SHA11a6f6efc0cb037bb109c290f47d12a24831d0fa7
SHA256e8d2ddf3892af62a1745ce52bdcabf075cd09bedd9503e99f708441da90e3cb0
SHA5123e23944d7dacf714d286014daca1daf4856ac5dbb73458fe4f57ffd3806a09661f4e2724add15c7d8cbe3e847df309a9c59e2244be8fa0f5557ad539c9a67b97
-
C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC-2.logFilesize
35KB
MD551783c1ed7e90917ce6cafc9a5c0da13
SHA11a6f6efc0cb037bb109c290f47d12a24831d0fa7
SHA256e8d2ddf3892af62a1745ce52bdcabf075cd09bedd9503e99f708441da90e3cb0
SHA5123e23944d7dacf714d286014daca1daf4856ac5dbb73458fe4f57ffd3806a09661f4e2724add15c7d8cbe3e847df309a9c59e2244be8fa0f5557ad539c9a67b97
-
memory/1364-421-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1364-477-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1364-476-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1364-422-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1988-87-0x0000000000330000-0x0000000000348000-memory.dmpFilesize
96KB
-
memory/1988-91-0x0000000066C00000-0x0000000066C3E000-memory.dmpFilesize
248KB
-
memory/1988-78-0x0000000070940000-0x000000007095C000-memory.dmpFilesize
112KB
-
memory/1988-79-0x0000000068880000-0x0000000068DAF000-memory.dmpFilesize
5.2MB
-
memory/1988-80-0x000000006E940000-0x000000006E964000-memory.dmpFilesize
144KB
-
memory/1988-81-0x0000000064940000-0x0000000064954000-memory.dmpFilesize
80KB
-
memory/1988-82-0x000000006FC40000-0x000000006FD41000-memory.dmpFilesize
1.0MB
-
memory/1988-83-0x0000000061940000-0x0000000061EB5000-memory.dmpFilesize
5.5MB
-
memory/1988-84-0x0000000000020000-0x000000000002C000-memory.dmpFilesize
48KB
-
memory/1988-85-0x0000000061740000-0x0000000061771000-memory.dmpFilesize
196KB
-
memory/1988-86-0x000000006C8C0000-0x000000006C8FF000-memory.dmpFilesize
252KB
-
memory/1988-54-0x0000000000330000-0x0000000000348000-memory.dmpFilesize
96KB
-
memory/1988-88-0x0000000063400000-0x0000000063415000-memory.dmpFilesize
84KB
-
memory/1988-89-0x0000000069700000-0x0000000069894000-memory.dmpFilesize
1.6MB
-
memory/1988-90-0x0000000000E40000-0x0000000001484000-memory.dmpFilesize
6.3MB
-
memory/1988-77-0x0000000000400000-0x0000000000A1E000-memory.dmpFilesize
6.1MB
-
memory/1988-92-0x000000006A880000-0x000000006A9F6000-memory.dmpFilesize
1.5MB
-
memory/1988-94-0x0000000004F90000-0x00000000051A2000-memory.dmpFilesize
2.1MB
-
memory/1988-93-0x000000006E600000-0x000000006E674000-memory.dmpFilesize
464KB
-
memory/1988-115-0x0000000068880000-0x0000000068DAF000-memory.dmpFilesize
5.2MB
-
memory/1988-119-0x0000000061940000-0x0000000061EB5000-memory.dmpFilesize
5.5MB
-
memory/1988-126-0x0000000000E40000-0x0000000001484000-memory.dmpFilesize
6.3MB
-
memory/1988-326-0x0000000005860000-0x0000000005870000-memory.dmpFilesize
64KB
-
memory/1988-72-0x0000000004F90000-0x00000000051A2000-memory.dmpFilesize
2.1MB
-
memory/1988-62-0x0000000000400000-0x0000000000A1E000-memory.dmpFilesize
6.1MB
-
memory/1988-60-0x0000000000E40000-0x0000000001484000-memory.dmpFilesize
6.3MB
-
memory/1988-59-0x000000006C8C0000-0x000000006C8FF000-memory.dmpFilesize
252KB
-
memory/1988-589-0x0000000005860000-0x0000000005870000-memory.dmpFilesize
64KB
-
memory/1988-58-0x0000000061740000-0x0000000061771000-memory.dmpFilesize
196KB
-
memory/1988-57-0x0000000070940000-0x000000007095C000-memory.dmpFilesize
112KB
-
memory/1988-55-0x0000000000E40000-0x0000000001484000-memory.dmpFilesize
6.3MB