Analysis

  • max time kernel
    591s
  • max time network
    399s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20-03-2023 20:19

General

  • Target

    MultiMC/MultiMC.exe

  • Size

    8.8MB

  • MD5

    38c782c12952ecaeb3af973a7338790d

  • SHA1

    3167c8152fde81d9b3aebbb41d38a607ba5b48b7

  • SHA256

    4fc7abd9769e631fe1831b8b0da7b924322b77fee774dba6c5d0ccf6f69242f4

  • SHA512

    e72b69bee5cf6ca2c45d8b84f128126dd1c81f03e7dfae4d03e3d906f79bb7e1f9ecad6030e4447783657e59c75017df72f590ca786edcfd2996c88345542a1a

  • SSDEEP

    196608:LjeHzMAqhnF5SdEy/vgiBkxqSdXh9NWompJIwFsBEeVgVvV3rABVLVVkNWV+O8VU:OHOer/vAUpyRVgVvV3rABVLVVkNWV+On

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe
    "C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/364-54-0x0000000000330000-0x0000000000348000-memory.dmp
    Filesize

    96KB

  • memory/364-55-0x0000000000DC0000-0x0000000001404000-memory.dmp
    Filesize

    6.3MB

  • memory/364-57-0x0000000070940000-0x000000007095C000-memory.dmp
    Filesize

    112KB

  • memory/364-59-0x000000006C8C0000-0x000000006C8FF000-memory.dmp
    Filesize

    252KB

  • memory/364-58-0x0000000061740000-0x0000000061771000-memory.dmp
    Filesize

    196KB

  • memory/364-60-0x0000000000DC0000-0x0000000001404000-memory.dmp
    Filesize

    6.3MB

  • memory/364-62-0x0000000000400000-0x0000000000A1E000-memory.dmp
    Filesize

    6.1MB

  • memory/364-72-0x0000000004E90000-0x00000000050A2000-memory.dmp
    Filesize

    2.1MB

  • memory/364-77-0x0000000000400000-0x0000000000A1E000-memory.dmp
    Filesize

    6.1MB

  • memory/364-78-0x0000000070940000-0x000000007095C000-memory.dmp
    Filesize

    112KB

  • memory/364-79-0x0000000068880000-0x0000000068DAF000-memory.dmp
    Filesize

    5.2MB

  • memory/364-81-0x0000000064940000-0x0000000064954000-memory.dmp
    Filesize

    80KB

  • memory/364-80-0x000000006E940000-0x000000006E964000-memory.dmp
    Filesize

    144KB

  • memory/364-82-0x000000006FC40000-0x000000006FD41000-memory.dmp
    Filesize

    1.0MB

  • memory/364-83-0x0000000061940000-0x0000000061EB5000-memory.dmp
    Filesize

    5.5MB

  • memory/364-84-0x0000000000020000-0x000000000002C000-memory.dmp
    Filesize

    48KB

  • memory/364-85-0x0000000061740000-0x0000000061771000-memory.dmp
    Filesize

    196KB

  • memory/364-87-0x0000000000330000-0x0000000000348000-memory.dmp
    Filesize

    96KB

  • memory/364-86-0x000000006C8C0000-0x000000006C8FF000-memory.dmp
    Filesize

    252KB

  • memory/364-88-0x0000000063400000-0x0000000063415000-memory.dmp
    Filesize

    84KB

  • memory/364-89-0x0000000069700000-0x0000000069894000-memory.dmp
    Filesize

    1.6MB

  • memory/364-90-0x0000000000DC0000-0x0000000001404000-memory.dmp
    Filesize

    6.3MB

  • memory/364-91-0x0000000066C00000-0x0000000066C3E000-memory.dmp
    Filesize

    248KB

  • memory/364-92-0x000000006A880000-0x000000006A9F6000-memory.dmp
    Filesize

    1.5MB

  • memory/364-93-0x000000006E600000-0x000000006E674000-memory.dmp
    Filesize

    464KB

  • memory/364-94-0x0000000004E90000-0x00000000050A2000-memory.dmp
    Filesize

    2.1MB