Analysis

  • max time kernel
    142s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    23-03-2023 20:14

General

  • Target

    LauncherFenix-Java-8u51-Windows-i586.exe

  • Size

    35.6MB

  • MD5

    8f061e42a33d2017af3f0f7d5245d4eb

  • SHA1

    e0e42aaeedbb77a19809004a576496dcdcf99ed5

  • SHA256

    59b134a5e245582cf832732bca256a3c39b50d81ace3e2c6b37c71dfba99e077

  • SHA512

    41279f05588bda2627677402aa4e56af4eeb6c92c9804f8e5e092daa21868649ad29d64efe9059e150b29a01a8510e27781833c23d3e02d81323524d2971e1b6

  • SSDEEP

    786432:xAP94qj9fGRpAJkolSM03oq8D80oz96O4oUTXM6ioA+hxsQdmPEU5gCzL:xZqjIpANWY989zAoUOozuQd+xL

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Java-8u51-Windows-i586.exe
    "C:\Users\Admin\AppData\Local\Temp\LauncherFenix-Java-8u51-Windows-i586.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1616

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\jusched.log
    Filesize

    2KB

    MD5

    9d3593958c4889bff0223d322dac4e0f

    SHA1

    b97f85601a3fa963694e43c415712b72cac2f767

    SHA256

    16398985e371abc19257af86e13cc986e9542414068f4e1e3b08be5720d34a7e

    SHA512

    a2ddc111cce4845c646c30fa19dfaab4d9e8dc622127e3a37147d79804bdab216698aff60b5c010a064fb5d7db2e862e9b6f18398afa0fabd3bf0427218e7731

  • C:\Users\Admin\AppData\Local\Temp\jusched.log
    Filesize

    5KB

    MD5

    854e9db9c8a154ae7d17350f956cb9f1

    SHA1

    34772bd934abe545026be44430f225e01e64fce9

    SHA256

    c22b9cc92bb0dbf2a573220a80ed7d58c393cc2a444eccc4adfc04e3f1b57ba4

    SHA512

    4f4a32fe7381833f2dfb88961e5dfab54df709d613bce3d762b5e969258b650ccb21e5055fba599d9bdfe58f01288121ca7a118a895984081a8bdbfa1f35f6d4

  • memory/1616-54-0x0000000000400000-0x0000000002975000-memory.dmp
    Filesize

    37.5MB

  • memory/1616-102-0x0000000000400000-0x0000000002975000-memory.dmp
    Filesize

    37.5MB

  • memory/1616-120-0x0000000004B50000-0x0000000004B51000-memory.dmp
    Filesize

    4KB

  • memory/1616-121-0x0000000000400000-0x0000000002975000-memory.dmp
    Filesize

    37.5MB