Analysis

  • max time kernel
    8s
  • max time network
    16s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 18:46

General

  • Target

    LabyMod3_Installer.jar

  • Size

    1.2MB

  • MD5

    746a78b327ca140e1f36e068fb7c711f

  • SHA1

    8475acb133ec165f2b81b3664b4fb48ebbe1aa6b

  • SHA256

    32fa0240eff609ed0ca082e0f4bc167527cbc928df0dc5dc02e679f9ef3ab4df

  • SHA512

    cc09f42262499ddfad172d1e9e3a978aed5a6dad3f75be0ea6a615eb0ff1b94857970a83078bc820b81e80b036f509496516dab524a30214bb088564dfd8e266

  • SSDEEP

    24576:INxaW18JDAm3QXBAepvuBnTJZKqOXeRNLwum43flTRBLLU4UqYDw0LK5oDIIN:IDiDlgXzuKVCUum43flFBkzqYDw/qDIc

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\LabyMod3_Installer.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1476

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1476-143-0x0000000001150000-0x0000000001151000-memory.dmp

    Filesize

    4KB

  • memory/1476-147-0x0000000001150000-0x0000000001151000-memory.dmp

    Filesize

    4KB

  • memory/1476-149-0x0000000001150000-0x0000000001151000-memory.dmp

    Filesize

    4KB