Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    45s
  • max time network
    75s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/04/2023, 08:58

General

  • Target

    MultiMC/MultiMC.exe

  • Size

    8.8MB

  • MD5

    38c782c12952ecaeb3af973a7338790d

  • SHA1

    3167c8152fde81d9b3aebbb41d38a607ba5b48b7

  • SHA256

    4fc7abd9769e631fe1831b8b0da7b924322b77fee774dba6c5d0ccf6f69242f4

  • SHA512

    e72b69bee5cf6ca2c45d8b84f128126dd1c81f03e7dfae4d03e3d906f79bb7e1f9ecad6030e4447783657e59c75017df72f590ca786edcfd2996c88345542a1a

  • SSDEEP

    196608:LjeHzMAqhnF5SdEy/vgiBkxqSdXh9NWompJIwFsBEeVgVvV3rABVLVVkNWV+O8VU:OHOer/vAUpyRVgVvV3rABVLVVkNWV+On

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe
    "C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar
      2⤵
        PID:1660
      • C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe
        "C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar
        2⤵
          PID:108
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x514
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1984

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\MultiMC\translations\index_v2.json

        Filesize

        15KB

        MD5

        4d18ce01732ff1fe8305af3d74e6cb41

        SHA1

        43437da4cbc9e0e6adbc88a76e75721963c07d3b

        SHA256

        284159c2183faff37ff5659330ea42e31acc1ab105f68f9efb5faffc83ca98fe

        SHA512

        d2e9466bfeb76eb46d9d1cd144ef04c3f51512bf92b2f15d3d62344e90beeabc5b117a5afbcac860cfd4910e66f8716f59a68837bcd125851a15d548bff122af

      • memory/108-121-0x0000000000230000-0x0000000000231000-memory.dmp

        Filesize

        4KB

      • memory/1388-91-0x0000000066C00000-0x0000000066C3E000-memory.dmp

        Filesize

        248KB

      • memory/1388-86-0x000000006C8C0000-0x000000006C8FF000-memory.dmp

        Filesize

        252KB

      • memory/1388-59-0x000000006C8C0000-0x000000006C8FF000-memory.dmp

        Filesize

        252KB

      • memory/1388-60-0x0000000000E80000-0x00000000014C4000-memory.dmp

        Filesize

        6.3MB

      • memory/1388-62-0x0000000000400000-0x0000000000A1E000-memory.dmp

        Filesize

        6.1MB

      • memory/1388-72-0x0000000004F00000-0x0000000005112000-memory.dmp

        Filesize

        2.1MB

      • memory/1388-77-0x0000000000400000-0x0000000000A1E000-memory.dmp

        Filesize

        6.1MB

      • memory/1388-78-0x0000000070940000-0x000000007095C000-memory.dmp

        Filesize

        112KB

      • memory/1388-79-0x0000000068880000-0x0000000068DAF000-memory.dmp

        Filesize

        5.2MB

      • memory/1388-80-0x000000006E940000-0x000000006E964000-memory.dmp

        Filesize

        144KB

      • memory/1388-81-0x0000000064940000-0x0000000064954000-memory.dmp

        Filesize

        80KB

      • memory/1388-82-0x000000006FC40000-0x000000006FD41000-memory.dmp

        Filesize

        1.0MB

      • memory/1388-83-0x0000000061940000-0x0000000061EB5000-memory.dmp

        Filesize

        5.5MB

      • memory/1388-57-0x0000000070940000-0x000000007095C000-memory.dmp

        Filesize

        112KB

      • memory/1388-85-0x0000000061740000-0x0000000061771000-memory.dmp

        Filesize

        196KB

      • memory/1388-94-0x0000000004F00000-0x0000000005112000-memory.dmp

        Filesize

        2.1MB

      • memory/1388-87-0x0000000000330000-0x0000000000348000-memory.dmp

        Filesize

        96KB

      • memory/1388-88-0x0000000063400000-0x0000000063415000-memory.dmp

        Filesize

        84KB

      • memory/1388-89-0x0000000069700000-0x0000000069894000-memory.dmp

        Filesize

        1.6MB

      • memory/1388-90-0x0000000000E80000-0x00000000014C4000-memory.dmp

        Filesize

        6.3MB

      • memory/1388-54-0x0000000000330000-0x0000000000348000-memory.dmp

        Filesize

        96KB

      • memory/1388-92-0x000000006A880000-0x000000006A9F6000-memory.dmp

        Filesize

        1.5MB

      • memory/1388-58-0x0000000061740000-0x0000000061771000-memory.dmp

        Filesize

        196KB

      • memory/1388-93-0x000000006E600000-0x000000006E674000-memory.dmp

        Filesize

        464KB

      • memory/1388-84-0x0000000000020000-0x000000000002C000-memory.dmp

        Filesize

        48KB

      • memory/1388-55-0x0000000000E80000-0x00000000014C4000-memory.dmp

        Filesize

        6.3MB

      • memory/1388-131-0x0000000070940000-0x000000007095C000-memory.dmp

        Filesize

        112KB

      • memory/1388-144-0x0000000068880000-0x0000000068DAF000-memory.dmp

        Filesize

        5.2MB

      • memory/1388-145-0x000000006E940000-0x000000006E964000-memory.dmp

        Filesize

        144KB

      • memory/1388-148-0x0000000061940000-0x0000000061EB5000-memory.dmp

        Filesize

        5.5MB

      • memory/1388-154-0x0000000069700000-0x0000000069894000-memory.dmp

        Filesize

        1.6MB

      • memory/1388-155-0x0000000000E80000-0x00000000014C4000-memory.dmp

        Filesize

        6.3MB

      • memory/1388-159-0x0000000004F00000-0x0000000005112000-memory.dmp

        Filesize

        2.1MB

      • memory/1388-160-0x0000000061F00000-0x0000000061F11000-memory.dmp

        Filesize

        68KB

      • memory/1388-161-0x000000006C600000-0x000000006C615000-memory.dmp

        Filesize

        84KB

      • memory/1388-162-0x000000006E840000-0x000000006E852000-memory.dmp

        Filesize

        72KB

      • memory/1388-163-0x00000000626C0000-0x0000000062706000-memory.dmp

        Filesize

        280KB

      • memory/1388-164-0x00000000016B0000-0x00000000016C0000-memory.dmp

        Filesize

        64KB

      • memory/1388-165-0x0000000067740000-0x000000006779F000-memory.dmp

        Filesize

        380KB

      • memory/1388-166-0x0000000066AC0000-0x0000000066AD0000-memory.dmp

        Filesize

        64KB

      • memory/1388-167-0x0000000000400000-0x0000000000A1E000-memory.dmp

        Filesize

        6.1MB

      • memory/1388-169-0x0000000068880000-0x0000000068DAF000-memory.dmp

        Filesize

        5.2MB

      • memory/1388-173-0x0000000061940000-0x0000000061EB5000-memory.dmp

        Filesize

        5.5MB

      • memory/1388-260-0x00000000032B0000-0x00000000032C0000-memory.dmp

        Filesize

        64KB

      • memory/1388-315-0x00000000032B0000-0x00000000032C0000-memory.dmp

        Filesize

        64KB