Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 18:10

General

  • Target

    SKlauncher 3.0.2.jar

  • Size

    1.0MB

  • MD5

    1153ab4a5a07f5d7f0f00ed45f53ce13

  • SHA1

    ab36bd65b4d148a88882883980d1f9dfe42f739f

  • SHA256

    818a28f38f2ad04cbd1ad00dc90e657616ccacbe5ebab76e076e108fa6af30fb

  • SHA512

    158efca331810fbe0fe1079a9a5e0b942acfc7c19e5dfdcd2b28c933785ef1dd6d472bcbf436ca6227da8d8c2a1e5f49fba7f02882c1a00bc51145b02b314961

  • SSDEEP

    24576:Nc6Qu4/vKa7XKQKaikK21SHCJ3ny+SGiPsGna2tLCv/e0cU5ceV:NdTgXnKai1viny6iPHacc/e0fzV

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.2.jar"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:4088

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\flatlaf.temp\flatlaf-windows-x86_64-4139216663000.dll

          Filesize

          21KB

          MD5

          4ca3290a99adadde557930cd481d7539

          SHA1

          26034442a76131dd3d37c8f28b6e9bebc7c1fe7c

          SHA256

          dd130c68dc36bcedbe51a6b8ec3b3358a460d45952f6280e12331f48850b6b3b

          SHA512

          9341c60f92dd3f89f82555055924bdae6fcce1e4cd13a7dde5129ebdce04bae377292237a2ed6c3e7623b242e82b01c7ed1717af4d7db8ca473e9fd7b7b190d5

        • C:\Users\Admin\AppData\Roaming\.minecraft\sklauncher-fx.jar

          Filesize

          12.0MB

          MD5

          f0087d24e3b4ef2aaef3248e134b93b9

          SHA1

          d5919d15fa2ebe5300d54cacd6ac6d4ce1b4fb15

          SHA256

          de55924e15377d19c695422fc24df83020ca784c8e6433ce3662553459496fd3

          SHA512

          0e43b6d825b79bf754b0d2a563e21d3f5ed2503147b1d6a09810a24b80ab537422d1cebeecd6edffac018bd79055129a29cef3a6f69f9eb5d9ce8f8ffa68ff7a

        • memory/4088-216-0x00000000010B0000-0x00000000010B1000-memory.dmp

          Filesize

          4KB

        • memory/4088-198-0x00000000010B0000-0x00000000010B1000-memory.dmp

          Filesize

          4KB

        • memory/4088-209-0x00000000010B0000-0x00000000010B1000-memory.dmp

          Filesize

          4KB

        • memory/4088-215-0x00000000010B0000-0x00000000010B1000-memory.dmp

          Filesize

          4KB

        • memory/4088-145-0x00000000010B0000-0x00000000010B1000-memory.dmp

          Filesize

          4KB

        • memory/4088-218-0x00000000010B0000-0x00000000010B1000-memory.dmp

          Filesize

          4KB

        • memory/4088-226-0x00000000010B0000-0x00000000010B1000-memory.dmp

          Filesize

          4KB

        • memory/4088-227-0x00000000010B0000-0x00000000010B1000-memory.dmp

          Filesize

          4KB

        • memory/4088-237-0x00000000010B0000-0x00000000010B1000-memory.dmp

          Filesize

          4KB

        • memory/4088-252-0x00000000010B0000-0x00000000010B1000-memory.dmp

          Filesize

          4KB

        • memory/4088-282-0x00000000010B0000-0x00000000010B1000-memory.dmp

          Filesize

          4KB

        • memory/4088-150-0x00000000010B0000-0x00000000010B1000-memory.dmp

          Filesize

          4KB

        • memory/4088-296-0x00000000010B0000-0x00000000010B1000-memory.dmp

          Filesize

          4KB