Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2023, 15:34

General

  • Target

    MultiMC/MultiMC.exe

  • Size

    8.8MB

  • MD5

    16d44d6924d6bb8f91cd3900439985f1

  • SHA1

    46af81c1683e8215afa138a2c684e2396555a37c

  • SHA256

    425f6bec52574ae759bb41c003b646d48a7633556ee4fdd90c0d48827504bf51

  • SHA512

    a27413890f5afc2e0e6f9d30a2e348267d6522f888548317551adf1e0ddca6022951b3899a1a675b9b9ed314b096e798a94785730bce82d4589648a47bc9fa72

  • SSDEEP

    196608:Y+sc5oZ9MQ6CJnqzF2mc28M1RSdpdrmZ5p00oxdALFeVgVvV3rZBVLVV3WV+F8VI:iccPa2mJJ0n9VgVvV3rZBVLVV3WV+F8u

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe
    "C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar
      2⤵
        PID:892
      • C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe
        "C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar
        2⤵
          PID:4916
        • C:\ProgramData\Oracle\Java\javapath\javaw.exe
          javaw -jar C:/Users/Admin/AppData/Local/Temp/MultiMC/jars/JavaCheck.jar
          2⤵
            PID:3904
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x340 0x420
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3444

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\MultiMC\translations\index_v2.json

          Filesize

          15KB

          MD5

          4d18ce01732ff1fe8305af3d74e6cb41

          SHA1

          43437da4cbc9e0e6adbc88a76e75721963c07d3b

          SHA256

          284159c2183faff37ff5659330ea42e31acc1ab105f68f9efb5faffc83ca98fe

          SHA512

          d2e9466bfeb76eb46d9d1cd144ef04c3f51512bf92b2f15d3d62344e90beeabc5b117a5afbcac860cfd4910e66f8716f59a68837bcd125851a15d548bff122af

        • memory/4644-164-0x000000006FC40000-0x000000006FD41000-memory.dmp

          Filesize

          1.0MB

        • memory/4644-163-0x000000006E940000-0x000000006E964000-memory.dmp

          Filesize

          144KB

        • memory/4644-137-0x0000000061740000-0x0000000061771000-memory.dmp

          Filesize

          196KB

        • memory/4644-138-0x000000006C8C0000-0x000000006C8FF000-memory.dmp

          Filesize

          252KB

        • memory/4644-139-0x0000000000400000-0x0000000000A1E000-memory.dmp

          Filesize

          6.1MB

        • memory/4644-149-0x0000000005420000-0x0000000005632000-memory.dmp

          Filesize

          2.1MB

        • memory/4644-154-0x0000000000400000-0x0000000000A1E000-memory.dmp

          Filesize

          6.1MB

        • memory/4644-155-0x0000000070940000-0x000000007095C000-memory.dmp

          Filesize

          112KB

        • memory/4644-156-0x0000000061740000-0x0000000061771000-memory.dmp

          Filesize

          196KB

        • memory/4644-157-0x000000006C8C0000-0x000000006C8FF000-memory.dmp

          Filesize

          252KB

        • memory/4644-159-0x0000000063400000-0x0000000063415000-memory.dmp

          Filesize

          84KB

        • memory/4644-160-0x0000000069700000-0x0000000069894000-memory.dmp

          Filesize

          1.6MB

        • memory/4644-158-0x0000000061B80000-0x0000000061B98000-memory.dmp

          Filesize

          96KB

        • memory/4644-161-0x0000000068880000-0x0000000068DAF000-memory.dmp

          Filesize

          5.2MB

        • memory/4644-162-0x0000000066C00000-0x0000000066C3E000-memory.dmp

          Filesize

          248KB

        • memory/4644-133-0x0000000001460000-0x00000000019D5000-memory.dmp

          Filesize

          5.5MB

        • memory/4644-136-0x0000000070940000-0x000000007095C000-memory.dmp

          Filesize

          112KB

        • memory/4644-166-0x0000000061DC0000-0x0000000062404000-memory.dmp

          Filesize

          6.3MB

        • memory/4644-165-0x0000000064940000-0x0000000064954000-memory.dmp

          Filesize

          80KB

        • memory/4644-167-0x0000000001460000-0x00000000019D5000-memory.dmp

          Filesize

          5.5MB

        • memory/4644-168-0x0000000000CB0000-0x0000000000CBC000-memory.dmp

          Filesize

          48KB

        • memory/4644-169-0x000000006A880000-0x000000006A9F6000-memory.dmp

          Filesize

          1.5MB

        • memory/4644-170-0x000000006E600000-0x000000006E674000-memory.dmp

          Filesize

          464KB

        • memory/4644-171-0x0000000005420000-0x0000000005632000-memory.dmp

          Filesize

          2.1MB

        • memory/4644-135-0x0000000001460000-0x00000000019D5000-memory.dmp

          Filesize

          5.5MB

        • memory/4644-184-0x0000000068880000-0x0000000068DAF000-memory.dmp

          Filesize

          5.2MB

        • memory/4644-190-0x0000000001460000-0x00000000019D5000-memory.dmp

          Filesize

          5.5MB

        • memory/4644-189-0x0000000061DC0000-0x0000000062404000-memory.dmp

          Filesize

          6.3MB

        • memory/4644-198-0x0000000006840000-0x0000000006851000-memory.dmp

          Filesize

          68KB

        • memory/4644-216-0x0000000068880000-0x0000000068DAF000-memory.dmp

          Filesize

          5.2MB

        • memory/4644-221-0x000000006E940000-0x000000006E964000-memory.dmp

          Filesize

          144KB

        • memory/4644-224-0x0000000061DC0000-0x0000000062404000-memory.dmp

          Filesize

          6.3MB

        • memory/4644-225-0x0000000001460000-0x00000000019D5000-memory.dmp

          Filesize

          5.5MB