Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2023, 22:19

General

  • Target

    SKlauncher 3.0.3.jar

  • Size

    1.0MB

  • MD5

    2946412720bc41e69a739f40af4ec7a5

  • SHA1

    44ffc7228433db5d7f887fbeb6162b1a9836690e

  • SHA256

    49a54575315801b3db29148c6136269196f9ce979b32470cd6d3900404b998d8

  • SHA512

    78b52cc7713ca0fd94a1f598a30c14cc9b43197a90623a737686ee6287c85c5a99a091f60a1a8dbc2e0450c7309a231580fd93843f92bf225fb734fe7912bd80

  • SSDEEP

    24576:LQSdkQea7LR9v6egjTnW07XtdPKwqNAXdk2pVeVqIILEmBigSFNj:LygLR9v6emb5PKDNAk2pVeUrAmBi/FNj

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.3.jar"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:4124

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\flatlaf.temp\flatlaf-windows-x86_64-4151343723000.dll

    Filesize

    21KB

    MD5

    9aced0a8f3429bd782ab051712ba4d04

    SHA1

    45d6b9039bb32b172c438113590062dde4a8aeb4

    SHA256

    1e1ac9bdc3c1542332b7804db35f742c58cd66fbee2d9fdb8ec83eaf87f580e4

    SHA512

    3609e6c7176b688882ecae1b6541945b5cff4b51209259cd4f89cac20880e55284d51b4be2f230291bcee54f8efb8e96967bf5730fecf622e9bfb01547267518

  • C:\Users\Admin\AppData\Roaming\.minecraft\sklauncher-fx.jar

    Filesize

    640KB

    MD5

    c08280b805d129fc58436b12e59134da

    SHA1

    5a9b62f2823998eea98f41c17c6ba6a09eb231a3

    SHA256

    1bdb8de2bdc73b8bbb555b1def456debec30b245ce2fc277948252024b109f53

    SHA512

    2ee676ad7065e9432aa831efa1608997991d617877b10fda8c4b2b70ff0f400f602639d8814d638324e51ea0a0ed6470306c2876bac7bf68b10d0574d47af679

  • memory/4124-217-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-218-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-194-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-206-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-210-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-211-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-145-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-193-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-224-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-242-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-253-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-256-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-257-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-284-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB

  • memory/4124-150-0x0000000000F70000-0x0000000000F71000-memory.dmp

    Filesize

    4KB