Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-07-2023 01:58

General

  • Target

    MultiMC/MultiMC.exe

  • Size

    8.8MB

  • MD5

    10b40941dd02dbac7813cc40e3cc6e2d

  • SHA1

    71084b48df3e6b5bcbbd378357d8281590b77570

  • SHA256

    1270bdb5e8954badd8bd2871623be85960389b9717ae8a144816bc16574e5be9

  • SHA512

    f484fb76afdd42994634c0325e2201984b9c1e4d3fa53865d2d44156b3ec5493df9eb46ef04e09f880acc2a8543da7de213dd5589d6b393099950c3f18e6fcda

  • SSDEEP

    196608:VAMUquwkaVtI8a2j5pAnZcOaIoM/rsW49W0PUAiGLVUVPVsPd5V/VVHfVmt8VYUS:TUquZ7c5p9UUXVUVPVsPd5V/VVHfVmtR

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe
    "C:\Users\Admin\AppData\Local\Temp\MultiMC\MultiMC.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1340

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1340-133-0x00000000014B0000-0x0000000001A25000-memory.dmp

    Filesize

    5.5MB

  • memory/1340-135-0x00000000014B0000-0x0000000001A25000-memory.dmp

    Filesize

    5.5MB

  • memory/1340-136-0x0000000070940000-0x000000007095C000-memory.dmp

    Filesize

    112KB

  • memory/1340-137-0x0000000061740000-0x0000000061771000-memory.dmp

    Filesize

    196KB

  • memory/1340-138-0x000000006C8C0000-0x000000006C8FF000-memory.dmp

    Filesize

    252KB

  • memory/1340-139-0x0000000000400000-0x0000000000A22000-memory.dmp

    Filesize

    6.1MB

  • memory/1340-148-0x0000000005430000-0x0000000005642000-memory.dmp

    Filesize

    2.1MB

  • memory/1340-153-0x0000000000400000-0x0000000000A22000-memory.dmp

    Filesize

    6.1MB

  • memory/1340-154-0x0000000070940000-0x000000007095C000-memory.dmp

    Filesize

    112KB

  • memory/1340-155-0x0000000061740000-0x0000000061771000-memory.dmp

    Filesize

    196KB

  • memory/1340-156-0x0000000061B80000-0x0000000061B98000-memory.dmp

    Filesize

    96KB

  • memory/1340-157-0x000000006C8C0000-0x000000006C8FF000-memory.dmp

    Filesize

    252KB

  • memory/1340-158-0x0000000063400000-0x0000000063415000-memory.dmp

    Filesize

    84KB

  • memory/1340-159-0x0000000068880000-0x0000000068DAF000-memory.dmp

    Filesize

    5.2MB

  • memory/1340-160-0x0000000069700000-0x0000000069894000-memory.dmp

    Filesize

    1.6MB

  • memory/1340-161-0x0000000066C00000-0x0000000066C3E000-memory.dmp

    Filesize

    248KB

  • memory/1340-162-0x000000006E940000-0x000000006E964000-memory.dmp

    Filesize

    144KB

  • memory/1340-163-0x0000000061DC0000-0x0000000062404000-memory.dmp

    Filesize

    6.3MB

  • memory/1340-164-0x0000000064940000-0x0000000064954000-memory.dmp

    Filesize

    80KB

  • memory/1340-165-0x000000006FC40000-0x000000006FD41000-memory.dmp

    Filesize

    1.0MB

  • memory/1340-166-0x00000000014B0000-0x0000000001A25000-memory.dmp

    Filesize

    5.5MB

  • memory/1340-168-0x000000006A880000-0x000000006A9F6000-memory.dmp

    Filesize

    1.5MB

  • memory/1340-167-0x00000000001C0000-0x00000000001CC000-memory.dmp

    Filesize

    48KB

  • memory/1340-169-0x000000006E600000-0x000000006E674000-memory.dmp

    Filesize

    464KB

  • memory/1340-170-0x0000000005430000-0x0000000005642000-memory.dmp

    Filesize

    2.1MB