Malware Analysis Report

2025-08-06 00:03

Sample ID 240223-nldzhafc7w
Target lucky-block-fabric-1.20.2-14.5.zip
SHA256 0d74899e40a661a55d793246c1bc4d6e526dbe5a398e9b954ff41f50ff50991d
Tags
discovery
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

0d74899e40a661a55d793246c1bc4d6e526dbe5a398e9b954ff41f50ff50991d

Threat Level: Shows suspicious behavior

The file lucky-block-fabric-1.20.2-14.5.zip was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery

Modifies file permissions

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-02-23 11:28

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-23 11:28

Reported

2024-02-23 11:29

Platform

win7-20240221-en

Max time kernel

19s

Max time network

21s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\lucky-block-fabric-1.20.2-14.5.jar

Signatures

N/A

Processes

C:\Windows\system32\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\lucky-block-fabric-1.20.2-14.5.jar

Network

N/A

Files

memory/1056-6-0x0000000002280000-0x0000000005280000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-23 11:28

Reported

2024-02-23 11:59

Platform

win10v2004-20240221-en

Max time kernel

1797s

Max time network

1172s

Command Line

java -jar C:\Users\Admin\AppData\Local\Temp\lucky-block-fabric-1.20.2-14.5.jar

Signatures

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\icacls.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2576 wrote to memory of 5016 N/A C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe C:\Windows\system32\icacls.exe
PID 2576 wrote to memory of 5016 N/A C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe C:\Windows\system32\icacls.exe

Processes

C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe

java -jar C:\Users\Admin\AppData\Local\Temp\lucky-block-fabric-1.20.2-14.5.jar

C:\Windows\system32\icacls.exe

C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M

Network

Country Destination Domain Proto
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 175.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 193.78.101.95.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 168.117.168.52.in-addr.arpa udp
NL 52.142.223.178:80 tcp

Files

memory/2576-4-0x0000013C00000000-0x0000013C01000000-memory.dmp

memory/2576-11-0x0000013C71D70000-0x0000013C71D71000-memory.dmp

C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

MD5 a8574c18b17b5d2d560ae3e66a31e478
SHA1 56208266ef2a04d5ae57a8eaaa8171cae14b753a
SHA256 f1a0ac3e35224bef6256c106eacee92395b93f0bcdc55b8398f7eac3c86ce1a2
SHA512 faf021fa6beb8acdabcf1b696e314b70ff8e07df14dd0cfaa3f3b341d8ecc6128f58ab1444915f17b60f6e7934e589eb269d148ac81569add4a44f1725755863