Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2024 22:25

General

  • Target

    Technic Launcher 1.0.1.3.jar

  • Size

    568KB

  • MD5

    7e9e067342851d363f327d42d9998152

  • SHA1

    c90dec145040bde4140bdaf175509ea2c105fc27

  • SHA256

    8804447531713d7847cc0abf12497254a4239b112bd3e25037534d199c3032eb

  • SHA512

    0c221f53201bbb93ba1bff4a7a240abcfa3c9cd8108d4d4284782299ebba05747c5e57e9d7fa893c3dd8f17a556be994aed2601c8ee564dae9a246b342fb0c52

  • SSDEEP

    12288:+Q6/aJOUaKFMTaEL5FV4PzfHg1FCJgsM54K3JAtCAuHD1gp9:+Q6SJ63aSFVMA/CGsgSttuJgp9

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\Technic Launcher 1.0.1.3.jar"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:2944
    • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
      java -Xmx1024m -jar "C:/Users/Admin/AppData/Local/Temp/Technic Launcher 1.0.1.3.jar"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:3520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    61d43a2f530a1462dcaac6f638a0aba6

    SHA1

    91485e7fe2b956d040f6dc1913cf1c3363ce4a55

    SHA256

    ac2c4d447c3c9993a9b31f696f26e1a8ceb20cd4090101cbb942b82f4334e4a8

    SHA512

    7970772b73be5e1025824171872d3d6d1b7891e2bf90f1e43ea0f3edc1d5f95878a0ab503ac432e5354e42892e7298947620574987607952380ed14e7a3f194d

  • memory/536-6-0x0000023D06110000-0x0000023D07110000-memory.dmp

    Filesize

    16.0MB

  • memory/536-17-0x0000023D05360000-0x0000023D05361000-memory.dmp

    Filesize

    4KB

  • memory/536-29-0x0000023D05360000-0x0000023D05361000-memory.dmp

    Filesize

    4KB

  • memory/3520-36-0x00000228E6960000-0x00000228E7960000-memory.dmp

    Filesize

    16.0MB

  • memory/3520-40-0x00000228E4F50000-0x00000228E4F51000-memory.dmp

    Filesize

    4KB

  • memory/3520-45-0x00000228E4F50000-0x00000228E4F51000-memory.dmp

    Filesize

    4KB

  • memory/3520-52-0x00000228E4F50000-0x00000228E4F51000-memory.dmp

    Filesize

    4KB

  • memory/3520-53-0x00000228E4F50000-0x00000228E4F51000-memory.dmp

    Filesize

    4KB

  • memory/3520-68-0x00000228E4F50000-0x00000228E4F51000-memory.dmp

    Filesize

    4KB

  • memory/3520-70-0x00000228E6960000-0x00000228E7960000-memory.dmp

    Filesize

    16.0MB

  • memory/3520-72-0x00000228E4F50000-0x00000228E4F51000-memory.dmp

    Filesize

    4KB