Analysis

  • max time kernel
    44s
  • max time network
    65s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-06-2024 16:04

General

  • Target

    Nurik 1.16.5 crack/client/libraries/discord-rpc.jar

  • Size

    2.0MB

  • MD5

    614804802c32c61f5e62ee1a1503c5c2

  • SHA1

    36f422c16318bb0f7afd3257d6f64853e89a5dc2

  • SHA256

    2d31e48dada4b92d7df857a0b352414da39b1965d01947b5ffe912d5b108308d

  • SHA512

    e775d12b486a6905976b56409aaf366df55f93a9522cda8f913de9a54adc9afdb7dbc8f01d2e18adba7db1b9173f71de2c19f1e39416251dbfdece39e610e02e

  • SSDEEP

    49152:YOQFwtchwO8cnJ8D8gE+uJkoWCeaiPCzqahNC+:YbStaDn+v3aXiPCzqaPC+

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\Nurik 1.16.5 crack\client\libraries\discord-rpc.jar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Windows\system32\icacls.exe
      C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
      2⤵
      • Modifies file permissions
      PID:4504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

    Filesize

    46B

    MD5

    67494ef1c426a7ea72f7ec60fa8230c6

    SHA1

    d218a26c883f29b8b5e75896439d33a3d2891da4

    SHA256

    9e64b9436adcc34abb0f16aa5c91d6192169e24eb52b5674c6738bfabfc7f7a5

    SHA512

    8c82ce1fe079a3a1d32f616c01b3e3d1618cce579d84de25483d4ab34cb233d7a97553758c97d5dd461bd985dad1ed2e01a24bec371174cbffeadfbfade361f9

  • memory/3004-2-0x000001CF0B420000-0x000001CF0B690000-memory.dmp

    Filesize

    2.4MB

  • memory/3004-12-0x000001CF09BB0000-0x000001CF09BB1000-memory.dmp

    Filesize

    4KB

  • memory/3004-13-0x000001CF0B420000-0x000001CF0B690000-memory.dmp

    Filesize

    2.4MB