File name:

mmc-cracked-win32.zip

Full analysis: https://app.any.run/tasks/296cece4-972f-4420-8587-4b89bf88fc94
Verdict: Malicious activity
Analysis date: March 23, 2022, 14:32:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

012161B1C8C36B79BBABE3F7F129500B

SHA1:

68C2890CE79373271BE9F19CDFADB6E523280E82

SHA256:

0C5503273F12A717F150B5A1F2EC66162159B07952F70382546A0D6EA5A3C0F0

SSDEEP:

393216:dUNbnM90hVZWxDBQEc0xny7KthVwAogoRG6dUQ46Tu:satxny7OmFw6if

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3712)
      • Explorer.EXE (PID: 964)
      • UltimMC.exe (PID: 3636)
    • Application was dropped or rewritten from another process

      • UltimMC.exe (PID: 3636)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3984)
    • Drops a file with too old compile date

      • WinRAR.exe (PID: 3984)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 3984)
    • Reads the computer name

      • UltimMC.exe (PID: 3636)
      • WinRAR.exe (PID: 3984)
    • Checks supported languages

      • UltimMC.exe (PID: 3636)
      • javaw.exe (PID: 1536)
      • javaw.exe (PID: 452)
      • javaw.exe (PID: 444)
      • javaw.exe (PID: 3280)
      • WinRAR.exe (PID: 3984)
    • Reads default file associations for system extensions

      • Explorer.EXE (PID: 964)
    • Check for Java to be installed

      • UltimMC.exe (PID: 3636)
      • javaw.exe (PID: 452)
      • javaw.exe (PID: 3280)
      • javaw.exe (PID: 444)
    • Executes JAVA applets

      • UltimMC.exe (PID: 3636)
    • Creates files in the program directory

      • javaw.exe (PID: 1536)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 3984)
    • Creates files in the user directory

      • Explorer.EXE (PID: 964)
    • Uses ICACLS.EXE to modify access control list

      • javaw.exe (PID: 452)
  • INFO

    • Reads settings of System Certificates

      • UltimMC.exe (PID: 3636)
    • Reads the computer name

      • icacls.exe (PID: 2892)
    • Checks supported languages

      • icacls.exe (PID: 2892)
    • Dropped object may contain Bitcoin addresses

      • UltimMC.exe (PID: 3636)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: UltimMC/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2022:01:25 02:12:10
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
9
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs explorer.exe no specs ultimmc.exe javaw.exe no specs javaw.exe no specs icacls.exe no specs javaw.exe no specs javaw.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
444javaw -Xms512m -Xmx1024m -jar C:/Users/admin/Desktop/UltimMC/jars/JavaCheck.jarC:\Program Files\Common Files\Oracle\Java\javapath\javaw.exeUltimMC.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\common files\oracle\java\javapath_target_52116515\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
452javaw -jar C:/Users/admin/Desktop/UltimMC/jars/JavaCheck.jarC:\Program Files\Common Files\Oracle\Java\javapath\javaw.exeUltimMC.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\common files\oracle\java\javapath_target_52116515\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
964C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1536"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -jar C:/Users/admin/Desktop/UltimMC/jars/JavaCheck.jarC:\Program Files\Java\jre1.8.0_271\bin\javaw.exeUltimMC.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2892C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\system32\icacls.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
3280"C:\Program Files\Common Files\Oracle\Java\javapath\javaw.exe" -jar C:/Users/admin/Desktop/UltimMC/jars/JavaCheck.jarC:\Program Files\Common Files\Oracle\Java\javapath\javaw.exeUltimMC.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\common files\oracle\java\javapath_target_52116515\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3636"C:\Users\admin\Desktop\UltimMC\UltimMC.exe" C:\Users\admin\Desktop\UltimMC\UltimMC.exe
Explorer.EXE
User:
admin
Company:
MultiMC Contributors
Integrity Level:
MEDIUM
Description:
A Minecraft Launcher
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\desktop\ultimmc\ultimmc.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\desktop\ultimmc\zlib1.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\desktop\ultimmc\liblauncher_iconfix.dll
c:\users\admin\desktop\ultimmc\qt5core.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
3712"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3984"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\mmc-cracked-win32.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
18 042
Read events
17 898
Write events
144
Delete events
0

Modification events

(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3984) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\mmc-cracked-win32.zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
36
Suspicious files
29
Text files
147
Unknown types
150

Dropped files

PID
Process
Filename
Type
964Explorer.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-msautomaticdestinations-ms
MD5:
SHA256:
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\libLauncher_nbt++.dll.aobj
MD5:
SHA256:
964Explorer.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\mmc-cracked-win32.zip.lnklnk
MD5:
SHA256:
964Explorer.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\290532160612e071.automaticDestinations-msautomaticdestinations-ms
MD5:
SHA256:
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\libgcc_s_dw2-1.dllexecutable
MD5:FADDE43C97607E4445A6F924D851F04E
SHA256:F0614835136413217ED3BAEC9BA22AAAC4C37956AFCB0209F1F89B7676AE86BC
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\libssp-0.dllexecutable
MD5:D6859975AAF6D3AA92F2D50F6E9876A0
SHA256:17329C4C19E8F23CDE9C99155EB3F8759F8D2383AD856C32A51B3B9FA2846811
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\libLauncher_quazip.dllexecutable
MD5:2D8D8802199FBDC1A2722E6AA3163ED6
SHA256:E542222B63431CF09406529D9B8142D5455F66699B24A8AF3589858A7C72DC5F
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\UltimMC.exeexecutable
MD5:
SHA256:
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\Qt5Xml.dllexecutable
MD5:F09BF12746B7821C7AB1E16CE41E9119
SHA256:DBDD63614097767943C585C09F08D346500683E308861F583B2589618D491D6A
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\libLauncher_nbt++.dllexecutable
MD5:14868BFCDB26D0CB811E4227D8285605
SHA256:15CC80B1E5DC94637FFD25AC87C496FF81C2DB7F1B14608761C8C4012AE69F37
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
22
DNS requests
13
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3636
UltimMC.exe
104.21.39.176:443
files.multimc.org
Cloudflare Inc
US
unknown
3636
UltimMC.exe
108.157.4.90:443
api.minecraftservices.com
US
unknown
3636
UltimMC.exe
172.67.147.103:443
files.multimc.org
US
unknown
172.67.147.103:443
files.multimc.org
US
unknown
99.86.2.83:443
libraries.minecraft.net
AT&T Services, Inc.
US
suspicious
3636
UltimMC.exe
99.86.2.83:443
libraries.minecraft.net
AT&T Services, Inc.
US
suspicious
3636
UltimMC.exe
143.204.212.134:443
launcher.mojang.com
US
unknown
3636
UltimMC.exe
142.250.185.174:443
www.google-analytics.com
Google Inc.
US
whitelisted
99.86.8.139:443
launchermeta.mojang.com
AT&T Services, Inc.
US
unknown
3636
UltimMC.exe
65.9.66.79:443
resources.download.minecraft.net
AT&T Services, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
files.multimc.org
  • 104.21.39.176
  • 172.67.147.103
unknown
multimc.org
  • 104.21.39.176
  • 172.67.147.103
whitelisted
api.minecraftservices.com
  • 108.157.4.90
  • 108.157.4.17
  • 108.157.4.106
  • 108.157.4.63
malicious
meta.multimc.org
  • 172.67.147.103
  • 104.21.39.176
whitelisted
authserver.mojang.com
  • 143.204.203.55
  • 143.204.203.41
  • 143.204.203.46
  • 143.204.203.50
suspicious
session.minecraft.net
  • 3.211.39.224
  • 52.205.99.166
  • 3.224.239.34
suspicious
textures.minecraft.net
  • 99.86.7.19
  • 99.86.7.25
  • 99.86.7.90
  • 99.86.7.107
whitelisted
api.mojang.com
  • 99.86.7.25
  • 99.86.7.47
  • 99.86.7.61
  • 99.86.7.77
whitelisted
libraries.minecraft.net
  • 99.86.2.83
shared
launcher.mojang.com
  • 143.204.212.134
whitelisted

Threats

No threats detected
No debug info