File name:

mmc-cracked-win32.zip

Full analysis: https://app.any.run/tasks/296cece4-972f-4420-8587-4b89bf88fc94
Verdict: Malicious activity
Analysis date: March 23, 2022, 14:32:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

012161B1C8C36B79BBABE3F7F129500B

SHA1:

68C2890CE79373271BE9F19CDFADB6E523280E82

SHA256:

0C5503273F12A717F150B5A1F2EC66162159B07952F70382546A0D6EA5A3C0F0

SSDEEP:

393216:dUNbnM90hVZWxDBQEc0xny7KthVwAogoRG6dUQ46Tu:satxny7OmFw6if

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3712)
      • Explorer.EXE (PID: 964)
      • UltimMC.exe (PID: 3636)
    • Application was dropped or rewritten from another process

      • UltimMC.exe (PID: 3636)
  • SUSPICIOUS

    • Checks supported languages

      • WinRAR.exe (PID: 3984)
      • UltimMC.exe (PID: 3636)
      • javaw.exe (PID: 452)
      • javaw.exe (PID: 1536)
      • javaw.exe (PID: 3280)
      • javaw.exe (PID: 444)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3984)
    • Drops a file with too old compile date

      • WinRAR.exe (PID: 3984)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 3984)
    • Reads the computer name

      • WinRAR.exe (PID: 3984)
      • UltimMC.exe (PID: 3636)
    • Creates files in the user directory

      • Explorer.EXE (PID: 964)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 3984)
    • Check for Java to be installed

      • UltimMC.exe (PID: 3636)
      • javaw.exe (PID: 452)
      • javaw.exe (PID: 3280)
      • javaw.exe (PID: 444)
    • Reads default file associations for system extensions

      • Explorer.EXE (PID: 964)
    • Executes JAVA applets

      • UltimMC.exe (PID: 3636)
    • Creates files in the program directory

      • javaw.exe (PID: 1536)
    • Uses ICACLS.EXE to modify access control list

      • javaw.exe (PID: 452)
  • INFO

    • Reads settings of System Certificates

      • UltimMC.exe (PID: 3636)
    • Checks supported languages

      • icacls.exe (PID: 2892)
    • Reads the computer name

      • icacls.exe (PID: 2892)
    • Dropped object may contain Bitcoin addresses

      • UltimMC.exe (PID: 3636)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: UltimMC/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2022:01:25 02:12:10
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
9
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe searchprotocolhost.exe no specs explorer.exe no specs ultimmc.exe javaw.exe no specs javaw.exe no specs icacls.exe no specs javaw.exe no specs javaw.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
444javaw -Xms512m -Xmx1024m -jar C:/Users/admin/Desktop/UltimMC/jars/JavaCheck.jarC:\Program Files\Common Files\Oracle\Java\javapath\javaw.exeUltimMC.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\common files\oracle\java\javapath_target_52116515\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
452javaw -jar C:/Users/admin/Desktop/UltimMC/jars/JavaCheck.jarC:\Program Files\Common Files\Oracle\Java\javapath\javaw.exeUltimMC.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\common files\oracle\java\javapath_target_52116515\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
964C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1536"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -jar C:/Users/admin/Desktop/UltimMC/jars/JavaCheck.jarC:\Program Files\Java\jre1.8.0_271\bin\javaw.exeUltimMC.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2892C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\system32\icacls.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
3280"C:\Program Files\Common Files\Oracle\Java\javapath\javaw.exe" -jar C:/Users/admin/Desktop/UltimMC/jars/JavaCheck.jarC:\Program Files\Common Files\Oracle\Java\javapath\javaw.exeUltimMC.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\common files\oracle\java\javapath_target_52116515\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3636"C:\Users\admin\Desktop\UltimMC\UltimMC.exe" C:\Users\admin\Desktop\UltimMC\UltimMC.exe
Explorer.EXE
User:
admin
Company:
MultiMC Contributors
Integrity Level:
MEDIUM
Description:
A Minecraft Launcher
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\desktop\ultimmc\ultimmc.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\desktop\ultimmc\zlib1.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\desktop\ultimmc\liblauncher_iconfix.dll
c:\users\admin\desktop\ultimmc\qt5core.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
3712"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3984"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\mmc-cracked-win32.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
18 042
Read events
17 898
Write events
144
Delete events
0

Modification events

(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3984) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\mmc-cracked-win32.zip
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3984) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
36
Suspicious files
29
Text files
147
Unknown types
150

Dropped files

PID
Process
Filename
Type
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\libgcc_s_dw2-1.dllexecutable
MD5:FADDE43C97607E4445A6F924D851F04E
SHA256:F0614835136413217ED3BAEC9BA22AAAC4C37956AFCB0209F1F89B7676AE86BC
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\libeay32.dllexecutable
MD5:ABEF7052E350DB0C7882CFED969066E1
SHA256:5B4E6E7FF551A2A48F1BAB0AC27421930A6215A9F5E52E95297C8BA31484D1F5
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\libLauncher_nbt++.dll.aobj
MD5:
SHA256:
964Explorer.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\290532160612e071.automaticDestinations-msautomaticdestinations-ms
MD5:
SHA256:
964Explorer.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\mmc-cracked-win32.zip.lnklnk
MD5:
SHA256:
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\libssp-0.dllexecutable
MD5:D6859975AAF6D3AA92F2D50F6E9876A0
SHA256:17329C4C19E8F23CDE9C99155EB3F8759F8D2383AD856C32A51B3B9FA2846811
964Explorer.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1b4dd67f29cb1962.automaticDestinations-msautomaticdestinations-ms
MD5:
SHA256:
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\libLauncher_rainbow.dllexecutable
MD5:8BACEE60FBF39997EB56BB4C2994F65B
SHA256:B14E80C81DD81F5F5C5D4A3B4F4DF3CE36E79A107ED23E25B74AD62836FFEFA8
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\qt.confbinary
MD5:7215EE9C7D9DC229D2921A40E899EC5F
SHA256:36A9E7F1C95B82FFB99743E0C5C4CE95D83C9A430AAC59F84EF3CBFAB6145068
3984WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3984.14039\UltimMC\libstdc++-6.dllexecutable
MD5:C283D446B34E75019B81D0981CB11F0D
SHA256:F6530962659D0641236A42517A30DC55C4FCB7D30E942C3E820AF343798A770D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
22
DNS requests
13
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3636
UltimMC.exe
108.157.4.90:443
api.minecraftservices.com
US
unknown
3636
UltimMC.exe
172.67.147.103:443
files.multimc.org
US
unknown
3636
UltimMC.exe
99.86.2.83:443
libraries.minecraft.net
AT&T Services, Inc.
US
suspicious
172.67.147.103:443
files.multimc.org
US
unknown
99.86.2.83:443
libraries.minecraft.net
AT&T Services, Inc.
US
suspicious
99.86.8.139:443
launchermeta.mojang.com
AT&T Services, Inc.
US
unknown
3636
UltimMC.exe
104.21.39.176:443
files.multimc.org
Cloudflare Inc
US
unknown
3636
UltimMC.exe
65.9.66.79:443
resources.download.minecraft.net
AT&T Services, Inc.
US
malicious
3636
UltimMC.exe
143.204.212.134:443
launcher.mojang.com
US
unknown
3636
UltimMC.exe
142.250.185.174:443
www.google-analytics.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
files.multimc.org
  • 104.21.39.176
  • 172.67.147.103
unknown
multimc.org
  • 104.21.39.176
  • 172.67.147.103
whitelisted
api.minecraftservices.com
  • 108.157.4.90
  • 108.157.4.17
  • 108.157.4.106
  • 108.157.4.63
malicious
meta.multimc.org
  • 172.67.147.103
  • 104.21.39.176
whitelisted
authserver.mojang.com
  • 143.204.203.55
  • 143.204.203.41
  • 143.204.203.46
  • 143.204.203.50
suspicious
session.minecraft.net
  • 3.211.39.224
  • 52.205.99.166
  • 3.224.239.34
suspicious
textures.minecraft.net
  • 99.86.7.19
  • 99.86.7.25
  • 99.86.7.90
  • 99.86.7.107
whitelisted
api.mojang.com
  • 99.86.7.25
  • 99.86.7.47
  • 99.86.7.61
  • 99.86.7.77
whitelisted
libraries.minecraft.net
  • 99.86.2.83
shared
launcher.mojang.com
  • 143.204.212.134
whitelisted

Threats

No threats detected
No debug info