| File name: | RuneLite.jar |
| Full analysis: | https://app.any.run/tasks/eadc4d75-e15c-4845-b9e9-40b881fa9f14 |
| Verdict: | Malicious activity |
| Analysis date: | September 03, 2018, 23:54:58 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/java-archive |
| File info: | Java archive data (JAR) |
| MD5: | E17E1C6DC75057DC9D1D3B399378E5E5 |
| SHA1: | AF603517121A17CAB6BCE157D62B496C3C8C7B48 |
| SHA256: | 5FD754334F71D2E054B7256D8872F6B5D2B96F5E251F10544044182EB28554C1 |
| SSDEEP: | 196608:YwoYSJ11QvYlKMloiTLJOQD1mBz5Rcl61NQzFav2xteKYPRgv+h8RJBu:YLY616vFMlTLv1mBzHjazxtXYs+h8RLu |
| .spe | | | SPSS Extension (58.2) |
|---|---|---|
| .litemod | | | Minecraft LiteLoader Mod (20.3) |
| .maff | | | Mozilla Archive Format (gen) (13.5) |
| .zip | | | ZIP compressed archive (7.7) |
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | 0x0808 |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2018:09:02 22:56:01 |
| ZipCRC: | 0x863a672b |
| ZipCompressedSize: | 120 |
| ZipUncompressedSize: | 137 |
| ZipFileName: | META-INF/MANIFEST.MF |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 472 | C:\Users\admin\AppData\Local\Temp\as3n\dshocker.exe" | C:\Users\admin\AppData\Local\Temp\as3n\dshocker.exe | — | dshocker.exe | |||||||||||
User: admin Company: Jagex Ltd. Integrity Level: MEDIUM Description: RuneScape Launcher Exit code: 0 Version: 224.01 Modules
| |||||||||||||||
| 928 | "C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Local\Temp\RuneLite.jar" | C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe | explorer.exe | ||||||||||||
User: admin Company: Oracle Corporation Integrity Level: MEDIUM Description: Java(TM) Platform SE binary Exit code: 0 Version: 8.0.920.14 Modules
| |||||||||||||||
| 1272 | "C:\Users\admin\AppData\Local\Temp\as3n\dshocker.exe" | C:\Users\admin\AppData\Local\Temp\as3n\dshocker.exe | — | WScript.exe | |||||||||||
User: admin Company: Jagex Ltd. Integrity Level: MEDIUM Description: RuneScape Launcher Exit code: 0 Version: 224.01 Modules
| |||||||||||||||
| 2216 | "C:\Users\admin\AppData\Local\Temp\dookie.exe" | C:\Users\admin\AppData\Local\Temp\dookie.exe | — | RuneLite32.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.00 Modules
| |||||||||||||||
| 2540 | taskkill.exe /IM msascuil.exe /F | C:\Windows\system32\taskkill.exe | — | dookie.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3016 | "C:\Users\admin\AppData\Roaming\RuneLite\RuneLite32.exe" | C:\Users\admin\AppData\Roaming\RuneLite\RuneLite32.exe | javaw.exe | ||||||||||||
User: admin Company: Jagex Ltd. Integrity Level: MEDIUM Description: RuneScape Launcher Exit code: 0 Version: 224.01 Modules
| |||||||||||||||
| 3184 | taskkill.exe /IM msseces.exe /F | C:\Windows\system32\taskkill.exe | — | dookie.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 4024 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\as3n\dshocker.vbs" | C:\Windows\System32\WScript.exe | RuneLite32.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| (PID) Process: | (928) javaw.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (928) javaw.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (928) javaw.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication |
| Operation: | write | Name: | Name |
Value: javaw.exe | |||
| (PID) Process: | (928) javaw.exe | Key: | HKEY_CLASSES_ROOT\discord-409416265891971072 |
| Operation: | write | Name: | |
Value: URL:Run game 409416265891971072 protocol | |||
| (PID) Process: | (928) javaw.exe | Key: | HKEY_CLASSES_ROOT\discord-409416265891971072 |
| Operation: | write | Name: | URL Protocol |
Value: | |||
| (PID) Process: | (928) javaw.exe | Key: | HKEY_CLASSES_ROOT\discord-409416265891971072\DefaultIcon |
| Operation: | write | Name: | |
Value: C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe | |||
| (PID) Process: | (928) javaw.exe | Key: | HKEY_CLASSES_ROOT\discord-409416265891971072\shell\open\command |
| Operation: | write | Name: | |
Value: C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe | |||
| (PID) Process: | (3016) RuneLite32.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3016) RuneLite32.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (4024) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce |
| Operation: | write | Name: | DShocker RPC |
Value: C:\Users\admin\AppData\Local\Temp\as3n\dshocker.vbs | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 928 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio1492086059639593291.tmp | — | |
MD5:— | SHA256:— | |||
| 928 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio2274738219081966617.tmp | — | |
MD5:— | SHA256:— | |||
| 928 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio3403884208330676590.tmp | — | |
MD5:— | SHA256:— | |||
| 928 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio4877762380845580701.tmp | — | |
MD5:— | SHA256:— | |||
| 928 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio2083548510559300991.tmp | — | |
MD5:— | SHA256:— | |||
| 928 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio3930572693637203777.tmp | — | |
MD5:— | SHA256:— | |||
| 928 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio5939000057880313885.tmp | — | |
MD5:— | SHA256:— | |||
| 928 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio5373793590823008925.tmp | — | |
MD5:— | SHA256:— | |||
| 928 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio2432255148104825183.tmp | — | |
MD5:— | SHA256:— | |||
| 928 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio8780543373840991734.tmp | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
928 | javaw.exe | GET | 302 | 91.235.140.148:80 | http://oldschool.runescape.com/jav_config.ws | GB | — | — | suspicious |
928 | javaw.exe | GET | 200 | 104.28.18.98:80 | http://public.githubrepository.host/_mvn/ArrestSavaged.zip | US | compressed | 245 Kb | suspicious |
928 | javaw.exe | GET | 200 | 62.67.0.210:80 | http://oldschool3.runescape.com/jav_config.ws?userFlow=742822007474982084 | GB | text | 2.32 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
928 | javaw.exe | 91.235.140.148:80 | oldschool.runescape.com | Level 3 Communications, Inc. | GB | suspicious |
928 | javaw.exe | 62.67.0.210:80 | oldschool3.runescape.com | Level 3 Communications, Inc. | GB | unknown |
928 | javaw.exe | 172.64.103.2:443 | api.runelite.net | Cloudflare Inc | US | shared |
928 | javaw.exe | 104.28.18.98:80 | public.githubrepository.host | Cloudflare Inc | US | shared |
928 | javaw.exe | 62.67.0.210:43594 | oldschool3.runescape.com | Level 3 Communications, Inc. | GB | unknown |
928 | javaw.exe | 104.244.46.231:443 | pbs.twimg.com | Twitter Inc. | US | unknown |
Domain | IP | Reputation |
|---|---|---|
oldschool.runescape.com |
| suspicious |
oldschool3.runescape.com |
| unknown |
api.runelite.net |
| suspicious |
public.githubrepository.host |
| suspicious |
pbs.twimg.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
928 | javaw.exe | Misc activity | POLICY [PTsecurity] Zip as Image content mistmach (Downloader.Java.Agent) |
928 | javaw.exe | A Network Trojan was detected | ET CURRENT_EVENTS DRIVEBY Generic - JAR Containing Windows Executable |