File name: | Minecraft Team Extreme Launcher CRAZY TEAM.exe |
Full analysis: | https://app.any.run/tasks/b0de20a9-2d09-4587-9932-613b5f541956 |
Verdict: | Malicious activity |
Analysis date: | January 11, 2024, 08:59:24 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows |
MD5: | 046A78D20889A0B96B84646B2E59729F |
SHA1: | 607ECB749D947D8289FAC8073F2764B94ACF6B98 |
SHA256: | 6DFEADBD0411202222726BAD50F62547246494D82ACB1CB8A2A9448541CF3823 |
SSDEEP: | 49152:ruE0d8462CB8+LtmyvCsuhmvVxdR0I/+zC4ZknGoxnUoButMVzy7mOr4zIioKBJW:CvC1Za+LtmyvZuqVxX0WEgGcnUoButMs |
.exe | | | Win32 Executable MS Visual C++ (generic) (41) |
---|---|---|
.exe | | | Win64 Executable (generic) (36.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.6) |
.exe | | | Win32 Executable (generic) (5.9) |
.exe | | | Win16/32 Executable Delphi generic (2.7) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2015:04:04 20:08:41+02:00 |
ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit, No debug |
PEType: | PE32 |
LinkerVersion: | 2.22 |
CodeSize: | 18432 |
InitializedDataSize: | 18432 |
UninitializedDataSize: | 36864 |
EntryPoint: | 0x1290 |
OSVersion: | 4 |
ImageVersion: | 1 |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
FileVersionNumber: | 3.5.1.0 |
ProductVersionNumber: | 1.8.1.0 |
FileFlagsMask: | 0x0000 |
FileFlags: | (none) |
FileOS: | Windows NT |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | English (U.S.) |
CharacterSet: | Windows, Latin1 |
CompanyName: | TeamExtreme |
FileDescription: | 1.8.1 Minecraft Launcher |
FileVersion: | 3.5.1 |
InternalName: | Minecraft Launcher |
LegalCopyright: | TeamExtreme |
OriginalFileName: | Minecraft Launcher.exe |
ProductName: | TeamExtreme Minecraft Launcher |
ProductVersion: | 1.8.1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
120 | "C:\Users\admin\AppData\Local\Temp\Minecraft Team Extreme Launcher CRAZY TEAM.exe" | C:\Users\admin\AppData\Local\Temp\Minecraft Team Extreme Launcher CRAZY TEAM.exe | — | explorer.exe | |||||||||||
User: admin Company: TeamExtreme Integrity Level: MEDIUM Description: 1.8.1 Minecraft Launcher Exit code: 0 Version: 3.5.1 Modules
| |||||||||||||||
128 | "C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -Xms256m -Xmx512m -jar "C:\Users\admin\AppData\Local\Temp\Minecraft Team Extreme Launcher CRAZY TEAM.exe" | C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe | Minecraft Team Extreme Launcher CRAZY TEAM.exe | ||||||||||||
User: admin Company: Oracle Corporation Integrity Level: MEDIUM Description: Java(TM) Platform SE binary Exit code: 0 Version: 8.0.2710.9 Modules
| |||||||||||||||
1056 | C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M | C:\Windows\System32\icacls.exe | — | javaw.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (128) javaw.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication |
Operation: | write | Name: | Name |
Value: Explorer.EXE | |||
(PID) Process: | (128) javaw.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication |
Operation: | write | Name: | Name |
Value: javaw.exe |
PID | Process | Filename | Type | |
---|---|---|---|---|
128 | javaw.exe | C:\ProgramData\Oracle\Java\.oracle_jre_usage\17dfc292991c8061.timestamp | text | |
MD5:96DB8693B9A888365B65687296080DD3 | SHA256:F6969EBFA269355C5557AB7C7C879192941C03DC5B3062F27F8C2C6C8170C386 | |||
128 | javaw.exe | C:\Users\admin\AppData\Roaming\.minecraft\servers.dat | binary | |
MD5:A0A1E0A23EDA0BF2961BD8E8F7D84C87 | SHA256:89C9E9B9DCE117D9B281679023CFBBECF3460BD49B84E2B2F8E35FC72F2C482D | |||
128 | javaw.exe | C:\Users\admin\AppData\Roaming\.minecraft\launcher_profiles.json | binary | |
MD5:A7B7FD9D956E83A5ACA6853ABB8C1FDD | SHA256:E4AD8759A8CDA807E07FED7565DE231CCAF4165BAD78E45E1C850B7BA6F97DCF | |||
128 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio6504582321191377880.tmp | image | |
MD5:91D3708A258E5F789E2AE888CF68F66F | SHA256:0AD2672561C2BA4E86C38702682BD84D720351F3E5C4CA232F0043AAB7FA8B28 | |||
128 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio8748160030543184232.tmp | image | |
MD5:BAC9FF4091F233B5BA8ADAB478AE9BF0 | SHA256:20EEB8C7666BBF0A74F1501FFB73EEE789C3231A8310B801FB161F550DC66425 | |||
128 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio5647223426160618090.tmp | image | |
MD5:E7E38B97A9FE7E0BB219AAF28BB750B7 | SHA256:99EDDE5742D3F824EB8F1EA03CCBDB969A04F94235CAE509644A442F8EBB039E | |||
128 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio8507124768866434181.tmp | image | |
MD5:D141CC8E71A3351F1AACB88A74B45FA4 | SHA256:2788675E062E1111EAD50A9A05971A7C11FE6246A89F571CF9F59ED68C72BB17 | |||
128 | javaw.exe | C:\Users\admin\AppData\Roaming\.minecraft\Read Me!.url | text | |
MD5:FFA157178D9281ED769E695F6225B91D | SHA256:4BAA30A7D1B4A1EB9E74BBD207B78BC35E74205A9B88A66D47F3E86C3B3E5C3C | |||
128 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio6601525138145373064.tmp | image | |
MD5:D141CC8E71A3351F1AACB88A74B45FA4 | SHA256:2788675E062E1111EAD50A9A05971A7C11FE6246A89F571CF9F59ED68C72BB17 | |||
128 | javaw.exe | C:\Users\admin\AppData\Local\Temp\imageio7910260693566189296.tmp | image | |
MD5:CB2666EAE03572A523CE8EAD1EB45134 | SHA256:7BC1CC5F09034D3CA71B5F23AF0E83A2B681E90F5B986DE3748D555F527251B4 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | GET | 404 | 198.54.115.64:80 | http://teamextrememc.com/failsafe/launcherversion.txt | unknown | html | 1.21 Kb | — |
128 | javaw.exe | GET | 200 | 198.54.115.64:80 | http://teamextrememc.com/failsafe/url.txt | unknown | text | 36 b | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | unknown |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
128 | javaw.exe | 162.125.66.15:443 | dl.dropboxusercontent.com | DROPBOX | DE | unknown |
128 | javaw.exe | 198.54.115.64:80 | teamextrememc.com | NAMECHEAP-NET | US | unknown |
128 | javaw.exe | 52.216.153.230:443 | s3.amazonaws.com | AMAZON-02 | US | unknown |
Domain | IP | Reputation |
---|---|---|
dl.dropboxusercontent.com |
| unknown |
teamextrememc.com |
| unknown |
dl.dropbox.com |
| unknown |
s3.amazonaws.com |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Misc activity | ET INFO DropBox User Content Domain (dl .dropboxusercontent .com in TLS SNI) |
— | — | Misc activity | ET INFO DropBox User Content Download Access over SSL M2 |
— | — | Potentially Bad Traffic | ET POLICY Vulnerable Java Version 1.8.x Detected |
— | — | Potentially Bad Traffic | ET POLICY Vulnerable Java Version 1.8.x Detected |
— | — | Misc activity | ET INFO DropBox User Content Download Access over SSL M2 |