File name:

RuneLite (2).jar

Full analysis: https://app.any.run/tasks/15856cfa-039a-4a4c-b5e5-77f90193af55
Verdict: Suspicious activity
Analysis date: January 19, 2019, 08:21:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
Indicators:
MIME: application/java-archive
File info: Java archive data (JAR)
MD5:

C8CA478304067D62E8EAAAF40EB332D6

SHA1:

6F6B2AFD7B8CB9E11A854D35977C9ABB7A7A7891

SHA256:

84942A229379BCEF07AE9866453ABA20D9A0A7C481BF390FE810F809E2996D4A

SSDEEP:

49152:/RrBhtvwa1jIlTvVZOg4D5ABA9YdQcr6knmm26Xifq:/PhhjoTdZO9i7BjHDyi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • java.exe (PID: 3192)
  • SUSPICIOUS

    • Executes JAVA applets

      • javaw.exe (PID: 3028)
    • Uses TASKLIST.EXE to query information about running processes

      • java.exe (PID: 3192)
    • Creates files in the user directory

      • java.exe (PID: 3192)
    • Modifies the open verb of a shell class

      • java.exe (PID: 3192)
    • Starts CMD.EXE for commands execution

      • java.exe (PID: 3192)
    • Executable content was dropped or overwritten

      • java.exe (PID: 3192)
    • Connects to unusual port

      • java.exe (PID: 3192)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.maff | Mozilla Archive Format (gen) (63.6)
.zip | ZIP compressed archive (36.3)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0808
ZipCompression: Deflated
ZipModifyDate: 2018:12:13 18:02:03
ZipCRC: 0xaf77355c
ZipCompressedSize: 120
ZipUncompressedSize: 139
ZipFileName: META-INF/MANIFEST.MF
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
8
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start javaw.exe java.exe cmd.exe no specs wmic.exe no specs tasklist.exe no specs winrar.exe no specs winrar.exe no specs winrar.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2092"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\jagexcache\oldschool\auth.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2140C:\Windows\system32\cmd.exe /c WMIC COMPUTERSYSTEM GET MODELC:\Windows\system32\cmd.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2272"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\jagexcache\oldschool\auth.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2572WMIC COMPUTERSYSTEM GET MODELC:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2836"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\jagexcache\oldschool\auth.zip" C:\Users\admin\jagexcache\oldschool\auth\C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
3
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3028"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Local\Temp\RuneLite (2).jar"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
explorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
Modules
Images
c:\program files\java\jre1.8.0_92\bin\javaw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3192"C:\Program Files\Java\jre1.8.0_92\bin\java.exe" -cp C:\Users\admin\.runelite\repository2\client-1.5.8.jar;C:\Users\admin\.runelite\repository2\slf4j-api-1.7.25.jar;C:\Users\admin\.runelite\repository2\logback-classic-1.2.3.jar;C:\Users\admin\.runelite\repository2\logback-core-1.2.3.jar;C:\Users\admin\.runelite\repository2\jopt-simple-5.0.1.jar;C:\Users\admin\.runelite\repository2\guava-23.2-jre.jar;C:\Users\admin\.runelite\repository2\jsr305-1.3.9.jar;C:\Users\admin\.runelite\repository2\error_prone_annotations-2.0.18.jar;C:\Users\admin\.runelite\repository2\j2objc-annotations-1.1.jar;C:\Users\admin\.runelite\repository2\animal-sniffer-annotations-1.14.jar;C:\Users\admin\.runelite\repository2\guice-4.1.0-no_aop.jar;C:\Users\admin\.runelite\repository2\javax.inject-1.jar;C:\Users\admin\.runelite\repository2\aopalliance-1.0.jar;C:\Users\admin\.runelite\repository2\gson-2.8.5.jar;C:\Users\admin\.runelite\repository2\substance-8.0.02.jar;C:\Users\admin\.runelite\repository2\trident-1.5.00.jar;C:\Users\admin\.runelite\repository2\commons-text-1.2.jar;C:\Users\admin\.runelite\repository2\commons-lang3-3.7.jar;C:\Users\admin\.runelite\repository2\jogl-all-2.3.2.jar;C:\Users\admin\.runelite\repository2\jogl-all-2.3.2-natives-windows-amd64.jar;C:\Users\admin\.runelite\repository2\jogl-all-2.3.2-natives-windows-i586.jar;C:\Users\admin\.runelite\repository2\jogl-all-2.3.2-natives-linux-amd64.jar;C:\Users\admin\.runelite\repository2\jogl-all-2.3.2-natives-linux-i586.jar;C:\Users\admin\.runelite\repository2\gluegen-rt-2.3.2.jar;C:\Users\admin\.runelite\repository2\gluegen-rt-2.3.2-natives-windows-amd64.jar;C:\Users\admin\.runelite\repository2\gluegen-rt-2.3.2-natives-windows-i586.jar;C:\Users\admin\.runelite\repository2\gluegen-rt-2.3.2-natives-linux-amd64.jar;C:\Users\admin\.runelite\repository2\gluegen-rt-2.3.2-natives-linux-i586.jar;C:\Users\admin\.runelite\repository2\jbsdiff-1.0.jar;C:\Users\admin\.runelite\repository2\commons-compress-1.5.jar;C:\Users\admin\.runelite\repository2\jna-4.5.1.jar;C:\Users\admin\.runelite\repository2\jna-platform-4.5.1.jar;C:\Users\admin\.runelite\repository2\runelite-api-1.5.6.1.jar;C:\Users\admin\.runelite\repository2\runescape-api-1.5.6.1.jar;C:\Users\admin\.runelite\repository2\client-patch-1.5.6.1.jar;C:\Users\admin\.runelite\repository2\http-api-1.5.6.1.jar;C:\Users\admin\.runelite\repository2\okhttp-3.7.0.jar;C:\Users\admin\.runelite\repository2\okio-1.12.0.jar;C:\Users\admin\.runelite\repository2\commons-csv-1.4.jar;C:\Users\admin\.runelite\repository2\discord-1.1.jar -Xmx512m -Xss2m -XX:CompileThreshold=1500 -Xincgc -XX:+UseConcMarkSweepGC -XX:+UseParNewGC -Djna.nosys=true -Dsun.java2d.noddraw=false -Dsun.java2d.opengl=false -Djava.net.preferIPv4Stack=true -Djava.net.preferIPv4Addresses=true -Drunelite.launcher.version=1.6.2-SNAPSHOT net.runelite.client.RuneLiteC:\Program Files\Java\jre1.8.0_92\bin\java.exe
javaw.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
Modules
Images
c:\program files\java\jre1.8.0_92\bin\java.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3308C:\Windows\system32\tasklist.exeC:\Windows\system32\tasklist.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tasklist.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
984
Read events
956
Write events
28
Delete events
0

Modification events

(PID) Process:(3028) javaw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
javaw.exe
(PID) Process:(3192) java.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
java.exe
(PID) Process:(3192) java.exeKey:HKEY_CLASSES_ROOT\discord-409416265891971072
Operation:writeName:
Value:
URL:Run game 409416265891971072 protocol
(PID) Process:(3192) java.exeKey:HKEY_CLASSES_ROOT\discord-409416265891971072
Operation:writeName:URL Protocol
Value:
(PID) Process:(3192) java.exeKey:HKEY_CLASSES_ROOT\discord-409416265891971072\DefaultIcon
Operation:writeName:
Value:
C:\Program Files\Java\jre1.8.0_92\bin\java.exe
(PID) Process:(3192) java.exeKey:HKEY_CLASSES_ROOT\discord-409416265891971072\shell\open\command
Operation:writeName:
Value:
C:\Program Files\Java\jre1.8.0_92\bin\java.exe
(PID) Process:(2836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
Executable files
11
Suspicious files
35
Text files
23
Unknown types
25

Dropped files

PID
Process
Filename
Type
3028javaw.exeC:\Users\admin\.runelite\repository2\client-1.5.8.jarjava
MD5:
SHA256:
3028javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:
SHA256:
3028javaw.exeC:\Users\admin\.runelite\repository2\slf4j-api-1.7.25.jarcompressed
MD5:CAAFE376AFB7086DCBEE79F780394CA3
SHA256:18C4A0095D5C1DA6B817592E767BB23D29DD2F560AD74DF75FF3961DBDE25B79
3028javaw.exeC:\Users\admin\.runelite\repository2\logback-classic-1.2.3.jarcompressed
MD5:64F7A68F931AED8E5AD8243470440F0B
SHA256:FB53F8539E7FCB8F093A56E138112056EC1DC809EBB020B59D8A36A5EBAC37E0
3028javaw.exeC:\Users\admin\.runelite\repository2\guava-23.2-jre.jarjava
MD5:242752D696208279A698FEA5FEAC507D
SHA256:5BE9A7D05BA0CCD74708BC8018AE412255F85843C0B92302E9B9BEFA6ED52564
3028javaw.exeC:\Users\admin\.runelite\repository2\animal-sniffer-annotations-1.14.jarcompressed
MD5:9D42E46845C874F1710A9F6A741F6C14
SHA256:2068320BD6BAD744C3673AB048F67E30BEF8F518996FA380033556600669905D
3028javaw.exeC:\Users\admin\.runelite\repository2\guice-4.1.0-no_aop.jarcompressed
MD5:8CF17838FD9407BC2C8C39DDF027008F
SHA256:9264C6931C431E928DC64ADC842584D5F57D17B2F3AFF29221F2B3FDEA673DAD
3028javaw.exeC:\Users\admin\.runelite\repository2\logback-core-1.2.3.jarcompressed
MD5:841FC80C6EDFF60D947A3872A2DB4D45
SHA256:5946D837FE6F960C02A53EDA7A6926ECC3C758BBDD69AA453EE429F858217F22
3028javaw.exeC:\Users\admin\.runelite\repository2\jsr305-1.3.9.jarjava
MD5:1D5A772E400B04BB67A7EF4A0E0996D8
SHA256:905721A0EEA90A81534ABB7EE6EF4EA2E5E645FA1DEF0A5CD88402DF1B46C9ED
3028javaw.exeC:\Users\admin\.runelite\repository2\gson-2.8.5.jarcompressed
MD5:089104CB90D8B4E1AA00B1F5FAEF0742
SHA256:233A0149FC365C9F6EDBD683CFE266B19BDC773BE98EABDAF6B3C924B48E7D81
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
52
TCP/UDP connections
18
DNS requests
191
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3028
javaw.exe
GET
200
213.199.247.21:80
http://runelite.site/full.jar
PL
java
17.3 Mb
suspicious
3028
javaw.exe
GET
200
213.199.247.21:80
http://runelite.site/launcher/bootstrap.json
PL
text
16.4 Kb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://static.runelite.net/bootstrap.json.sha256
US
binary
512 b
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/org/slf4j/slf4j-api/1.7.25/slf4j-api-1.7.25.jar
US
compressed
40.2 Kb
suspicious
3028
javaw.exe
GET
200
172.64.142.9:80
http://repo.runelite.net/net/runelite/pushingpixels/trident/1.5.00/trident-1.5.00.jar
US
java
77.8 Kb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/com/google/code/gson/gson/2.8.5/gson-2.8.5.jar
US
compressed
235 Kb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/ch/qos/logback/logback-core/1.2.3/logback-core-1.2.3.jar
US
compressed
460 Kb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/com/google/guava/guava/23.2-jre/guava-23.2-jre.jar
US
java
2.53 Mb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/org/apache/commons/commons-lang3/3.7/commons-lang3-3.7.jar
US
compressed
487 Kb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/com/google/errorprone/error_prone_annotations/2.0.18/error_prone_annotations-2.0.18.jar
US
compressed
11.7 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3028
javaw.exe
213.199.247.21:80
runelite.site
Tarr Centrum Innowacyjnosci Sp. Zoo.
PL
suspicious
3028
javaw.exe
172.64.143.9:80
static.runelite.net
Cloudflare Inc
US
shared
3028
javaw.exe
172.64.142.9:80
static.runelite.net
Cloudflare Inc
US
shared
3192
java.exe
217.163.53.225:80
oldschool10a.runescape.com
Level 3 Communications, Inc.
GB
unknown
3192
java.exe
91.235.140.148:80
oldschool.runescape.com
Level 3 Communications, Inc.
GB
suspicious
3192
java.exe
172.64.142.9:443
static.runelite.net
Cloudflare Inc
US
shared
3192
java.exe
93.184.220.70:443
pbs.twimg.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3192
java.exe
172.64.143.9:443
static.runelite.net
Cloudflare Inc
US
shared
3192
java.exe
217.163.53.225:43594
oldschool10a.runescape.com
Level 3 Communications, Inc.
GB
unknown
3192
java.exe
185.178.208.179:80
runeliterepo.host
Ddos-guard Ltd
RU
suspicious

DNS requests

Domain
IP
Reputation
runelite.site
  • 213.199.247.21
suspicious
static.runelite.net
  • 172.64.143.9
  • 172.64.142.9
suspicious
mvn.runelite.net
  • 172.64.143.9
  • 172.64.142.9
suspicious
repo.runelite.net
  • 172.64.142.9
  • 172.64.143.9
suspicious
oldschool.runescape.com
  • 91.235.140.148
suspicious
oldschool10a.runescape.com
  • 217.163.53.225
unknown
api.runelite.net
  • 172.64.142.9
  • 172.64.143.9
suspicious
pbs.twimg.com
  • 93.184.220.70
whitelisted
oldschool1.runescape.com
  • 8.42.17.164
unknown
oldschool2a.runescape.com
  • 217.163.53.224
unknown

Threats

No threats detected
No debug info