File name:

RuneLite (2).jar

Full analysis: https://app.any.run/tasks/15856cfa-039a-4a4c-b5e5-77f90193af55
Verdict: Suspicious activity
Analysis date: January 19, 2019, 08:21:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
Indicators:
MIME: application/java-archive
File info: Java archive data (JAR)
MD5:

C8CA478304067D62E8EAAAF40EB332D6

SHA1:

6F6B2AFD7B8CB9E11A854D35977C9ABB7A7A7891

SHA256:

84942A229379BCEF07AE9866453ABA20D9A0A7C481BF390FE810F809E2996D4A

SSDEEP:

49152:/RrBhtvwa1jIlTvVZOg4D5ABA9YdQcr6knmm26Xifq:/PhhjoTdZO9i7BjHDyi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • java.exe (PID: 3192)
  • SUSPICIOUS

    • Executes JAVA applets

      • javaw.exe (PID: 3028)
    • Starts CMD.EXE for commands execution

      • java.exe (PID: 3192)
    • Creates files in the user directory

      • java.exe (PID: 3192)
    • Uses TASKLIST.EXE to query information about running processes

      • java.exe (PID: 3192)
    • Executable content was dropped or overwritten

      • java.exe (PID: 3192)
    • Modifies the open verb of a shell class

      • java.exe (PID: 3192)
    • Connects to unusual port

      • java.exe (PID: 3192)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.maff | Mozilla Archive Format (gen) (63.6)
.zip | ZIP compressed archive (36.3)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0808
ZipCompression: Deflated
ZipModifyDate: 2018:12:13 18:02:03
ZipCRC: 0xaf77355c
ZipCompressedSize: 120
ZipUncompressedSize: 139
ZipFileName: META-INF/MANIFEST.MF
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
8
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start javaw.exe java.exe cmd.exe no specs wmic.exe no specs tasklist.exe no specs winrar.exe no specs winrar.exe no specs winrar.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2092"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\jagexcache\oldschool\auth.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2140C:\Windows\system32\cmd.exe /c WMIC COMPUTERSYSTEM GET MODELC:\Windows\system32\cmd.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2272"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\jagexcache\oldschool\auth.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2572WMIC COMPUTERSYSTEM GET MODELC:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2836"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\jagexcache\oldschool\auth.zip" C:\Users\admin\jagexcache\oldschool\auth\C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
3
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3028"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Local\Temp\RuneLite (2).jar"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
explorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
Modules
Images
c:\program files\java\jre1.8.0_92\bin\javaw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3192"C:\Program Files\Java\jre1.8.0_92\bin\java.exe" -cp C:\Users\admin\.runelite\repository2\client-1.5.8.jar;C:\Users\admin\.runelite\repository2\slf4j-api-1.7.25.jar;C:\Users\admin\.runelite\repository2\logback-classic-1.2.3.jar;C:\Users\admin\.runelite\repository2\logback-core-1.2.3.jar;C:\Users\admin\.runelite\repository2\jopt-simple-5.0.1.jar;C:\Users\admin\.runelite\repository2\guava-23.2-jre.jar;C:\Users\admin\.runelite\repository2\jsr305-1.3.9.jar;C:\Users\admin\.runelite\repository2\error_prone_annotations-2.0.18.jar;C:\Users\admin\.runelite\repository2\j2objc-annotations-1.1.jar;C:\Users\admin\.runelite\repository2\animal-sniffer-annotations-1.14.jar;C:\Users\admin\.runelite\repository2\guice-4.1.0-no_aop.jar;C:\Users\admin\.runelite\repository2\javax.inject-1.jar;C:\Users\admin\.runelite\repository2\aopalliance-1.0.jar;C:\Users\admin\.runelite\repository2\gson-2.8.5.jar;C:\Users\admin\.runelite\repository2\substance-8.0.02.jar;C:\Users\admin\.runelite\repository2\trident-1.5.00.jar;C:\Users\admin\.runelite\repository2\commons-text-1.2.jar;C:\Users\admin\.runelite\repository2\commons-lang3-3.7.jar;C:\Users\admin\.runelite\repository2\jogl-all-2.3.2.jar;C:\Users\admin\.runelite\repository2\jogl-all-2.3.2-natives-windows-amd64.jar;C:\Users\admin\.runelite\repository2\jogl-all-2.3.2-natives-windows-i586.jar;C:\Users\admin\.runelite\repository2\jogl-all-2.3.2-natives-linux-amd64.jar;C:\Users\admin\.runelite\repository2\jogl-all-2.3.2-natives-linux-i586.jar;C:\Users\admin\.runelite\repository2\gluegen-rt-2.3.2.jar;C:\Users\admin\.runelite\repository2\gluegen-rt-2.3.2-natives-windows-amd64.jar;C:\Users\admin\.runelite\repository2\gluegen-rt-2.3.2-natives-windows-i586.jar;C:\Users\admin\.runelite\repository2\gluegen-rt-2.3.2-natives-linux-amd64.jar;C:\Users\admin\.runelite\repository2\gluegen-rt-2.3.2-natives-linux-i586.jar;C:\Users\admin\.runelite\repository2\jbsdiff-1.0.jar;C:\Users\admin\.runelite\repository2\commons-compress-1.5.jar;C:\Users\admin\.runelite\repository2\jna-4.5.1.jar;C:\Users\admin\.runelite\repository2\jna-platform-4.5.1.jar;C:\Users\admin\.runelite\repository2\runelite-api-1.5.6.1.jar;C:\Users\admin\.runelite\repository2\runescape-api-1.5.6.1.jar;C:\Users\admin\.runelite\repository2\client-patch-1.5.6.1.jar;C:\Users\admin\.runelite\repository2\http-api-1.5.6.1.jar;C:\Users\admin\.runelite\repository2\okhttp-3.7.0.jar;C:\Users\admin\.runelite\repository2\okio-1.12.0.jar;C:\Users\admin\.runelite\repository2\commons-csv-1.4.jar;C:\Users\admin\.runelite\repository2\discord-1.1.jar -Xmx512m -Xss2m -XX:CompileThreshold=1500 -Xincgc -XX:+UseConcMarkSweepGC -XX:+UseParNewGC -Djna.nosys=true -Dsun.java2d.noddraw=false -Dsun.java2d.opengl=false -Djava.net.preferIPv4Stack=true -Djava.net.preferIPv4Addresses=true -Drunelite.launcher.version=1.6.2-SNAPSHOT net.runelite.client.RuneLiteC:\Program Files\Java\jre1.8.0_92\bin\java.exe
javaw.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
Modules
Images
c:\program files\java\jre1.8.0_92\bin\java.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3308C:\Windows\system32\tasklist.exeC:\Windows\system32\tasklist.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tasklist.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
984
Read events
956
Write events
28
Delete events
0

Modification events

(PID) Process:(3028) javaw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
javaw.exe
(PID) Process:(3192) java.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
java.exe
(PID) Process:(3192) java.exeKey:HKEY_CLASSES_ROOT\discord-409416265891971072
Operation:writeName:
Value:
URL:Run game 409416265891971072 protocol
(PID) Process:(3192) java.exeKey:HKEY_CLASSES_ROOT\discord-409416265891971072
Operation:writeName:URL Protocol
Value:
(PID) Process:(3192) java.exeKey:HKEY_CLASSES_ROOT\discord-409416265891971072\DefaultIcon
Operation:writeName:
Value:
C:\Program Files\Java\jre1.8.0_92\bin\java.exe
(PID) Process:(3192) java.exeKey:HKEY_CLASSES_ROOT\discord-409416265891971072\shell\open\command
Operation:writeName:
Value:
C:\Program Files\Java\jre1.8.0_92\bin\java.exe
(PID) Process:(2836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2836) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
Executable files
11
Suspicious files
35
Text files
23
Unknown types
25

Dropped files

PID
Process
Filename
Type
3028javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:
SHA256:
3028javaw.exeC:\Users\admin\.runelite\repository2\client-1.5.8.jarjava
MD5:
SHA256:
3028javaw.exeC:\Users\admin\.runelite\repository2\logback-classic-1.2.3.jarcompressed
MD5:64F7A68F931AED8E5AD8243470440F0B
SHA256:FB53F8539E7FCB8F093A56E138112056EC1DC809EBB020B59D8A36A5EBAC37E0
3028javaw.exeC:\Users\admin\.runelite\repository2\logback-core-1.2.3.jarcompressed
MD5:841FC80C6EDFF60D947A3872A2DB4D45
SHA256:5946D837FE6F960C02A53EDA7A6926ECC3C758BBDD69AA453EE429F858217F22
3028javaw.exeC:\Users\admin\.runelite\repository2\slf4j-api-1.7.25.jarcompressed
MD5:CAAFE376AFB7086DCBEE79F780394CA3
SHA256:18C4A0095D5C1DA6B817592E767BB23D29DD2F560AD74DF75FF3961DBDE25B79
3028javaw.exeC:\Users\admin\.runelite\repository2\jopt-simple-5.0.1.jarjava
MD5:C5ED11011FDEAC9EC50826801D5ADCBB
SHA256:9F0C8D50FA4B79B6FF1502DBEC8502179D6B9497CACBE17A13074001AED537EC
3028javaw.exeC:\Users\admin\.runelite\repository2\jsr305-1.3.9.jarjava
MD5:1D5A772E400B04BB67A7EF4A0E0996D8
SHA256:905721A0EEA90A81534ABB7EE6EF4EA2E5E645FA1DEF0A5CD88402DF1B46C9ED
3028javaw.exeC:\Users\admin\.runelite\repository2\error_prone_annotations-2.0.18.jarcompressed
MD5:98051758C08C9B7111B3268655069432
SHA256:CB4CFAD870BF563A07199F3EBEA5763F0DEC440FCDA0B318640B1FEAA788656B
3028javaw.exeC:\Users\admin\.runelite\repository2\j2objc-annotations-1.1.jarcompressed
MD5:49AE3204BB0BB9B2AC77062641F4A6D7
SHA256:2994A7EB78F2710BD3D3BFB639B2C94E219CEDAC0D4D084D516E78C16DDDECF6
3028javaw.exeC:\Users\admin\.runelite\repository2\guava-23.2-jre.jarjava
MD5:242752D696208279A698FEA5FEAC507D
SHA256:5BE9A7D05BA0CCD74708BC8018AE412255F85843C0B92302E9B9BEFA6ED52564
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
52
TCP/UDP connections
18
DNS requests
191
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3028
javaw.exe
GET
200
172.64.143.9:80
http://static.runelite.net/bootstrap.json.sha256
US
binary
512 b
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/org/slf4j/slf4j-api/1.7.25/slf4j-api-1.7.25.jar
US
compressed
40.2 Kb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/com/google/errorprone/error_prone_annotations/2.0.18/error_prone_annotations-2.0.18.jar
US
compressed
11.7 Kb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/ch/qos/logback/logback-classic/1.2.3/logback-classic-1.2.3.jar
US
compressed
283 Kb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/com/google/guava/guava/23.2-jre/guava-23.2-jre.jar
US
java
2.53 Mb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/net/sf/jopt-simple/jopt-simple/5.0.1/jopt-simple-5.0.1.jar
US
java
76.9 Kb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/com/google/j2objc/j2objc-annotations/1.1/j2objc-annotations-1.1.jar
US
compressed
8.58 Kb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/com/google/inject/guice/4.1.0/guice-4.1.0-no_aop.jar
US
compressed
418 Kb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/com/google/code/findbugs/jsr305/1.3.9/jsr305-1.3.9.jar
US
java
32.2 Kb
suspicious
3028
javaw.exe
GET
200
172.64.143.9:80
http://mvn.runelite.net/javax/inject/javax.inject/1/javax.inject-1.jar
US
java
2.44 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3028
javaw.exe
213.199.247.21:80
runelite.site
Tarr Centrum Innowacyjnosci Sp. Zoo.
PL
suspicious
3028
javaw.exe
172.64.143.9:80
static.runelite.net
Cloudflare Inc
US
shared
3028
javaw.exe
172.64.142.9:80
static.runelite.net
Cloudflare Inc
US
shared
3192
java.exe
91.235.140.148:80
oldschool.runescape.com
Level 3 Communications, Inc.
GB
suspicious
3192
java.exe
217.163.53.225:80
oldschool10a.runescape.com
Level 3 Communications, Inc.
GB
unknown
3192
java.exe
172.64.142.9:443
static.runelite.net
Cloudflare Inc
US
shared
3192
java.exe
172.64.143.9:443
static.runelite.net
Cloudflare Inc
US
shared
3192
java.exe
217.163.53.225:43594
oldschool10a.runescape.com
Level 3 Communications, Inc.
GB
unknown
3192
java.exe
93.184.220.70:443
pbs.twimg.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3192
java.exe
217.163.53.229:43594
oldschool16a.runescape.com
Level 3 Communications, Inc.
GB
unknown

DNS requests

Domain
IP
Reputation
runelite.site
  • 213.199.247.21
suspicious
static.runelite.net
  • 172.64.143.9
  • 172.64.142.9
suspicious
mvn.runelite.net
  • 172.64.143.9
  • 172.64.142.9
suspicious
repo.runelite.net
  • 172.64.142.9
  • 172.64.143.9
suspicious
oldschool.runescape.com
  • 91.235.140.148
suspicious
oldschool10a.runescape.com
  • 217.163.53.225
unknown
api.runelite.net
  • 172.64.142.9
  • 172.64.143.9
suspicious
pbs.twimg.com
  • 93.184.220.70
whitelisted
oldschool1.runescape.com
  • 8.42.17.164
unknown
oldschool2a.runescape.com
  • 217.163.53.224
unknown

Threats

No threats detected
No debug info