File name: | TL_legacy_beta.jar |
Full analysis: | https://app.any.run/tasks/57145467-0bcd-4062-90ec-941a7549b04e |
Verdict: | Malicious activity |
Analysis date: | August 12, 2022, 17:50:35 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v1.0 to extract |
MD5: | 83547D1727806A69E16FE4C6C1417D2C |
SHA1: | 5655500DC45868B929328A96601807BF81FF2FD2 |
SHA256: | B59DA929C81B76F2EA1AD1280FEA1D550EFE02FCF89B13E6157E449F51E13617 |
SSDEEP: | 98304:WfEALdvFlvA8qqrAZfast+9FtMMypuf7qCHPoeefjGlOk:WnhqhJast4zypufmcAfjCOk |
.spe | | | SPSS Extension (54) |
---|---|---|
.jar | | | Java Archive (26.1) |
.zip | | | ZIP compressed archive (7.2) |
ZipFileName: | META-INF/ |
---|---|
ZipUncompressedSize: | - |
ZipCompressedSize: | 2 |
ZipCRC: | 0x00000000 |
ZipModifyDate: | 1980:02:01 00:00:00 |
ZipCompression: | Deflated |
ZipBitFlag: | 0x0800 |
ZipRequiredVersion: | 10 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3420 | "C:\Program Files\Common Files\Oracle\Java\javapath\java.exe" -jar TL_legacy_beta.jar | C:\Program Files\Common Files\Oracle\Java\javapath\java.exe | — | Explorer.EXE |
User: admin Company: Oracle Corporation Integrity Level: MEDIUM Description: Java(TM) Platform SE binary Exit code: 1 Version: 8.0.2710.9 | ||||
2912 | "C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -jar "C:\Users\admin\Desktop\TL_legacy_beta.jar" | C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe | — | Explorer.EXE |
User: admin Company: Oracle Corporation Integrity Level: MEDIUM Description: Java(TM) Platform SE binary Exit code: 0 Version: 8.0.2710.9 | ||||
1524 | C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M | C:\Windows\system32\icacls.exe | — | javaw.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3448 | "C:\Program Files\Java\jre1.8.0_271\bin\java.exe" -Xmx128m -Dfile.encoding=UTF-8 -Dtlauncher.systemCharset=windows-1252 -Dtlauncher.logFolder=C:\Users\admin\AppData\Roaming\.tlauncher\logs -classpath C:\Users\admin\Desktop\TL_legacy_beta.jar ru.turikhay.tlauncher.bootstrap.Bootstrap | C:\Program Files\Java\jre1.8.0_271\bin\java.exe | javaw.exe | |
User: admin Company: Oracle Corporation Integrity Level: MEDIUM Description: Java(TM) Platform SE binary Version: 8.0.2710.9 | ||||
2220 | "C:\Program Files\Google\Chrome\Application\chrome.exe" | C:\Program Files\Google\Chrome\Application\chrome.exe | Explorer.EXE | |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 86.0.4240.198 | ||||
944 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=86.0.4240.198 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x6e2ed988,0x6e2ed998,0x6e2ed9a4 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 86.0.4240.198 | ||||
288 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1056,8863874717908820364,11408490146910412739,131072 --enable-features=PasswordImport --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1040 /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 | ||||
2756 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1056,8863874717908820364,11408490146910412739,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1328 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | chrome.exe | |
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 86.0.4240.198 | ||||
1376 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,8863874717908820364,11408490146910412739,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1920 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 | ||||
1520 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,8863874717908820364,11408490146910412739,131072 --enable-features=PasswordImport --lang=en-US --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1928 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2220 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-62F69308-8AC.pma | — | |
MD5:— | SHA256:— | |||
2756 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Cache\index | binary | |
MD5:8C772F64340EFBFD804F1D607DD0359A | SHA256:6B68F12CBE2068A172BAA48DD37E5330FB17A06DA369A945F68B312C0F1C8A16 | |||
2912 | javaw.exe | C:\ProgramData\Oracle\Java\.oracle_jre_usage\17dfc292991c8061.timestamp | text | |
MD5:6E7F1733B5E9A7BADD5B90C933D6D1BE | SHA256:26663E12D80A92E4A7A7E89AD2B12064F0D4E0A509C314CD86D3E2C41A3C099F | |||
2220 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RFdf359.TMP | text | |
MD5:936EB7280DA791E6DD28EF3A9B46D39C | SHA256:CBAF2AFD831B32F6D1C12337EE5D2F090D6AE1F4DCB40B08BEF49BF52AD9721F | |||
2220 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat | binary | |
MD5:9C016064A1F864C8140915D77CF3389A | SHA256:0E7265D4A8C16223538EDD8CD620B8820611C74538E420A88E333BE7F62AC787 | |||
2220 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\LOG.old | text | |
MD5:EF1D5606A483BB6C72C81A3F649BEB18 | SHA256:BA083E7585ADA9936944FE56BC0141A544F18A01C3424E5C9F02375B34FE3D45 | |||
2220 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.old | text | |
MD5:995C92837E4775CAFFE387D51ADBA520 | SHA256:51247C3464FD988B72670002D01A57FBFF1348704D325DC8FF8817ED2459D0D9 | |||
2220 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old | text | |
MD5:5BD3C311F2136A7A88D3E197E55CF902 | SHA256:FA331915E1797E59979A3E4BCC2BD0D3DEAA039B94D4DB992BE251FD02A224B9 | |||
2220 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.old~RFdf388.TMP | text | |
MD5:81F483F77EE490F35306A4F94DB2286B | SHA256:82434CE3C9D13F509EBEEBE3A7A1A1DE9AB4557629D9FC855761E0CFA45E8BCE | |||
2220 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\LOG.old~RFdf463.TMP | text | |
MD5:109A25C32EE1132ECD6D9F3ED9ADF01A | SHA256:DA6028DB9485C65E683643658326F02B1D0A1566DE14914EF28E5248EB94F0DD |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
880 | svchost.exe | HEAD | 200 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvZjE0QUFYTUR2NXNIakJsbE5jbXNrUkdfQQ/4.10.2391.0_oimompecagnajdejgnnjijobebaeigek.crx | US | — | — | whitelisted |
2756 | chrome.exe | GET | 200 | 79.132.136.12:80 | http://ccl1.xyz/s/quxW | DE | html | 7.87 Kb | suspicious |
2756 | chrome.exe | GET | 200 | 23.216.77.69:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?e008457119bac0ea | US | compressed | 60.2 Kb | whitelisted |
880 | svchost.exe | GET | 206 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvZjE0QUFYTUR2NXNIakJsbE5jbXNrUkdfQQ/4.10.2391.0_oimompecagnajdejgnnjijobebaeigek.crx | US | binary | 5.67 Kb | whitelisted |
2756 | chrome.exe | GET | 200 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNzI0QUFXNV9zT2RvdUwyMERESEZGVmJnQQ/1.0.0.6_nmmhkkegccagdldgiimedpiccmgmieda.crx | US | crx | 242 Kb | whitelisted |
2756 | chrome.exe | GET | 200 | 79.132.136.12:80 | http://catcut.net/go/view.php?l=quxW | DE | html | 20.7 Kb | suspicious |
880 | svchost.exe | GET | 206 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvZjE0QUFYTUR2NXNIakJsbE5jbXNrUkdfQQ/4.10.2391.0_oimompecagnajdejgnnjijobebaeigek.crx | US | binary | 358 Kb | whitelisted |
880 | svchost.exe | GET | 206 | 34.104.35.123:80 | http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvZjE0QUFYTUR2NXNIakJsbE5jbXNrUkdfQQ/4.10.2391.0_oimompecagnajdejgnnjijobebaeigek.crx | US | binary | 43.5 Kb | whitelisted |
2756 | chrome.exe | GET | 200 | 79.132.136.12:80 | http://ccl1.xyz/go.php?ufgh=1 | DE | html | 7.95 Kb | suspicious |
2756 | chrome.exe | GET | 200 | 79.132.136.12:80 | http://catcut.net/away3.php?&b=b74b9862ccf5699e87c4ae4b9f960634.30205&c=f0368894b2a7427322730b03318410d3&d=&q=1&r=18&p=0&t=1&s=1&u14=8&v14=22&w7=42&x=03ANYolqvqIoFQmaNDJjlkxm15ZzZ7TqVfX-Tn0jKrOvjZjqeskfPHdy0oz2jfNv05njzhEjPmRbd9rRS06Mqv_43jDUFkVhN00AjdTIG1f_yPa_H1oXVruEwbC7evKKhtYBNt00a3Js57ar60wU7jGKA94Izb-4pO5xU12trmOCS61zgrdTPklJHLZl7l2LiqNfA_vGofAmWK7nPnmOJVwe75xrgLcSTi-01lJMvYMFZZrs3-c9_ORT3h3Fft5ovPfOrjm5uoi-7imX1P4oMi4lgkNCsLbGaD37pem6JAJpvnpXY4deCYnsaPO8-p5nu5aXOgcvuv0TI15-PtJUg9wG5MnXSUUgG9Ox1ntKK-noAJo9lAqb3PCXk6vLDAzl-0-fEuHrx5NLxzGfa7voZ8LDFafBMomr7JPEFSSqdkFiNT7Iodr2-UsvROImQuelnbtPbL0rI5SgmvaIyjcUyrU5ZhBO1BOU0lb9yAAoVBB9mUhqPaqV4kAGXHOJKhyBucVizxiPIxmFpUldNQSURfzU3Dml2vLVFbdg | DE | text | 33 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2756 | chrome.exe | 142.250.185.142:443 | clients2.google.com | Google Inc. | US | whitelisted |
2756 | chrome.exe | 142.250.185.195:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
2756 | chrome.exe | 142.250.186.138:443 | fonts.googleapis.com | Google Inc. | US | whitelisted |
3448 | java.exe | 151.236.71.1:443 | cdn.turikhay.ru | CDNvideo LLC | RU | suspicious |
2756 | chrome.exe | 216.58.212.132:443 | www.google.com | Google Inc. | US | whitelisted |
2756 | chrome.exe | 142.250.186.163:443 | fonts.gstatic.com | Google Inc. | US | whitelisted |
2756 | chrome.exe | 142.250.186.174:443 | apis.google.com | Google Inc. | US | whitelisted |
2756 | chrome.exe | 142.250.185.129:443 | clients2.googleusercontent.com | Google Inc. | US | whitelisted |
2756 | chrome.exe | 142.250.186.35:443 | update.googleapis.com | Google Inc. | US | whitelisted |
3448 | java.exe | 172.67.173.53:443 | tlaun.ch | — | US | malicious |
Domain | IP | Reputation |
---|---|---|
cdn.turikhay.ru |
| suspicious |
tlaun.ch |
| unknown |
eu01-www.tlaun.ch |
| unknown |
eu02-www.tlaun.ch |
| unknown |
ru01-www.tlaun.ch |
| suspicious |
ru02-www.tlaun.ch |
| unknown |
eu01-www.tln4.ru |
| unknown |
eu02-www.tln4.ru |
| unknown |
ru01-www.tln4.ru |
| suspicious |
ru02-www.tln4.ru |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
2756 | chrome.exe | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |
2756 | chrome.exe | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |
2756 | chrome.exe | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |
2756 | chrome.exe | Potentially Bad Traffic | AV INFO HTTP Request to a *.xyz domain |
— | — | Potentially Bad Traffic | ET DNS Query for .to TLD |
— | — | Potentially Bad Traffic | ET DNS Query for .to TLD |