download:

/attachments/1288943282986156094/1318282393295126579/ArbuzRepair.jar

Full analysis: https://app.any.run/tasks/61c06e8b-338e-47d9-9d58-2747062949d7
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 16, 2024, 18:25:11
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
java
arch-doc
discord
stealer
Indicators:
MIME: application/java-archive
File info: Java archive data (JAR)
MD5:

CBFA7250D73DE40FCC2E6C4E32ADF98B

SHA1:

FD1C7D45E269F1C814A44734A342057331A1D61E

SHA256:

B720527F5B24723C1436D2433E05B32B7E12A09645C3ABAEAB62A39320C5D6EE

SSDEEP:

98304:cw2Xz537BosGvRbCG1BMmx6FnqjjdUrSLPEQ8DORYOMi4TPy0T1gEfLpWNUkf4k+:4rT6KeBa5D2k6QAHxmSG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • javaw.exe (PID: 6328)
    • Steals credentials from Web Browsers

      • javaw.exe (PID: 6328)
  • SUSPICIOUS

    • Get information on the list of running processes

      • javaw.exe (PID: 6328)
    • Executable content was dropped or overwritten

      • javaw.exe (PID: 6328)
  • INFO

    • Reads the computer name

      • javaw.exe (PID: 6328)
    • Checks supported languages

      • javaw.exe (PID: 6328)
    • Application based on Java

      • javaw.exe (PID: 6328)
    • Reads the machine GUID from the registry

      • javaw.exe (PID: 6328)
    • Creates files or folders in the user directory

      • javaw.exe (PID: 6328)
    • Create files in a temporary directory

      • javaw.exe (PID: 6328)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.jar | Java Archive (78.3)
.zip | ZIP compressed archive (21.6)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0808
ZipCompression: Deflated
ZipModifyDate: 2024:12:16 18:46:50
ZipCRC: 0x4a5dea8c
ZipCompressedSize: 22841
ZipUncompressedSize: 142300
ZipFileName: a/a/a/a.class
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start javaw.exe icacls.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs tasklist.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6328"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -jar C:\Users\admin\AppData\Local\Temp\ArbuzRepair.jarC:\Program Files\Java\jre1.8.0_271\bin\javaw.exe
explorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6428C:\WINDOWS\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\System32\icacls.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6436\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6796tasklistC:\Windows\System32\tasklist.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6804\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetasklist.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6984tasklistC:\Windows\System32\tasklist.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6992\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetasklist.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
808
Read events
808
Write events
0
Delete events
0

Modification events

No data
Executable files
7
Suspicious files
5
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
6328javaw.exeC:\Users\admin\AppData\Local\Temp\sqlite-3.42.0.0-a0705fe9-cfe6-401e-9182-8d37a8fa0a77-sqlitejdbc.dllexecutable
MD5:16D165C26C43D841B5EC73D8E0D6FC9D
SHA256:451E319B14CF9B35B99CCA2D245E50E97205B7DCABEECCD8FEC6BB54C8A2E84C
6328javaw.exeC:\ProgramData\Oracle\Java\.oracle_jre_usage\17dfc292991c8061.timestamptext
MD5:324FC2E7C51FA270EE99CF68908B98B0
SHA256:9A4E921E97A15F5B51CD3076DBEFA2F4E3132DAEF33DAE0F390906404FECA9E2
6328javaw.exeC:\Users\admin\AppData\Local\Temp\jna-92668751\jna4440393796885304955.dllexecutable
MD5:719D6BA1946C25AA61CE82F90D77FFD5
SHA256:69C45175ECFD25AF023F96AC0BB2C45E6A95E3BA8A5A50EE7969CCAB14825C44
6328javaw.exeC:\Users\admin\AppData\Local\Runtime.jarjava
MD5:28E4496E24CE85653D571EFD29390B78
SHA256:A07CDDBB51C3C2ADFC05C52A5161817611A7B9B4BFA8A0E224EB234B48638043
6328javaw.exeC:\Users\admin\AppData\Local\Temp\sqlite-3.42.0.0-ab2c12d1-e048-4ad1-8b63-5382d4646b01-sqlitejdbc.dllexecutable
MD5:16D165C26C43D841B5EC73D8E0D6FC9D
SHA256:451E319B14CF9B35B99CCA2D245E50E97205B7DCABEECCD8FEC6BB54C8A2E84C
6328javaw.exeC:\Users\admin\AppData\Local\Temp\sqlite-jdbc-3.42.0.0.jarjava
MD5:6A46DB3A6F38043FFB7E6782708CD401
SHA256:53174D76087BB73CC29DB9C02766FB921FD7FC652F7952F3609E0018E3DD5DED
6328javaw.exeC:\Users\admin\AppData\Local\Temp\sqlite-3.42.0.0-f46bbfa9-7bbd-4118-8c66-d7a918a1ac64-sqlitejdbc.dllexecutable
MD5:16D165C26C43D841B5EC73D8E0D6FC9D
SHA256:451E319B14CF9B35B99CCA2D245E50E97205B7DCABEECCD8FEC6BB54C8A2E84C
6328javaw.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Temp Login Databinary
MD5:29A644B1F0D96166A05602FE27B3F4AD
SHA256:BF96902FEB97E990A471492F78EE8386BCF430D66BDAEFDEAFBF912C8CF7CE46
6328javaw.exeC:\Users\admin\AppData\Local\Temp\sqlite-3.42.0.0-7f90abda-fb96-4303-8371-815c6187679f-sqlitejdbc.dllexecutable
MD5:16D165C26C43D841B5EC73D8E0D6FC9D
SHA256:451E319B14CF9B35B99CCA2D245E50E97205B7DCABEECCD8FEC6BB54C8A2E84C
6328javaw.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Temp Login Databinary
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
40
DNS requests
22
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3736
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5736
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
3736
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5736
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
2624
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.23.209.149:443
www.bing.com
Akamai International B.V.
GB
whitelisted
1176
svchost.exe
20.190.159.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 2.16.164.106
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
www.bing.com
  • 2.23.209.149
  • 2.23.209.140
  • 2.23.209.133
  • 2.23.209.182
  • 2.23.209.189
  • 2.23.209.179
  • 2.23.209.185
  • 2.23.209.130
  • 2.23.209.187
whitelisted
login.live.com
  • 20.190.159.4
  • 20.190.159.68
  • 40.126.31.71
  • 20.190.159.23
  • 20.190.159.64
  • 20.190.159.75
  • 20.190.159.2
  • 40.126.31.73
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
log.easyfor.me
  • 172.67.184.178
  • 104.21.40.102
unknown
search.maven.org
  • 3.217.3.145
  • 44.195.191.17
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
6328
javaw.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
No debug info