analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

iCapture.jnlp

Full analysis: https://app.any.run/tasks/1fe5e64c-a061-4229-85ed-f00ea6e13659
Verdict: Malicious activity
Analysis date: November 08, 2018, 12:51:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/xml
File info: XML 1.0 document, ASCII text, with CRLF line terminators
MD5:

374C3C4F82E4B9DACDD47DDBEB3F75CC

SHA1:

9630D19478A97135E7FD926995837CE75F2AA73D

SHA256:

D5E48BEC5F07FC3FB83B5ED2D1CC8F0C13AE233980250FE99F0EA8817B7E6B3C

SSDEEP:

24:2daMgR4BIpU2p4Fa8jGPAZkLgYUzY4HBEQsR4BoVEsR4BoZom9zvn:caYB4uPBEQDBoyDBoZomJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Creates files in the user directory

      • jp2launcher.exe (PID: 292)
    • Application launched itself

      • javaws.exe (PID: 3668)
    • Check for Java to be installed

      • javaws.exe (PID: 3668)
    • Connects to unusual port

      • jp2launcher.exe (PID: 292)
    • Executes JAVA applets

      • javaws.exe (PID: 3668)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.jnlp | Java Web Start application descriptor (88.3)
.xml | Generic XML (ASCII) (11.6)

EXIF

XMP

JnlpApplication-descArgument: remotedeposit.myfirstfarmers.com
JnlpApplication-descMain-class: com.sei.swing.client.MainFrame
JnlpResourcesJarMain:
JnlpResourcesJarHref: sThinClient.jar
JnlpResourcesJ2seHref: http://java.sun.com/products/autodl/j2se
JnlpResourcesJ2seVersion: 1.6+
JnlpResourcesOs: Windows
JnlpSecurityAll-permissions: -
JnlpInformationOffline-allowed: -
JnlpInformationDescriptionKind: short
JnlpInformationDescription: iCapture Thin Client
JnlpInformationHomepageHref: http://www.softwareearnings.com
JnlpInformationVendor: SEI 3.2.12.5
JnlpInformationTitle: iCapture Thin Client
JnlpHref: iCapture.jnlp
JnlpCodebase: https://remotedeposit.myfirstfarmers.com:8443/iCapWeb
JnlpSpec: 1.0+
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start javaws.exe no specs javaw.exe no specs javaw.exe no specs javaw.exe no specs javaws.exe jp2launcher.exe

Process information

PID
CMD
Path
Indicators
Parent process
3668"C:\Program Files\Java\jre1.8.0_92\bin\javaws.exe" "C:\Users\admin\AppData\Local\Temp\iCapture.jnlp"C:\Program Files\Java\jre1.8.0_92\bin\javaws.exeexplorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Web Start Launcher
Exit code:
0
Version:
11.92.2.14
2904"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -cp "C:\PROGRA~1\Java\JRE18~1.0_9\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.11.92.2" "later"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exejavaws.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
3120"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -cp "C:\PROGRA~1\Java\JRE18~1.0_9\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.timestamp.11.92.2" "1541681539"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exejavaws.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
3728"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -cp "C:\PROGRA~1\Java\JRE18~1.0_9\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.suppression.11.92.2" "false"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exejavaws.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
2244JavaWSSplashScreen -splash 49314 "C:\Program Files\Java\jre1.8.0_92\lib\deploy\splash.gif"C:\Program Files\Java\jre1.8.0_92\bin\javaws.exe
javaws.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Web Start Launcher
Exit code:
0
Version:
11.92.2.14
292"C:\Program Files\Java\jre1.8.0_92\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_92" -vma LWNsYXNzcGF0aABDOlxQcm9ncmFtIEZpbGVzXEphdmFcanJlMS44LjBfOTJcbGliXGRlcGxveS5qYXIALURqYXZhLnNlY3VyaXR5LnBvbGljeT1maWxlOkM6XFByb2dyYW0gRmlsZXNcSmF2YVxqcmUxLjguMF85MlxsaWJcc2VjdXJpdHlcamF2YXdzLnBvbGljeQAtRHRydXN0UHJveHk9dHJ1ZQAtWHZlcmlmeTpyZW1vdGUALURqbmxweC5ob21lPUM6XFByb2dyYW0gRmlsZXNcSmF2YVxqcmUxLjguMF85MlxiaW4ALURqYXZhLnNlY3VyaXR5Lm1hbmFnZXIALURqbmxweC5vcmlnRmlsZW5hbWVBcmc9QzpcVXNlcnNcYWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXGlDYXB0dXJlLmpubHAALURqbmxweC5yZW1vdmU9dHJ1ZQAtRHN1bi5hd3Qud2FybXVwPXRydWUALVhib290Y2xhc3NwYXRoL2E6QzpcUHJvZ3JhbSBGaWxlc1xKYXZhXGpyZTEuOC4wXzkyXGxpYlxqYXZhd3MuamFyO0M6XFByb2dyYW0gRmlsZXNcSmF2YVxqcmUxLjguMF85MlxsaWJcZGVwbG95LmphcjtDOlxQcm9ncmFtIEZpbGVzXEphdmFcanJlMS44LjBfOTJcbGliXHBsdWdpbi5qYXIALURqbmxweC5zcGxhc2hwb3J0PTQ5MzE2AC1Eam5scHguanZtPUM6XFByb2dyYW0gRmlsZXNcSmF2YVxqcmUxLjguMF85MlxiaW5camF2YXcuZXhl -ma QzpcVXNlcnNcYWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXGphdmF3czI=C:\Program Files\Java\jre1.8.0_92\bin\jp2launcher.exe
javaws.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Web Launcher
Version:
11.92.2.14
Total events
203
Read events
93
Write events
100
Delete events
10

Modification events

(PID) Process:(2904) javaw.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
Operation:delete keyName:
Value:
(PID) Process:(2904) javaw.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
Operation:writeName:deployment.modified.timestamp
Value:
1535457890299
(PID) Process:(2904) javaw.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
Operation:writeName:deployment.roaming.profile
Value:
false
(PID) Process:(2904) javaw.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
Operation:writeName:deployment.version
Value:
8
(PID) Process:(2904) javaw.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
Operation:writeName:deployment.expired.version
Value:
11.92.2
(PID) Process:(2904) javaw.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
Operation:writeName:deployment.browser.path
Value:
C:\Program Files\Internet Explorer\iexplore.exe
(PID) Process:(2904) javaw.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
Operation:writeName:deployment.expiration.decision.11.92.2
Value:
later
(PID) Process:(3120) javaw.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
Operation:delete keyName:
Value:
(PID) Process:(3120) javaw.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
Operation:writeName:deployment.modified.timestamp
Value:
1541681539788
(PID) Process:(3120) javaw.exeKey:HKEY_CURRENT_USER\Software\AppDataLow\Software\JavaSoft\DeploymentProperties
Operation:writeName:deployment.roaming.profile
Value:
false
Executable files
10
Suspicious files
4
Text files
30
Unknown types
34

Dropped files

PID
Process
Filename
Type
292jp2launcher.exeC:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\202866f-79fc3457-temp
MD5:
SHA256:
292jp2launcher.exeC:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\43\743d94ab-79867acf-temp
MD5:
SHA256:
2904javaw.exeC:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\deployment.propertiestext
MD5:13414F6F62EF9875EF6D2907938B19CC
SHA256:C250D22F71F67BFA0236F9F0DBB4004082F73B7D1882881618E1858B0ADDB3F5
3120javaw.exeC:\Users\admin\AppData\Local\Temp\JavaDeployReg.logtext
MD5:BA74E2A6D0EE8470CB1E3302570927EA
SHA256:80CE47D47233191C6F8D7D55D4A43ADD783BB561183CCDB82C678E67F75CDB6B
3728javaw.exeC:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\deployment.propertiestext
MD5:8059FE6689A4268899B962289A886730
SHA256:F3DA38E2F331835DC6DD4E68DF72B09E099F181986B38F03448C7516AC413BE0
3120javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:439E604AA78FEA83BECDF574A98B4C8E
SHA256:444AC3F388EC0FA5594D93A087E009E8419E70B321830DEB31A006503324E018
3728javaw.exeC:\Users\admin\.oracle_jre_usage\90737d32e3abaa4.timestamptext
MD5:09A973855965209AB0BA08D96EB041CA
SHA256:C0A3D3A978974E3D14CCA476DF352C4247BF28FDABE2CBEF3DA527A0B6540162
2904javaw.exeC:\Users\admin\AppData\Local\Temp\JavaDeployReg.logtext
MD5:C9E7E7ACF925E83E7050C71AD3390FBB
SHA256:4422D367BAD2BDED188FE9412AE56422713BEEA27BCE1622952A499B2A3B676E
292jp2launcher.exeC:\Users\admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\202866f-79fc3457xml
MD5:374C3C4F82E4B9DACDD47DDBEB3F75CC
SHA256:D5E48BEC5F07FC3FB83B5ED2D1CC8F0C13AE233980250FE99F0EA8817B7E6B3C
3668javaws.exeC:\Users\admin\AppData\Local\Temp\javaws2xml
MD5:374C3C4F82E4B9DACDD47DDBEB3F75CC
SHA256:D5E48BEC5F07FC3FB83B5ED2D1CC8F0C13AE233980250FE99F0EA8817B7E6B3C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
59
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
292
jp2launcher.exe
POST
200
188.121.36.239:80
http://ocsp.godaddy.com/
NL
der
1.66 Kb
whitelisted
292
jp2launcher.exe
POST
200
188.121.36.239:80
http://ocsp.godaddy.com/
NL
der
1.74 Kb
whitelisted
292
jp2launcher.exe
POST
200
188.121.36.239:80
http://ocsp.godaddy.com/
NL
der
1.69 Kb
whitelisted
292
jp2launcher.exe
POST
200
188.121.36.239:80
http://ocsp.godaddy.com/
NL
der
1.66 Kb
whitelisted
292
jp2launcher.exe
POST
200
188.121.36.239:80
http://ocsp.godaddy.com/
NL
der
1.74 Kb
whitelisted
292
jp2launcher.exe
POST
200
188.121.36.239:80
http://ocsp.godaddy.com/
NL
der
1.69 Kb
whitelisted
292
jp2launcher.exe
POST
200
23.37.43.27:80
http://s2.symcb.com/
NL
der
1.71 Kb
whitelisted
292
jp2launcher.exe
POST
200
23.37.43.27:80
http://sv.symcd.com/
NL
der
1.57 Kb
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
292
jp2launcher.exe
12.23.248.187:8443
remotedeposit.myfirstfarmers.com
AT&T Services, Inc.
US
unknown
292
jp2launcher.exe
188.121.36.239:80
ocsp.godaddy.com
GoDaddy.com, LLC
NL
unknown
292
jp2launcher.exe
23.37.43.27:80
s2.symcb.com
Akamai Technologies, Inc.
NL
whitelisted
292
jp2launcher.exe
184.31.87.231:443
javadl-esd-secure.oracle.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
remotedeposit.myfirstfarmers.com
  • 12.23.248.187
unknown
ocsp.godaddy.com
  • 188.121.36.239
whitelisted
javadl-esd-secure.oracle.com
  • 184.31.87.231
whitelisted
s2.symcb.com
  • 23.37.43.27
whitelisted
sv.symcd.com
  • 23.37.43.27
shared

Threats

No threats detected
No debug info