File name:

zyczu-mc.jar

Full analysis: https://app.any.run/tasks/2b8e1869-1984-4161-86d0-f011c2b968d0
Verdict: Malicious activity
Analysis date: March 30, 2018, 10:57:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/java-archive
File info: Java archive data (JAR)
MD5:

483CF59AD76CCBCD95FE6C80796DD172

SHA1:

8F6AB62822C1042C09314D09097629B4CB63350A

SHA256:

DC1F5E79ECADFCEE517E1CD6FD69FFF9E90593952A2920C6AE5CAA6CA9A18E1D

SSDEEP:

49152:rXX1S9lmEKTsv9QaYBSRiTysqBwf5rczXRFqXpRPGW+v0aT15FjTGrA1Vbf1b1hM:illQ5dTys+M5rczzpvbTFPL91pu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application loaded dropped or rewritten executable

      • javaw.exe (PID: 932)
      • javaw.exe (PID: 2168)
  • SUSPICIOUS

    • Executes JAVA applets

      • javaw.exe (PID: 2168)
    • Creates files in the user directory

      • javaw.exe (PID: 2168)
      • javaw.exe (PID: 932)
    • Application launched itself

      • javaw.exe (PID: 2168)
  • INFO

    • Dropped object may contain URL's

      • javaw.exe (PID: 932)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2013:07:03 12:31:12
ZipCRC: 0x6a4f50f3
ZipCompressedSize: 198
ZipUncompressedSize: 388
ZipFileName: META-INF/MANIFEST.MF
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start javaw.exe javaw.exe

Process information

PID
CMD
Path
Indicators
Parent process
2168"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe" -jar "C:\Users\admin\AppData\Local\Temp\zyczu-mc.jar"C:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
explorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.920.14
Modules
Images
c:\program files\java\jre1.8.0_92\bin\javaw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
932javaw -Xms512m -Xmx1024m -classpath /C:/Users/admin/AppData/Local/Temp/zyczu-mc.jar net.minecraft.LauncherFrameC:\Program Files\Java\jre1.8.0_92\bin\javaw.exe
javaw.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
4294967295
Version:
8.0.920.14
Modules
Images
c:\program files\java\jre1.8.0_92\bin\javaw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
41
Read events
38
Write events
3
Delete events
0

Modification events

(PID) Process:(2168) javaw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
javaw.exe
(PID) Process:(932) javaw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
javaw.exe
(PID) Process:(932) javaw.exeKey:HKEY_CURRENT_USER\Software\JavaSoft\Prefs\zyczu
Operation:writeName:nick
Value:
twoj_nicks
Executable files
2
Suspicious files
63
Text files
101
Unknown types
496

Dropped files

PID
Process
Filename
Type
2168javaw.exeC:\Users\admin\AppData\Local\Temp\imageio8857441259504874495.tmp
MD5:
SHA256:
932javaw.exeC:\Users\admin\AppData\Local\Temp\imageio3620103039172164112.tmp
MD5:
SHA256:
932javaw.exeC:\Users\admin\AppData\Local\Temp\imageio3462948871503252318.tmp
MD5:
SHA256:
932javaw.exeC:\Users\admin\AppData\Local\Temp\imageio5235360272948312685.tmp
MD5:
SHA256:
932javaw.exeC:\Users\admin\AppData\Local\Temp\imageio2340148175969838264.tmp
MD5:
SHA256:
932javaw.exeC:\Users\admin\AppData\Local\Temp\imageio4213342240585325948.tmp
MD5:
SHA256:
932javaw.exeC:\Users\admin\AppData\Local\Temp\imageio6256311931365124448.tmp
MD5:
SHA256:
932javaw.exeC:\Users\admin\AppData\Local\Temp\imageio8877798562776491742.tmp
MD5:
SHA256:
932javaw.exeC:\Users\admin\AppData\Local\Temp\imageio9116915338004097337.tmp
MD5:
SHA256:
932javaw.exeC:\Users\admin\AppData\Local\Temp\imageio7143329653598461072.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
50
TCP/UDP connections
16
DNS requests
2
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.166.218.216:80
http://l7.minecraft.zyczu.pl/packages.xml
PL
xml
63.5 Kb
suspicious
GET
200
192.166.218.216:80
http://l7.minecraft.zyczu.pl/cat.xml
PL
xml
1.43 Kb
suspicious
GET
200
192.166.218.216:80
http://l7.minecraft.zyczu.pl/reklama.php
PL
text
183 b
suspicious
GET
200
192.166.218.216:80
http://l7.minecraft.zyczu.pl/repo.xml
PL
xml
1.77 Kb
suspicious
GET
200
192.166.218.216:80
http://l7.minecraft.zyczu.pl/repo.xml
PL
xml
1.77 Kb
suspicious
GET
200
192.166.218.216:80
http://l7.minecraft.zyczu.pl/repo.xml
PL
xml
1.77 Kb
suspicious
GET
200
192.166.218.216:80
http://l7.minecraft.zyczu.pl/update.php?version=10
PL
text
347 b
suspicious
GET
200
192.166.218.216:80
http://l7.minecraft.zyczu.pl/files.xml
PL
xml
185 Kb
suspicious
GET
200
192.166.218.216:80
http://l7.minecraft.zyczu.pl/repo.xml
PL
xml
1.77 Kb
suspicious
GET
200
192.166.218.216:80
http://l7.minecraft.zyczu.pl/modpacks.xml
PL
xml
6.98 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
151.80.109.154:80
oldforum.pokecraft.pl
OVH SAS
FR
unknown
192.166.218.216:80
l7.minecraft.zyczu.pl
Iwacom Sp. Z O.o.
PL
suspicious

DNS requests

Domain
IP
Reputation
l7.minecraft.zyczu.pl
  • 192.166.218.216
suspicious
oldforum.pokecraft.pl
  • 151.80.109.154
unknown

Threats

PID
Process
Class
Message
Misc Attack
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 256
No debug info