Analysis

  • max time kernel
    131s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 13:05

General

  • Target

    Rusticaland-launcher.exe

  • Size

    64.8MB

  • MD5

    cf54cb776822a73090dc6b676e38782a

  • SHA1

    f1ac2a51e35e30c07ed2df769135295d3a5a88bf

  • SHA256

    fc93d7953819ec00809d4b231ce8b96d67d3a8cd46d13d0becb463fe16bde68f

  • SHA512

    8cb5dcb036662939b45d4c6ef991291f6d5efbac5fff79a01c43181632acd081f68f6ffe4459aec1ee2c7d3880ef8fcd5e44b85e173491034ccb5945be89c081

  • SSDEEP

    1572864:R9LHOdEv/78Bl9Bzs7hwOq/VE2kUC7dTiMuR34H8P7o92Zh:zjOU/e9FOIaLW1xP7o92Z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Rusticaland-launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\Rusticaland-launcher.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Users\Admin\AppData\Local\Temp\ZipExtractor.exe
      "C:\Users\Admin\AppData\Local\Temp\ZipExtractor.exe" "C:\Users\Admin\AppData\Local\Temp\Rusticaland-launcher.zip" "C:\Users\Admin\AppData\Local\Temp\Rusticaland-launcher.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:556
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2668 -s 3480
      2⤵
      • Loads dropped DLL
      PID:1732

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Cab7D9B.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar7DBD.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\ZipExtractor.exe

          Filesize

          103KB

          MD5

          dda26abcea9aa9cad843f8dfe348fac8

          SHA1

          3d21afc1824129af40b570e9a2550aa7d85d2970

          SHA256

          b9da405d11a1572c9d4b841ab86721ebc7f8dcaa1d266c98f46fc0ceaecb849f

          SHA512

          22807cd4ec4a7aa62c9ebe1781ed6410c1c13cc65ca9e230af3385e6020d90b99986d04764a0f14e1d2d53c6c272f976e1a3b74b6176527e3023c72ac4883ea2

        • C:\Users\Admin\AppData\Roaming\Rusticaland\QuickLauncher\MissingResources.zip

          Filesize

          474KB

          MD5

          3ad18aa86939ac43408c3f75e3644387

          SHA1

          259afcf64c5ddbefe54e72b7dfaf284b947b2a64

          SHA256

          2275cbaa3440b7b657a0cd61098bfe62ab93ede23fd6234869a576155990aadc

          SHA512

          c83c5acf3a01c35c356c284de09bfdc59715331470cba75eadbc7d083da0ae18e963661915bacf55ee91682fe01155cacf9710b85583bcc12648786b81c323d6

        • C:\Users\Admin\AppData\Roaming\Rusticaland\QuickLauncher\Nuclear.wma

          Filesize

          5.0MB

          MD5

          ecc578e589d671109bbc291268e24854

          SHA1

          2c7153ad8b0464c679cf28344f787bab713ba878

          SHA256

          ddf635d42349620ecf288b1b2bc4006f9a4849c5b136847c9c5e44651790dc6a

          SHA512

          9b1691a7236be5c0a04421f65fdd91b3bdbf283879c92e8076f11c50bacafcd6faa746e743e73c65b971ce9678098630daac0d88a52ed2c2ba1af4f51d60a998

        • \Users\Admin\AppData\Local\Temp\WebView2Loader.dll

          Filesize

          156KB

          MD5

          1ba96800bad54c6019fdb6fe41fca592

          SHA1

          b443b01719c3046d9107e93d181d5da38e6650aa

          SHA256

          dcf3c4f6024313eeb6f775ed343265d73be1ce1d5dde2f92195dbc32310c7fc9

          SHA512

          499764e2c75e9afb25e19941312221d3fce7c058ffac8293db5986a6a9b8dd77c45bf93311858470bec9afbd64dc3068b3d9a26d3e01051b9d51c02b1c2484c2

        • memory/556-120-0x0000000000350000-0x0000000000370000-memory.dmp

          Filesize

          128KB

        • memory/2668-11-0x0000000000F90000-0x000000000104E000-memory.dmp

          Filesize

          760KB

        • memory/2668-27-0x000000002E030000-0x000000002E242000-memory.dmp

          Filesize

          2.1MB

        • memory/2668-9-0x0000000021480000-0x00000000227E4000-memory.dmp

          Filesize

          19.4MB

        • memory/2668-10-0x00000000227F0000-0x0000000022D02000-memory.dmp

          Filesize

          5.1MB

        • memory/2668-0-0x000007FEF5A23000-0x000007FEF5A24000-memory.dmp

          Filesize

          4KB

        • memory/2668-12-0x0000000000C90000-0x0000000000C9C000-memory.dmp

          Filesize

          48KB

        • memory/2668-14-0x000000001FB40000-0x000000001FBF2000-memory.dmp

          Filesize

          712KB

        • memory/2668-13-0x000000001F300000-0x000000001F36C000-memory.dmp

          Filesize

          432KB

        • memory/2668-16-0x000000001F370000-0x000000001F3C0000-memory.dmp

          Filesize

          320KB

        • memory/2668-15-0x00000000201B0000-0x0000000020288000-memory.dmp

          Filesize

          864KB

        • memory/2668-18-0x000000001FAF0000-0x000000001FB36000-memory.dmp

          Filesize

          280KB

        • memory/2668-19-0x000000002C4F0000-0x000000002C6CE000-memory.dmp

          Filesize

          1.9MB

        • memory/2668-20-0x000000002C6D0000-0x000000002CB52000-memory.dmp

          Filesize

          4.5MB

        • memory/2668-21-0x000000002CB50000-0x000000002D306000-memory.dmp

          Filesize

          7.7MB

        • memory/2668-22-0x0000000025A10000-0x0000000025AF6000-memory.dmp

          Filesize

          920KB

        • memory/2668-23-0x0000000026390000-0x000000002647C000-memory.dmp

          Filesize

          944KB

        • memory/2668-24-0x000000002D310000-0x000000002D9A0000-memory.dmp

          Filesize

          6.6MB

        • memory/2668-25-0x000000002D9A0000-0x000000002DD3A000-memory.dmp

          Filesize

          3.6MB

        • memory/2668-26-0x000000002DD40000-0x000000002E034000-memory.dmp

          Filesize

          3.0MB

        • memory/2668-8-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2668-28-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2668-29-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2668-30-0x00000000307C0000-0x0000000031028000-memory.dmp

          Filesize

          8.4MB

        • memory/2668-31-0x0000000031030000-0x00000000313E6000-memory.dmp

          Filesize

          3.7MB

        • memory/2668-7-0x0000000000C70000-0x0000000000C78000-memory.dmp

          Filesize

          32KB

        • memory/2668-6-0x0000000000C50000-0x0000000000C66000-memory.dmp

          Filesize

          88KB

        • memory/2668-5-0x0000000000900000-0x000000000091C000-memory.dmp

          Filesize

          112KB

        • memory/2668-91-0x000007FEF5A23000-0x000007FEF5A24000-memory.dmp

          Filesize

          4KB

        • memory/2668-92-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2668-94-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2668-95-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2668-102-0x000000001FDA0000-0x000000001FDB0000-memory.dmp

          Filesize

          64KB

        • memory/2668-4-0x0000000020790000-0x000000002147A000-memory.dmp

          Filesize

          12.9MB

        • memory/2668-106-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2668-108-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2668-111-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2668-112-0x000007FEF5A20000-0x000007FEF640C000-memory.dmp

          Filesize

          9.9MB

        • memory/2668-3-0x00000000008E0000-0x00000000008FA000-memory.dmp

          Filesize

          104KB

        • memory/2668-2-0x00000000008D0000-0x00000000008DA000-memory.dmp

          Filesize

          40KB

        • memory/2668-1-0x0000000001060000-0x0000000005132000-memory.dmp

          Filesize

          64.8MB