Overview
overview
10Static
static
3Rzlauncher Setup.exe
windows7-x64
8Rzlauncher Setup.exe
windows10-2004-x64
10jre/Welcome.html
windows7-x64
3jre/Welcome.html
windows10-2004-x64
3jre/bin/JA...32.dll
windows7-x64
3jre/bin/JA...32.dll
windows10-2004-x64
3jre/bin/JA...ge.dll
windows7-x64
3jre/bin/JA...ge.dll
windows10-2004-x64
3jre/bin/Ja...32.dll
windows7-x64
3jre/bin/Ja...32.dll
windows10-2004-x64
3jre/bin/Ja...ge.dll
windows7-x64
3jre/bin/Ja...ge.dll
windows10-2004-x64
3jre/bin/Wi...32.dll
windows7-x64
3jre/bin/Wi...32.dll
windows10-2004-x64
3jre/bin/Wi...ge.dll
windows7-x64
3jre/bin/Wi...ge.dll
windows10-2004-x64
3jre/bin/awt.dll
windows7-x64
3jre/bin/awt.dll
windows10-2004-x64
3jre/bin/bci.dll
windows7-x64
3jre/bin/bci.dll
windows10-2004-x64
3jre/bin/cl...vm.dll
windows7-x64
3jre/bin/cl...vm.dll
windows10-2004-x64
3jre/bin/dcpr.dll
windows7-x64
3jre/bin/dcpr.dll
windows10-2004-x64
3jre/bin/de...se.dll
windows7-x64
3jre/bin/de...se.dll
windows10-2004-x64
3jre/bin/deploy.dll
windows7-x64
3jre/bin/deploy.dll
windows10-2004-x64
3jre/bin/dt_shmem.dll
windows7-x64
3jre/bin/dt_shmem.dll
windows10-2004-x64
3jre/bin/dt_socket.dll
windows7-x64
3jre/bin/dt_socket.dll
windows10-2004-x64
3Analysis
-
max time kernel
41s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
Rzlauncher Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Rzlauncher Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
jre/Welcome.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
jre/Welcome.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
jre/bin/JavaAccessBridge.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
jre/bin/JavaAccessBridge.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral13
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
jre/bin/awt.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
jre/bin/awt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
jre/bin/bci.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
jre/bin/bci.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
jre/bin/client/jvm.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
jre/bin/client/jvm.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
jre/bin/dcpr.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
jre/bin/dcpr.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
jre/bin/decora_sse.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
jre/bin/decora_sse.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
jre/bin/deploy.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
jre/bin/deploy.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
jre/bin/dt_shmem.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
jre/bin/dt_shmem.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
jre/bin/dt_socket.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
jre/bin/dt_socket.dll
Resource
win10v2004-20240802-en
General
-
Target
Rzlauncher Setup.exe
-
Size
32KB
-
MD5
c919047959690a1646e561e81d45e5fd
-
SHA1
5bd528b9f0ec25ea19f0d0bbba41f4422597a488
-
SHA256
a9f0a76d6e73189b7385b6fcddeccb50e67b65c315b5c20108f86f22fce17802
-
SHA512
dee29e35b748bb69d0acc56d744eebd50cd462a93178072f9585dadd0c12b93907d7572832733ed0ba255909ae665a8cb102a360acfe3729365ea123480c3fca
-
SSDEEP
384:loI1gYZw33FUWUcC6TBhdsDgZH4o5NEvdlcn0ScPmPn0Avsl9EPg/s4Xsn+KvHKj:J7Zw33FNUf6Nhd/fQ1l+0vM0iT9
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
Processes:
Powershell.exePowershell.exepowershell.exepowershell.exepid Process 2656 Powershell.exe 2584 Powershell.exe 2656 Powershell.exe 2072 powershell.exe 2084 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
YTYzMDY4OTkzNjZmOGYyZTI3ODAxZjUwMzQyNjI4ZmI.exepid Process 2456 YTYzMDY4OTkzNjZmOGYyZTI3ODAxZjUwMzQyNjI4ZmI.exe -
Loads dropped DLL 1 IoCs
Processes:
YTYzMDY4OTkzNjZmOGYyZTI3ODAxZjUwMzQyNjI4ZmI.exepid Process 2456 YTYzMDY4OTkzNjZmOGYyZTI3ODAxZjUwMzQyNjI4ZmI.exe -
Drops file in System32 directory 1 IoCs
Processes:
mmc.exedescription ioc Process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Powershell.exePowershell.exepowershell.exepowershell.exeexplorer.exeYTYzMDY4OTkzNjZmOGYyZTI3ODAxZjUwMzQyNjI4ZmI.exeRzlauncher Setup.exejavaw.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YTYzMDY4OTkzNjZmOGYyZTI3ODAxZjUwMzQyNjI4ZmI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rzlauncher Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language javaw.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Powershell.exePowershell.exepowershell.exepowershell.exepid Process 2656 Powershell.exe 2584 Powershell.exe 2584 Powershell.exe 2584 Powershell.exe 2656 Powershell.exe 2656 Powershell.exe 2072 powershell.exe 2084 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Powershell.exePowershell.exepowershell.exepowershell.exemmc.exedescription pid Process Token: SeDebugPrivilege 2656 Powershell.exe Token: SeDebugPrivilege 2584 Powershell.exe Token: SeDebugPrivilege 2072 powershell.exe Token: SeDebugPrivilege 2084 powershell.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe Token: 33 1352 mmc.exe Token: SeIncBasePriorityPrivilege 1352 mmc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
javaw.exemmc.exepid Process 1320 javaw.exe 1352 mmc.exe 1352 mmc.exe 1320 javaw.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
Rzlauncher Setup.exejavaw.exePowershell.exePowershell.exeexplorer.exedescription pid Process procid_target PID 2520 wrote to memory of 1320 2520 Rzlauncher Setup.exe 30 PID 2520 wrote to memory of 1320 2520 Rzlauncher Setup.exe 30 PID 2520 wrote to memory of 1320 2520 Rzlauncher Setup.exe 30 PID 2520 wrote to memory of 1320 2520 Rzlauncher Setup.exe 30 PID 2520 wrote to memory of 1320 2520 Rzlauncher Setup.exe 30 PID 2520 wrote to memory of 1320 2520 Rzlauncher Setup.exe 30 PID 2520 wrote to memory of 1320 2520 Rzlauncher Setup.exe 30 PID 1320 wrote to memory of 2656 1320 javaw.exe 31 PID 1320 wrote to memory of 2656 1320 javaw.exe 31 PID 1320 wrote to memory of 2656 1320 javaw.exe 31 PID 1320 wrote to memory of 2656 1320 javaw.exe 31 PID 1320 wrote to memory of 2656 1320 javaw.exe 31 PID 1320 wrote to memory of 2656 1320 javaw.exe 31 PID 1320 wrote to memory of 2656 1320 javaw.exe 31 PID 1320 wrote to memory of 2584 1320 javaw.exe 32 PID 1320 wrote to memory of 2584 1320 javaw.exe 32 PID 1320 wrote to memory of 2584 1320 javaw.exe 32 PID 1320 wrote to memory of 2584 1320 javaw.exe 32 PID 1320 wrote to memory of 2584 1320 javaw.exe 32 PID 1320 wrote to memory of 2584 1320 javaw.exe 32 PID 1320 wrote to memory of 2584 1320 javaw.exe 32 PID 2656 wrote to memory of 2072 2656 Powershell.exe 35 PID 2656 wrote to memory of 2072 2656 Powershell.exe 35 PID 2656 wrote to memory of 2072 2656 Powershell.exe 35 PID 2656 wrote to memory of 2072 2656 Powershell.exe 35 PID 2656 wrote to memory of 2072 2656 Powershell.exe 35 PID 2656 wrote to memory of 2072 2656 Powershell.exe 35 PID 2656 wrote to memory of 2072 2656 Powershell.exe 35 PID 2584 wrote to memory of 2084 2584 Powershell.exe 36 PID 2584 wrote to memory of 2084 2584 Powershell.exe 36 PID 2584 wrote to memory of 2084 2584 Powershell.exe 36 PID 2584 wrote to memory of 2084 2584 Powershell.exe 36 PID 2584 wrote to memory of 2084 2584 Powershell.exe 36 PID 2584 wrote to memory of 2084 2584 Powershell.exe 36 PID 2584 wrote to memory of 2084 2584 Powershell.exe 36 PID 1320 wrote to memory of 300 1320 javaw.exe 41 PID 1320 wrote to memory of 300 1320 javaw.exe 41 PID 1320 wrote to memory of 300 1320 javaw.exe 41 PID 1320 wrote to memory of 300 1320 javaw.exe 41 PID 1320 wrote to memory of 300 1320 javaw.exe 41 PID 1320 wrote to memory of 300 1320 javaw.exe 41 PID 1320 wrote to memory of 300 1320 javaw.exe 41 PID 872 wrote to memory of 2456 872 explorer.exe 43 PID 872 wrote to memory of 2456 872 explorer.exe 43 PID 872 wrote to memory of 2456 872 explorer.exe 43 PID 872 wrote to memory of 2456 872 explorer.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rzlauncher Setup.exe"C:\Users\Admin\AppData\Local\Temp\Rzlauncher Setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe"C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\activation.jar;lib\asm-all.jar;lib\commons-email.jar;lib\cs2 skin.mp4;lib\dn-compiled-module.jar;lib\dn-php-sdk.jar;lib\gson.jar;lib\jfoenix.jar;lib\jkeymaster.jar;lib\jna.jar;lib\jphp-app-framework.jar;lib\jphp-core.jar;lib\jphp-desktop-ext.jar;lib\jphp-desktop-hotkey-ext.jar;lib\jphp-gui-ext.jar;lib\jphp-gui-jfoenix-ext.jar;lib\jphp-json-ext.jar;lib\jphp-jsoup-ext.jar;lib\jphp-mail-ext.jar;lib\jphp-runtime.jar;lib\jphp-systemtray-ext.jar;lib\jphp-xml-ext.jar;lib\jphp-zend-ext.jar;lib\jphp-zip-ext.jar;lib\jsoup.jar;lib\mail.jar;lib\slf4j-api.jar;lib\slf4j-simple.jar;lib\zenless zero.mp4;lib\zt-zip.jar" org.develnext.jphp.ext.javafx.FXLauncher2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command "Add-MpPreference -Force -ExclusionPath "C:\""' -Verb RunAs}"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -Force -ExclusionPath C:"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command "Set-MpPreference -Force -DisableBehaviorMonitoring "' -Verb RunAs}"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-MpPreference -Force -DisableBehaviorMonitoring4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\YTYzMDY4OTkzNjZmOGYyZTI3ODAxZjUwMzQyNjI4ZmI.exe3⤵
- System Location Discovery: System Language Discovery
PID:300
-
-
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1352
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\YTYzMDY4OTkzNjZmOGYyZTI3ODAxZjUwMzQyNjI4ZmI.exe"C:\Users\Admin\AppData\Local\Temp\YTYzMDY4OTkzNjZmOGYyZTI3ODAxZjUwMzQyNjI4ZmI.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD51c83b86ee49577920f79e0175f56a480
SHA11ac4ef5a1f9ca34ac229bc26cdc914e38173c554
SHA25672a88efeda156c7304c5c8bd090dcb011ba3dfbbe91f5511969ba8eecee32843
SHA512d4b4ec415e92617548e863422f653b97460be182205871bf7526fe872d110e8ac17b60472d8351bed62e20ee584424816eeafcafe69ce096596ee044e1df022d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD55f4267e1746a5e33faf3b732137c7eca
SHA1f3f8944a8426cec81fe3070d02b7fab67173e45c
SHA256cc45cd7abf806b6adfed6e9a29c18ee8d3f6e0932ee81fafe5bcdbee3c6a76a6
SHA5129628db49d5e8356d697843423e83b3a4822b28cf0efffc103642c9a961fca7f796b7939afbec3e5dfd9fced4689b36c9385d2eab93ab1c7dcf6e8d0208267b36
-
Filesize
351KB
MD5a7e9d0bb0687ba84a60b387a2a6fa8d9
SHA1d224cf061e302d82059ff9100f40b86b0cbbbc31
SHA2567704fea9664704d6cf2aa277e30f58c71b8a5f50c957d519896450a4f81e3dbe
SHA512185f52af9930a03dbccd3c160e4f6d3eedacf72999933b44c36268e45d233b617c36190c05d63211a9d0e99d448d03e5c927fcc2700d6b5244c987cfe33def88