Overview
overview
10Static
static
3Rzlauncher Setup.exe
windows7-x64
8Rzlauncher Setup.exe
windows10-2004-x64
10jre/Welcome.html
windows7-x64
3jre/Welcome.html
windows10-2004-x64
3jre/bin/JA...32.dll
windows7-x64
3jre/bin/JA...32.dll
windows10-2004-x64
3jre/bin/JA...ge.dll
windows7-x64
3jre/bin/JA...ge.dll
windows10-2004-x64
3jre/bin/Ja...32.dll
windows7-x64
3jre/bin/Ja...32.dll
windows10-2004-x64
3jre/bin/Ja...ge.dll
windows7-x64
3jre/bin/Ja...ge.dll
windows10-2004-x64
3jre/bin/Wi...32.dll
windows7-x64
3jre/bin/Wi...32.dll
windows10-2004-x64
3jre/bin/Wi...ge.dll
windows7-x64
3jre/bin/Wi...ge.dll
windows10-2004-x64
3jre/bin/awt.dll
windows7-x64
3jre/bin/awt.dll
windows10-2004-x64
3jre/bin/bci.dll
windows7-x64
3jre/bin/bci.dll
windows10-2004-x64
3jre/bin/cl...vm.dll
windows7-x64
3jre/bin/cl...vm.dll
windows10-2004-x64
3jre/bin/dcpr.dll
windows7-x64
3jre/bin/dcpr.dll
windows10-2004-x64
3jre/bin/de...se.dll
windows7-x64
3jre/bin/de...se.dll
windows10-2004-x64
3jre/bin/deploy.dll
windows7-x64
3jre/bin/deploy.dll
windows10-2004-x64
3jre/bin/dt_shmem.dll
windows7-x64
3jre/bin/dt_shmem.dll
windows10-2004-x64
3jre/bin/dt_socket.dll
windows7-x64
3jre/bin/dt_socket.dll
windows10-2004-x64
3Analysis
-
max time kernel
37s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
Rzlauncher Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Rzlauncher Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
jre/Welcome.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
jre/Welcome.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
jre/bin/JavaAccessBridge.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
jre/bin/JavaAccessBridge.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral13
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
jre/bin/awt.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
jre/bin/awt.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
jre/bin/bci.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
jre/bin/bci.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
jre/bin/client/jvm.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
jre/bin/client/jvm.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
jre/bin/dcpr.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
jre/bin/dcpr.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
jre/bin/decora_sse.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
jre/bin/decora_sse.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
jre/bin/deploy.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
jre/bin/deploy.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
jre/bin/dt_shmem.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
jre/bin/dt_shmem.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
jre/bin/dt_socket.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
jre/bin/dt_socket.dll
Resource
win10v2004-20240802-en
General
-
Target
jre/bin/JavaAccessBridge-32.dll
-
Size
125KB
-
MD5
2f808ed0642bd5cf8d4111e0af098bbb
-
SHA1
006163a07052f3d227c2e541691691b4567f5550
-
SHA256
61dfb6126eba8d5429f156eaab24ff30312580b0abe4009670f1dd0bc64f87bb
-
SHA512
27dbda3a922747a031ff7434de5a596725ff5ae2bc6dd83d6d5565eb2ba180b0516896323294459997b545c60c9e06da6c2d8dd462a348a6759a404db0f023a7
-
SSDEEP
3072:uN77TJSG78+5Orcj5K/e2Hrgc6kZAn1yEkBKMKy1Zf22QYHJiuzTl8ShzzM+64mn:uNXd178+5fJZnQLo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
taskmgr.exepid Process 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid Process Token: SeDebugPrivilege 2176 taskmgr.exe Token: SeSystemProfilePrivilege 2176 taskmgr.exe Token: SeCreateGlobalPrivilege 2176 taskmgr.exe Token: 33 2176 taskmgr.exe Token: SeIncBasePriorityPrivilege 2176 taskmgr.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
taskmgr.exepid Process 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe -
Suspicious use of SendNotifyMessage 34 IoCs
Processes:
taskmgr.exepid Process 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid Process procid_target PID 4540 wrote to memory of 2564 4540 rundll32.exe 81 PID 4540 wrote to memory of 2564 4540 rundll32.exe 81 PID 4540 wrote to memory of 2564 4540 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jre\bin\JavaAccessBridge-32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\jre\bin\JavaAccessBridge-32.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2176