Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25-10-2024 13:30

General

  • Target

    Rzlauncher Setup.exe

  • Size

    32KB

  • MD5

    c919047959690a1646e561e81d45e5fd

  • SHA1

    5bd528b9f0ec25ea19f0d0bbba41f4422597a488

  • SHA256

    a9f0a76d6e73189b7385b6fcddeccb50e67b65c315b5c20108f86f22fce17802

  • SHA512

    dee29e35b748bb69d0acc56d744eebd50cd462a93178072f9585dadd0c12b93907d7572832733ed0ba255909ae665a8cb102a360acfe3729365ea123480c3fca

  • SSDEEP

    384:loI1gYZw33FUWUcC6TBhdsDgZH4o5NEvdlcn0ScPmPn0Avsl9EPg/s4Xsn+KvHKj:J7Zw33FNUf6Nhd/fQ1l+0vM0iT9

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Rzlauncher Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Rzlauncher Setup.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe
      "C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\activation.jar;lib\asm-all.jar;lib\commons-email.jar;lib\cs2 skin.mp4;lib\dn-compiled-module.jar;lib\dn-php-sdk.jar;lib\gson.jar;lib\jfoenix.jar;lib\jkeymaster.jar;lib\jna.jar;lib\jphp-app-framework.jar;lib\jphp-core.jar;lib\jphp-desktop-ext.jar;lib\jphp-desktop-hotkey-ext.jar;lib\jphp-gui-ext.jar;lib\jphp-gui-jfoenix-ext.jar;lib\jphp-json-ext.jar;lib\jphp-jsoup-ext.jar;lib\jphp-mail-ext.jar;lib\jphp-runtime.jar;lib\jphp-systemtray-ext.jar;lib\jphp-xml-ext.jar;lib\jphp-zend-ext.jar;lib\jphp-zip-ext.jar;lib\jsoup.jar;lib\mail.jar;lib\slf4j-api.jar;lib\slf4j-simple.jar;lib\zenless zero.mp4;lib\zt-zip.jar" org.develnext.jphp.ext.javafx.FXLauncher
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        Powershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command "Add-MpPreference -Force -ExclusionPath "C:\""' -Verb RunAs}"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -Force -ExclusionPath C:"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1564
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        Powershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command "Set-MpPreference -Force -DisableBehaviorMonitoring "' -Verb RunAs}"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3028
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-MpPreference -Force -DisableBehaviorMonitoring
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2980
      • C:\Windows\SysWOW64\explorer.exe
        explorer C:\Users\Admin\AppData\Local\Temp\MTE1OTA1NmFlYTBjM2FhY2IyOGMxYzVmMGNmY2I3Mzg.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2012
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Users\Admin\AppData\Local\Temp\MTE1OTA1NmFlYTBjM2FhY2IyOGMxYzVmMGNmY2I3Mzg.exe
      "C:\Users\Admin\AppData\Local\Temp\MTE1OTA1NmFlYTBjM2FhY2IyOGMxYzVmMGNmY2I3Mzg.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MTE1OTA1NmFlYTBjM2FhY2IyOGMxYzVmMGNmY2I3Mzg.exe

    Filesize

    226KB

    MD5

    1c83b86ee49577920f79e0175f56a480

    SHA1

    1ac4ef5a1f9ca34ac229bc26cdc914e38173c554

    SHA256

    72a88efeda156c7304c5c8bd090dcb011ba3dfbbe91f5511969ba8eecee32843

    SHA512

    d4b4ec415e92617548e863422f653b97460be182205871bf7526fe872d110e8ac17b60472d8351bed62e20ee584424816eeafcafe69ce096596ee044e1df022d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    819e057d32762ba9ee9e2967fc7a1bf2

    SHA1

    354689a60bcbc1153a020ef64ef98268e46cd72a

    SHA256

    11436c7329203f250a8dbb2d822042ea603f95597adaf64cdb2291b0618cc027

    SHA512

    410fb2daec8d43269b40fd0e0f2a5faa996906f74fbb48291f311337b251d67188f9c7969122bb9918c44884b28f7f36cff5e056603d12dd8fbe9716b3d14875

  • \Users\Admin\AppData\Roaming\msvcp110.dll

    Filesize

    351KB

    MD5

    a7e9d0bb0687ba84a60b387a2a6fa8d9

    SHA1

    d224cf061e302d82059ff9100f40b86b0cbbbc31

    SHA256

    7704fea9664704d6cf2aa277e30f58c71b8a5f50c957d519896450a4f81e3dbe

    SHA512

    185f52af9930a03dbccd3c160e4f6d3eedacf72999933b44c36268e45d233b617c36190c05d63211a9d0e99d448d03e5c927fcc2700d6b5244c987cfe33def88

  • memory/2560-203-0x00000000013B0000-0x00000000013F0000-memory.dmp

    Filesize

    256KB

  • memory/2560-204-0x00000000001D0000-0x00000000001D6000-memory.dmp

    Filesize

    24KB

  • memory/2588-105-0x00000000028E8000-0x00000000028F0000-memory.dmp

    Filesize

    32KB

  • memory/2588-110-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-27-0x0000000002898000-0x00000000028A0000-memory.dmp

    Filesize

    32KB

  • memory/2588-30-0x00000000028A0000-0x00000000028A8000-memory.dmp

    Filesize

    32KB

  • memory/2588-29-0x0000000002840000-0x0000000002848000-memory.dmp

    Filesize

    32KB

  • memory/2588-31-0x0000000002838000-0x0000000002840000-memory.dmp

    Filesize

    32KB

  • memory/2588-34-0x00000000028A8000-0x00000000028B0000-memory.dmp

    Filesize

    32KB

  • memory/2588-38-0x00000000028B8000-0x00000000028C0000-memory.dmp

    Filesize

    32KB

  • memory/2588-37-0x00000000028B0000-0x00000000028B8000-memory.dmp

    Filesize

    32KB

  • memory/2588-40-0x00000000028C0000-0x00000000028C8000-memory.dmp

    Filesize

    32KB

  • memory/2588-41-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2588-44-0x00000000028C8000-0x00000000028D0000-memory.dmp

    Filesize

    32KB

  • memory/2588-43-0x0000000002848000-0x0000000002850000-memory.dmp

    Filesize

    32KB

  • memory/2588-46-0x0000000002850000-0x0000000002858000-memory.dmp

    Filesize

    32KB

  • memory/2588-47-0x00000000028D0000-0x00000000028D8000-memory.dmp

    Filesize

    32KB

  • memory/2588-48-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2588-51-0x0000000002898000-0x00000000028A0000-memory.dmp

    Filesize

    32KB

  • memory/2588-52-0x00000000028D8000-0x00000000028E0000-memory.dmp

    Filesize

    32KB

  • memory/2588-56-0x00000000028E0000-0x00000000028E8000-memory.dmp

    Filesize

    32KB

  • memory/2588-55-0x00000000028A0000-0x00000000028A8000-memory.dmp

    Filesize

    32KB

  • memory/2588-58-0x00000000028E8000-0x00000000028F0000-memory.dmp

    Filesize

    32KB

  • memory/2588-63-0x00000000028F0000-0x00000000028F8000-memory.dmp

    Filesize

    32KB

  • memory/2588-112-0x0000000002900000-0x0000000002908000-memory.dmp

    Filesize

    32KB

  • memory/2588-66-0x00000000028A8000-0x00000000028B0000-memory.dmp

    Filesize

    32KB

  • memory/2588-67-0x00000000028F8000-0x0000000002900000-memory.dmp

    Filesize

    32KB

  • memory/2588-70-0x00000000028B0000-0x00000000028B8000-memory.dmp

    Filesize

    32KB

  • memory/2588-71-0x0000000002900000-0x0000000002908000-memory.dmp

    Filesize

    32KB

  • memory/2588-74-0x00000000028B8000-0x00000000028C0000-memory.dmp

    Filesize

    32KB

  • memory/2588-75-0x0000000002908000-0x0000000002910000-memory.dmp

    Filesize

    32KB

  • memory/2588-77-0x00000000028C0000-0x00000000028C8000-memory.dmp

    Filesize

    32KB

  • memory/2588-78-0x0000000002910000-0x0000000002918000-memory.dmp

    Filesize

    32KB

  • memory/2588-85-0x00000000028C8000-0x00000000028D0000-memory.dmp

    Filesize

    32KB

  • memory/2588-86-0x0000000002918000-0x0000000002920000-memory.dmp

    Filesize

    32KB

  • memory/2588-90-0x0000000002920000-0x0000000002928000-memory.dmp

    Filesize

    32KB

  • memory/2588-89-0x00000000028D0000-0x00000000028D8000-memory.dmp

    Filesize

    32KB

  • memory/2588-93-0x0000000002928000-0x0000000002930000-memory.dmp

    Filesize

    32KB

  • memory/2588-92-0x00000000028D8000-0x00000000028E0000-memory.dmp

    Filesize

    32KB

  • memory/2588-95-0x00000000028E0000-0x00000000028E8000-memory.dmp

    Filesize

    32KB

  • memory/2588-96-0x0000000002930000-0x0000000002938000-memory.dmp

    Filesize

    32KB

  • memory/2588-102-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2588-107-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-108-0x00000000028F0000-0x00000000028F8000-memory.dmp

    Filesize

    32KB

  • memory/2588-106-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-12-0x0000000002848000-0x0000000002850000-memory.dmp

    Filesize

    32KB

  • memory/2588-200-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2588-13-0x0000000002850000-0x0000000002858000-memory.dmp

    Filesize

    32KB

  • memory/2588-62-0x0000000002838000-0x0000000002840000-memory.dmp

    Filesize

    32KB

  • memory/2588-109-0x00000000028F8000-0x0000000002900000-memory.dmp

    Filesize

    32KB

  • memory/2588-115-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2588-139-0x0000000002908000-0x0000000002910000-memory.dmp

    Filesize

    32KB

  • memory/2588-141-0x0000000002910000-0x0000000002918000-memory.dmp

    Filesize

    32KB

  • memory/2588-150-0x0000000002918000-0x0000000002920000-memory.dmp

    Filesize

    32KB

  • memory/2588-161-0x0000000002920000-0x0000000002928000-memory.dmp

    Filesize

    32KB

  • memory/2588-162-0x0000000002928000-0x0000000002930000-memory.dmp

    Filesize

    32KB

  • memory/2588-163-0x0000000002930000-0x0000000002938000-memory.dmp

    Filesize

    32KB

  • memory/2588-164-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-165-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-166-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-167-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-183-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2588-188-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2588-8-0x0000000002800000-0x0000000002828000-memory.dmp

    Filesize

    160KB

  • memory/2588-189-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2588-191-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2588-111-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2588-217-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2588-218-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2588-219-0x0000000002848000-0x0000000002850000-memory.dmp

    Filesize

    32KB

  • memory/2588-220-0x0000000002850000-0x0000000002858000-memory.dmp

    Filesize

    32KB

  • memory/2588-221-0x0000000002898000-0x00000000028A0000-memory.dmp

    Filesize

    32KB

  • memory/2588-222-0x00000000028A0000-0x00000000028A8000-memory.dmp

    Filesize

    32KB

  • memory/2588-223-0x0000000002838000-0x0000000002840000-memory.dmp

    Filesize

    32KB

  • memory/2588-224-0x00000000028A8000-0x00000000028B0000-memory.dmp

    Filesize

    32KB

  • memory/2588-225-0x00000000028B0000-0x00000000028B8000-memory.dmp

    Filesize

    32KB

  • memory/2588-226-0x00000000028B8000-0x00000000028C0000-memory.dmp

    Filesize

    32KB

  • memory/2588-227-0x00000000028C0000-0x00000000028C8000-memory.dmp

    Filesize

    32KB

  • memory/2588-228-0x00000000028C8000-0x00000000028D0000-memory.dmp

    Filesize

    32KB

  • memory/2588-229-0x00000000028D0000-0x00000000028D8000-memory.dmp

    Filesize

    32KB

  • memory/2588-230-0x00000000028D8000-0x00000000028E0000-memory.dmp

    Filesize

    32KB

  • memory/2588-231-0x00000000028E0000-0x00000000028E8000-memory.dmp

    Filesize

    32KB

  • memory/2588-232-0x00000000028E8000-0x00000000028F0000-memory.dmp

    Filesize

    32KB

  • memory/2588-233-0x00000000028F0000-0x00000000028F8000-memory.dmp

    Filesize

    32KB

  • memory/2588-234-0x0000000002900000-0x0000000002908000-memory.dmp

    Filesize

    32KB

  • memory/2588-235-0x0000000002908000-0x0000000002910000-memory.dmp

    Filesize

    32KB

  • memory/2588-236-0x0000000002910000-0x0000000002918000-memory.dmp

    Filesize

    32KB

  • memory/2588-237-0x0000000002918000-0x0000000002920000-memory.dmp

    Filesize

    32KB

  • memory/2588-238-0x0000000002920000-0x0000000002928000-memory.dmp

    Filesize

    32KB

  • memory/2588-239-0x0000000002928000-0x0000000002930000-memory.dmp

    Filesize

    32KB

  • memory/2588-240-0x0000000002930000-0x0000000002938000-memory.dmp

    Filesize

    32KB

  • memory/2588-241-0x00000000028F8000-0x0000000002900000-memory.dmp

    Filesize

    32KB

  • memory/2668-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB