Analysis

  • max time kernel
    75s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2022, 18:15

General

  • Target

    tlauncher-2_43.exe

  • Size

    2.7MB

  • MD5

    fd12eb944723d40afcfccc100d66ce23

  • SHA1

    3791c45b2636e9e123f77fd3498d5c7c516b7600

  • SHA256

    90cc23c45536d713f3fe56d02722abbf5868520f03ff6ede3c57bfbba9bf6e8f

  • SHA512

    0dcab8b30df7895252cb79eea949a5924f0d65c86b6497663bc823e3d85f9f74c264b597bd7be10940b86ce4fede95384b6f1351aece646f9b9f491f78a14692

  • SSDEEP

    49152:BDbfk1WLzmLDYxUFm7GNip6KmPakkT0km9M93t0mfC19hFoc:tbfCWLpUFm6/KmlwMXTH

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tlauncher-2_43.exe
    "C:\Users\Admin\AppData\Local\Temp\tlauncher-2_43.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://java.com/download
      2⤵
      • Modifies Internet Explorer Phishing Filter
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:652

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3335681aea95414a6b4b17866c50438e

          SHA1

          8c0ef280ac0c0c18c2afacb420cee10b7234db66

          SHA256

          4e342e37547425b7183089346875b75a73c17e048e4ab32cbc682575f206ef37

          SHA512

          63cc96b3ab4c883cfa440227db0ae3e04a48f15d0072edac9d8112f97f33ecb04eb1b612ad4858a2393f0fa92d98f9089bd5844030cbb4f18d69a9d1a32c473d

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

          Filesize

          1KB

          MD5

          20d214f56de4b49789fd5f934dcf23ef

          SHA1

          b000769e1d089c4b1bbca35d7ed12ad83fc7397e

          SHA256

          a371a3d71fadce34a0266dd266d277b5a118069804c12a562caaf0286291ac11

          SHA512

          9f1e01b92ddf0bc68ecb82866d0a02d64b94a19fd46f65b5ec06e1e20b2913a59eeff240643aca40fe0a93d989318b03fc0da24274df90fe46969713501e4fcf

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\K6TTV566.txt

          Filesize

          601B

          MD5

          0a7194132512d1c9d9d49dd220eb62ff

          SHA1

          b1093004f1844a0cc62d2e6796865d49a7c31d9d

          SHA256

          af2ca1f0cdad37337bda72bbc47409e97ca3908188f2d1e8da7fe953341b7d64

          SHA512

          5ef40ef6bf849b6184c948b28902cc270f969a6819179dee92c9ca11732b44b3b9e4e62e077f5c4880455ac8f859659a7a9fbc968849c802273521e5e349b2f1

        • memory/1576-54-0x0000000075611000-0x0000000075613000-memory.dmp

          Filesize

          8KB