Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
80s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2023, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher-2.86-Installer-1.0.1.exe
Resource
win7-20220901-en
General
-
Target
TLauncher-2.86-Installer-1.0.1.exe
-
Size
21.7MB
-
MD5
f643be370cc9763a17f7746b1b6a0243
-
SHA1
c65391f59a6e1421d783eaf43eb9661cfd476f82
-
SHA256
5ab5f39d143b6ff77df2fd5026ac8e4788edfd3de27a4e1fa4b420a7d2f61d38
-
SHA512
5ce377dc1a4a59723cf2b969c0cadb3197e5bf61d0064e2e8c94a0be9d4fd1cd9b33e05078a17e89f54b763e180be32ce14b46949a58ff47e5df18183291142f
-
SSDEEP
393216:WXYwVCtYto0fs/dQETVlOBbpFEj9GZdqV56HpkbGCST7yuk9sLx:WowVCWTHExiTTqqHpMsV
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 3336 irsetup.exe 4412 AdditionalExecuteTL.exe 4384 irsetup.exe 1616 TLauncher.exe 2692 TLauncher.exe -
resource yara_rule behavioral2/files/0x000a000000022e08-134.dat upx behavioral2/files/0x000a000000022e08-133.dat upx behavioral2/memory/3336-137-0x00000000003A0000-0x0000000000788000-memory.dmp upx behavioral2/memory/3336-142-0x00000000003A0000-0x0000000000788000-memory.dmp upx behavioral2/files/0x000200000001e70b-147.dat upx behavioral2/files/0x000200000001e70b-148.dat upx behavioral2/memory/4384-152-0x0000000000270000-0x0000000000658000-memory.dmp upx behavioral2/memory/4384-153-0x0000000000270000-0x0000000000658000-memory.dmp upx behavioral2/memory/3336-158-0x00000000003A0000-0x0000000000788000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation irsetup.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation AdditionalExecuteTL.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation TLauncher-2.86-Installer-1.0.1.exe -
Loads dropped DLL 4 IoCs
pid Process 3336 irsetup.exe 3336 irsetup.exe 3336 irsetup.exe 4384 irsetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\jvm.pdb javaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1964 taskmgr.exe 1964 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1964 taskmgr.exe Token: SeSystemProfilePrivilege 1964 taskmgr.exe Token: SeCreateGlobalPrivilege 1964 taskmgr.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe 1964 taskmgr.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3336 irsetup.exe 3336 irsetup.exe 3336 irsetup.exe 3336 irsetup.exe 3336 irsetup.exe 3336 irsetup.exe 3336 irsetup.exe 4412 AdditionalExecuteTL.exe 4384 irsetup.exe 4384 irsetup.exe 4384 irsetup.exe 1616 TLauncher.exe 2348 javaw.exe 2348 javaw.exe 2296 javaw.exe 2296 javaw.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4660 wrote to memory of 3336 4660 TLauncher-2.86-Installer-1.0.1.exe 82 PID 4660 wrote to memory of 3336 4660 TLauncher-2.86-Installer-1.0.1.exe 82 PID 4660 wrote to memory of 3336 4660 TLauncher-2.86-Installer-1.0.1.exe 82 PID 3336 wrote to memory of 4412 3336 irsetup.exe 90 PID 3336 wrote to memory of 4412 3336 irsetup.exe 90 PID 3336 wrote to memory of 4412 3336 irsetup.exe 90 PID 4412 wrote to memory of 4384 4412 AdditionalExecuteTL.exe 91 PID 4412 wrote to memory of 4384 4412 AdditionalExecuteTL.exe 91 PID 4412 wrote to memory of 4384 4412 AdditionalExecuteTL.exe 91 PID 3336 wrote to memory of 1616 3336 irsetup.exe 98 PID 3336 wrote to memory of 1616 3336 irsetup.exe 98 PID 3336 wrote to memory of 1616 3336 irsetup.exe 98 PID 1616 wrote to memory of 2348 1616 TLauncher.exe 99 PID 1616 wrote to memory of 2348 1616 TLauncher.exe 99 PID 2692 wrote to memory of 2296 2692 TLauncher.exe 103 PID 2692 wrote to memory of 2296 2692 TLauncher.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\TLauncher-2.86-Installer-1.0.1.exe"C:\Users\Admin\AppData\Local\Temp\TLauncher-2.86-Installer-1.0.1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1908426 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\TLauncher-2.86-Installer-1.0.1.exe" "__IRCT:3" "__IRTSS:22693301" "__IRSID:S-1-5-21-2386679933-1492765628-3466841596-1000"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\AdditionalExecuteTL.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\AdditionalExecuteTL.exe" /S:C:\Users\Admin\AppData\Local\Temp\setuparguments.ini3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe" /S:C:\Users\Admin\AppData\Local\Temp\setuparguments.ini __IRAOFF:1814730 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\AdditionalExecuteTL.exe" "__IRCT:3" "__IRTSS:1839152" "__IRSID:S-1-5-21-2386679933-1492765628-3466841596-1000"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
-
C:\Users\Admin\AppData\Roaming\.minecraft\TLauncher.exe"C:\Users\Admin\AppData\Roaming\.minecraft\TLauncher.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\.minecraft\TLauncher.exe"4⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2348
-
-
-
-
C:\Users\Admin\AppData\Roaming\.minecraft\TLauncher.exe"C:\Users\Admin\AppData\Roaming\.minecraft\TLauncher.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\.minecraft\TLauncher.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2296
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD508340662fff34369e968be6f67cac19e
SHA10dd4584bc269403beecde8b6216ef005d4d6633b
SHA2560d11ddcb1a85e6f7256709a11bd9e2bdf92acdc16063029401fa11934775a0ff
SHA5126423a513953b9b534eef2f6449f3a64c608641e3182d5a28162e09e79dbb9b8cbdb2afb9bd9e31088583b05a90c2917082e6d355719de9088607855152822cf4
-
Filesize
1.8MB
MD5f8996d2158a69a12b4bc99edd28100bc
SHA1892887691df881fe432e09b618e90f50447340e6
SHA256866836c68a3c7b313fa6a0ab6d7b9d74112ca07e4709487951ff572938eff547
SHA512d6856d91ded75901a4af914e66bcdd904a51a2aba24e4762a2986f9a5f4b42f5b758b91c37ee5c9783c5797f19026e7f31e73d0e063f71bf5df8355a3213dd44
-
Filesize
1.8MB
MD5f8996d2158a69a12b4bc99edd28100bc
SHA1892887691df881fe432e09b618e90f50447340e6
SHA256866836c68a3c7b313fa6a0ab6d7b9d74112ca07e4709487951ff572938eff547
SHA512d6856d91ded75901a4af914e66bcdd904a51a2aba24e4762a2986f9a5f4b42f5b758b91c37ee5c9783c5797f19026e7f31e73d0e063f71bf5df8355a3213dd44
-
Filesize
1.7MB
MD51bbf5dd0b6ca80e4c7c77495c3f33083
SHA1e0520037e60eb641ec04d1e814394c9da0a6a862
SHA256bc6bd19ab0977ac794e18e2c82ace3116bf0537711a352638efd2d8d847c140b
SHA51297bc810871868217f944bc5e60ab642f161c1f082bc9e4122094f10b4e309a6d96e3dd695553a20907cb8fea5aef4802f5a2f0a852328c1a1cd85944022abaab
-
Filesize
97KB
MD5da1d0cd400e0b6ad6415fd4d90f69666
SHA1de9083d2902906cacf57259cf581b1466400b799
SHA2567a79b049bdc3b6e4d101691888360f4f993098f3e3a8beefff4ac367430b1575
SHA512f12f64670f158c2e846e78b7b5d191158268b45ecf3c288f02bbee15ae10c4a62e67fb3481da304ba99da2c68ac44d713a44a458ef359db329b6fef3d323382a
-
Filesize
1.3MB
MD51313bb5df6c6e0d5c358735044fbebef
SHA1cac3e2e3ed63dc147318e18f202a9da849830a91
SHA2567590d0f21687327812a6c61d0429c6df1345b97c53ad7115f03bd4cb2e4f4c8d
SHA512596d877b3906f877f124d705933391478ed425ad860ca5341493f04050c4605fc8e9a1c890859105da1b6817da5e874e0afaabbc86a80597f296e642795fc33c
-
Filesize
1.3MB
MD51313bb5df6c6e0d5c358735044fbebef
SHA1cac3e2e3ed63dc147318e18f202a9da849830a91
SHA2567590d0f21687327812a6c61d0429c6df1345b97c53ad7115f03bd4cb2e4f4c8d
SHA512596d877b3906f877f124d705933391478ed425ad860ca5341493f04050c4605fc8e9a1c890859105da1b6817da5e874e0afaabbc86a80597f296e642795fc33c
-
Filesize
326KB
MD580d93d38badecdd2b134fe4699721223
SHA1e829e58091bae93bc64e0c6f9f0bac999cfda23d
SHA256c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59
SHA5129f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4
-
Filesize
326KB
MD580d93d38badecdd2b134fe4699721223
SHA1e829e58091bae93bc64e0c6f9f0bac999cfda23d
SHA256c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59
SHA5129f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4
-
Filesize
1.3MB
MD5e7bbc7b426cee4b8027a00b11f06ef34
SHA1926fad387ede328d3cfd9da80d0b303a865cca98
SHA256e7a43c6f10e3e65b8462b6d67c91c628db5402d3209f549e90998c875cf21538
SHA512f08b4833c1dcb9c2b0f8c90e092275795fda3c20aaec6590504c20a93cb6d50b8ce11301bc3a42d9417c78ddb25a5e991fad688c39d1dede3fce0b67f3e13e70
-
Filesize
1.3MB
MD5e7bbc7b426cee4b8027a00b11f06ef34
SHA1926fad387ede328d3cfd9da80d0b303a865cca98
SHA256e7a43c6f10e3e65b8462b6d67c91c628db5402d3209f549e90998c875cf21538
SHA512f08b4833c1dcb9c2b0f8c90e092275795fda3c20aaec6590504c20a93cb6d50b8ce11301bc3a42d9417c78ddb25a5e991fad688c39d1dede3fce0b67f3e13e70
-
Filesize
326KB
MD580d93d38badecdd2b134fe4699721223
SHA1e829e58091bae93bc64e0c6f9f0bac999cfda23d
SHA256c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59
SHA5129f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4
-
Filesize
326KB
MD580d93d38badecdd2b134fe4699721223
SHA1e829e58091bae93bc64e0c6f9f0bac999cfda23d
SHA256c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59
SHA5129f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4
-
Filesize
646B
MD5883284024c0d28e9ce7861901879b876
SHA1e081dd7c4f874b2d5260ad4e5dd2c88eb4e3c66a
SHA25666daf18bb552cdbbee7cf15672383b4f5407deb831d8d55a606fdb623b0d8e47
SHA51225cd97038e969a936dfbd054723330c5ae430d8f6550c3d68dfdd6889b28b248fccde137b5389271cf6b144f12dd09320116ef9a62c5664e7167f3e415f3c9bc
-
Filesize
5.2MB
MD558e22c0ee91280156cdaadacac7acddb
SHA1189c552c94a9b0ae0208763bca77f2801debc224
SHA256765cab48564743844b057e21eab768d5d84194a635b09d02d9d2909f632f5714
SHA5129f510c896d641919b037e201f5ba9de476241e7cab1004d92a85df4b9240ff947737619921b1223cd926c8c5a6e667dc76cad37e818d2a9d144b826836d562c6
-
Filesize
5.2MB
MD558e22c0ee91280156cdaadacac7acddb
SHA1189c552c94a9b0ae0208763bca77f2801debc224
SHA256765cab48564743844b057e21eab768d5d84194a635b09d02d9d2909f632f5714
SHA5129f510c896d641919b037e201f5ba9de476241e7cab1004d92a85df4b9240ff947737619921b1223cd926c8c5a6e667dc76cad37e818d2a9d144b826836d562c6
-
Filesize
5.2MB
MD558e22c0ee91280156cdaadacac7acddb
SHA1189c552c94a9b0ae0208763bca77f2801debc224
SHA256765cab48564743844b057e21eab768d5d84194a635b09d02d9d2909f632f5714
SHA5129f510c896d641919b037e201f5ba9de476241e7cab1004d92a85df4b9240ff947737619921b1223cd926c8c5a6e667dc76cad37e818d2a9d144b826836d562c6
-
Filesize
13B
MD541bd549a730ff06c58022bcf56c0007d
SHA1d2653789d27b47dc9f69628067c89df189869cc8
SHA256055aef03dabf64f2f480bb1603131ed77e23afff1159df246c8ee84fdef0b036
SHA512915931328d72bedb6d4c7f39aeede5f05590d14e47e9bd70057193d0d65f8e93c9d5c60ed4932604027e2ce9c30f32dd20c9abf349a186de5199d547029e7698
-
Filesize
51B
MD573e3135c5a462a80e36e1ddf230597c3
SHA19aac0dc8ab1cf18fb21324723cd49bd0455cae74
SHA25606a74f05f78d457a229573f1e413646f3f82c561fa93dd2b44b65e520befdfc5
SHA5120b383b41710130568c15d31607590805be52836048a8785a2e31b32148bab6783a7d8b2d0b9a2b39a5472f5a1d0787dc0364e8d3c7271a8dcbb714c793db929e