Resubmissions

10/01/2023, 10:02

230110-l2y89sff44 4

10/01/2023, 10:01

230110-l2l9psff43 1

10/01/2023, 10:01

230110-l2gdfsbd21 1

10/01/2023, 10:01

230110-l17t1sbd2y 1

10/01/2023, 10:00

230110-l1yaksff42 0

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2023, 10:02

General

  • Target

    TLauncher-2.86.jar

  • Size

    5.5MB

  • MD5

    774188790da1d49e004e2b81eeb6e523

  • SHA1

    89a5a223674f0732453b082a5e355e56a3cd3b7f

  • SHA256

    87c14d93169b0f9edd4ccb0cf99ec9ecbc8bea2365354da193dc25994ee40699

  • SHA512

    c41045ef8562b8e52f66bc50fc78f122d26bd393a146563bfe6cd3981bde03476358072ba93a84254bd29c352f5ed9181ca262f3ee0404d582ebaccee996e6e7

  • SSDEEP

    98304:gkrgBgGv1r+66BrO9mzNsnNZXlLdYLTmHH2kAdvxBLTVo89dBl3eo4K:PrgOGNr+6uZz6zX5iLTmHHJYvxBLBoe5

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 12 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\TLauncher-2.86.jar
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    PID:4228
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3864
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1200
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1200.0.729429816\1202694693" -parentBuildID 20200403170909 -prefsHandle 1692 -prefMapHandle 1684 -prefsLen 1 -prefMapSize 219944 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1200 "\\.\pipe\gecko-crash-server-pipe.1200" 1780 gpu
        3⤵
          PID:4796
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1200.3.2122495863\2025791589" -childID 1 -isForBrowser -prefsHandle 2352 -prefMapHandle 2432 -prefsLen 112 -prefMapSize 219944 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1200 "\\.\pipe\gecko-crash-server-pipe.1200" 2268 tab
          3⤵
            PID:4864
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1200.13.1205064776\1220708786" -childID 2 -isForBrowser -prefsHandle 3684 -prefMapHandle 3680 -prefsLen 6894 -prefMapSize 219944 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1200 "\\.\pipe\gecko-crash-server-pipe.1200" 3644 tab
            3⤵
              PID:1432

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4228-136-0x0000000002D60000-0x0000000003D60000-memory.dmp

          Filesize

          16.0MB

        • memory/4228-157-0x0000000002D60000-0x0000000003D60000-memory.dmp

          Filesize

          16.0MB

        • memory/4228-169-0x0000000002D60000-0x0000000003D60000-memory.dmp

          Filesize

          16.0MB

        • memory/4228-171-0x0000000002D60000-0x0000000003D60000-memory.dmp

          Filesize

          16.0MB

        • memory/4228-172-0x0000000002D60000-0x0000000003D60000-memory.dmp

          Filesize

          16.0MB

        • memory/4228-173-0x0000000002D60000-0x0000000003D60000-memory.dmp

          Filesize

          16.0MB