Resubmissions

16/01/2023, 08:22

230116-j9xdjaga4v 4

15/01/2023, 10:55

230115-m1bx1sdg65 10

General

  • Target

    tlauncher-2_72.exe

  • Size

    4.1MB

  • Sample

    230115-m1bx1sdg65

  • MD5

    a031e1e3b283e3cc9f895e337b0a6e18

  • SHA1

    b5bc0da7ebab8655503a9c5de06691f4cf16ba20

  • SHA256

    69ac13de7f6c4223b05baceb4da9c983849de3ef139cb66ff26902cb6a3c15b5

  • SHA512

    afa6cf17e7e918e4835589a540d17d98d1dd651049f7079c42211fe8ceb3be706a2362e04a37a09c77854d5a463d8db1200767c482c9ef97ff0a39f4a4124b0a

  • SSDEEP

    49152:NnOpSqSRk9kmBlOLc85/kJsugaX3NgfT+UO+DUtFNmnVg6kIVuQ2fiFpJM:NnOEqmCBlOLc85tuxNgf4lCjHdM

Malware Config

Targets

    • Target

      tlauncher-2_72.exe

    • Size

      4.1MB

    • MD5

      a031e1e3b283e3cc9f895e337b0a6e18

    • SHA1

      b5bc0da7ebab8655503a9c5de06691f4cf16ba20

    • SHA256

      69ac13de7f6c4223b05baceb4da9c983849de3ef139cb66ff26902cb6a3c15b5

    • SHA512

      afa6cf17e7e918e4835589a540d17d98d1dd651049f7079c42211fe8ceb3be706a2362e04a37a09c77854d5a463d8db1200767c482c9ef97ff0a39f4a4124b0a

    • SSDEEP

      49152:NnOpSqSRk9kmBlOLc85/kJsugaX3NgfT+UO+DUtFNmnVg6kIVuQ2fiFpJM:NnOEqmCBlOLc85tuxNgf4lCjHdM

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks