Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2023 18:47
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher-2.871-Installer-1.0.6.exe
Resource
win7-20220812-en
General
-
Target
TLauncher-2.871-Installer-1.0.6.exe
-
Size
23.7MB
-
MD5
49fb0f13cdb8d7cad1487889b6becced
-
SHA1
b71d98ec45e6f7314f0e33106485beef99b2ee7c
-
SHA256
7e49e00be1992fbc4ac14f2e5e3c05dccadf8fba3c3936357d8df7f146f5f0a3
-
SHA512
639fa23294556bf77080d420e7e1b5b7c07a8b1e93897c36a4f8e398c1c58de9b91636420102e68f6957c768793797728664e32dc38aa68315746882b4ebe1d9
-
SSDEEP
393216:XX921sp/n85Pfs/dQETVlOBbpFEj9GZ1GphRqV56Hpk7IXOzDnKI17fyV5:XN8s18hHExiTI3qqHp6zvKcfyV5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4916 irsetup.exe -
resource yara_rule behavioral2/files/0x0003000000000725-133.dat upx behavioral2/files/0x0003000000000725-134.dat upx behavioral2/memory/4916-137-0x00000000004B0000-0x0000000000898000-memory.dmp upx behavioral2/memory/4916-142-0x00000000004B0000-0x0000000000898000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation TLauncher-2.871-Installer-1.0.6.exe -
Loads dropped DLL 3 IoCs
pid Process 4916 irsetup.exe 4916 irsetup.exe 4916 irsetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings firefox.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4160 firefox.exe Token: SeDebugPrivilege 4160 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4160 firefox.exe 4160 firefox.exe 4160 firefox.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4916 irsetup.exe 4916 irsetup.exe 4916 irsetup.exe 4916 irsetup.exe 4916 irsetup.exe 4160 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3416 wrote to memory of 4916 3416 TLauncher-2.871-Installer-1.0.6.exe 80 PID 3416 wrote to memory of 4916 3416 TLauncher-2.871-Installer-1.0.6.exe 80 PID 3416 wrote to memory of 4916 3416 TLauncher-2.871-Installer-1.0.6.exe 80 PID 2424 wrote to memory of 4160 2424 firefox.exe 91 PID 2424 wrote to memory of 4160 2424 firefox.exe 91 PID 2424 wrote to memory of 4160 2424 firefox.exe 91 PID 2424 wrote to memory of 4160 2424 firefox.exe 91 PID 2424 wrote to memory of 4160 2424 firefox.exe 91 PID 2424 wrote to memory of 4160 2424 firefox.exe 91 PID 2424 wrote to memory of 4160 2424 firefox.exe 91 PID 2424 wrote to memory of 4160 2424 firefox.exe 91 PID 2424 wrote to memory of 4160 2424 firefox.exe 91 PID 4160 wrote to memory of 4280 4160 firefox.exe 92 PID 4160 wrote to memory of 4280 4160 firefox.exe 92 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2592 4160 firefox.exe 95 PID 4160 wrote to memory of 2908 4160 firefox.exe 96 PID 4160 wrote to memory of 2908 4160 firefox.exe 96 PID 4160 wrote to memory of 2908 4160 firefox.exe 96 PID 4160 wrote to memory of 2908 4160 firefox.exe 96 PID 4160 wrote to memory of 2908 4160 firefox.exe 96 PID 4160 wrote to memory of 2908 4160 firefox.exe 96 PID 4160 wrote to memory of 2908 4160 firefox.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\TLauncher-2.871-Installer-1.0.6.exe"C:\Users\Admin\AppData\Local\Temp\TLauncher-2.871-Installer-1.0.6.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1910546 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\TLauncher-2.871-Installer-1.0.6.exe" "__IRCT:3" "__IRTSS:24870711" "__IRSID:S-1-5-21-2971393436-602173351-1645505021-1000"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4160.0.478336494\2132132090" -parentBuildID 20200403170909 -prefsHandle 1700 -prefMapHandle 1684 -prefsLen 1 -prefMapSize 219944 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4160 "\\.\pipe\gecko-crash-server-pipe.4160" 1800 gpu3⤵PID:4280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4160.3.652783114\756718433" -childID 1 -isForBrowser -prefsHandle 2460 -prefMapHandle 2388 -prefsLen 112 -prefMapSize 219944 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4160 "\\.\pipe\gecko-crash-server-pipe.4160" 1524 tab3⤵PID:2592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4160.13.1037292049\491270489" -childID 2 -isForBrowser -prefsHandle 3728 -prefMapHandle 3724 -prefsLen 6894 -prefMapSize 219944 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4160 "\\.\pipe\gecko-crash-server-pipe.4160" 3740 tab3⤵PID:2908
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD51bbf5dd0b6ca80e4c7c77495c3f33083
SHA1e0520037e60eb641ec04d1e814394c9da0a6a862
SHA256bc6bd19ab0977ac794e18e2c82ace3116bf0537711a352638efd2d8d847c140b
SHA51297bc810871868217f944bc5e60ab642f161c1f082bc9e4122094f10b4e309a6d96e3dd695553a20907cb8fea5aef4802f5a2f0a852328c1a1cd85944022abaab
-
Filesize
97KB
MD5da1d0cd400e0b6ad6415fd4d90f69666
SHA1de9083d2902906cacf57259cf581b1466400b799
SHA2567a79b049bdc3b6e4d101691888360f4f993098f3e3a8beefff4ac367430b1575
SHA512f12f64670f158c2e846e78b7b5d191158268b45ecf3c288f02bbee15ae10c4a62e67fb3481da304ba99da2c68ac44d713a44a458ef359db329b6fef3d323382a
-
Filesize
1.3MB
MD5ec4efe0ebb80b619737bd26180cc76cc
SHA17fd72c0eb6bee289e4b2714cf1fb8c197754811b
SHA256b1501df2280c557ad1535a504bd43c25611c168fd543008b7949c03b29e70547
SHA512384ae150773cf07322c614459db9db98e1995f6b185579c7b56763ed0352e043f51d0e840f94ac3e832a1378452f090b68ee281c437b16da3762974723e64e1a
-
Filesize
1.3MB
MD5ec4efe0ebb80b619737bd26180cc76cc
SHA17fd72c0eb6bee289e4b2714cf1fb8c197754811b
SHA256b1501df2280c557ad1535a504bd43c25611c168fd543008b7949c03b29e70547
SHA512384ae150773cf07322c614459db9db98e1995f6b185579c7b56763ed0352e043f51d0e840f94ac3e832a1378452f090b68ee281c437b16da3762974723e64e1a
-
Filesize
326KB
MD580d93d38badecdd2b134fe4699721223
SHA1e829e58091bae93bc64e0c6f9f0bac999cfda23d
SHA256c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59
SHA5129f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4
-
Filesize
326KB
MD580d93d38badecdd2b134fe4699721223
SHA1e829e58091bae93bc64e0c6f9f0bac999cfda23d
SHA256c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59
SHA5129f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4