Analysis

  • max time kernel
    75s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2023, 16:59

General

  • Target

    TLauncher.exe

  • Size

    5.2MB

  • MD5

    58e22c0ee91280156cdaadacac7acddb

  • SHA1

    189c552c94a9b0ae0208763bca77f2801debc224

  • SHA256

    765cab48564743844b057e21eab768d5d84194a635b09d02d9d2909f632f5714

  • SHA512

    9f510c896d641919b037e201f5ba9de476241e7cab1004d92a85df4b9240ff947737619921b1223cd926c8c5a6e667dc76cad37e818d2a9d144b826836d562c6

  • SSDEEP

    98304:goW7Z7Wqa9a652L9kLttcV3hMfLOoUawcoU5Z/wx7ctxst7G8zUu:tWd7WqHxL2PctKfLOoURBU5Z/c7uxizF

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TLauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://java-for-minecraft.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1232 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99c331b24f451059e12838e960dba386

    SHA1

    800bd6ea3f1b8e9b075ee6a4711c14f141d68841

    SHA256

    734d8f14a0ff95d76b6b94f9318b1d38c52e2ac9e3335039bb4beaa8f4bead06

    SHA512

    80f235c2bb89719498d4977af152f1f8952a8d82cc82790a54e3bf51c9ab11f1c8d9aa4fd27f4fb608067d6ea42eac87e6d349194c85bb38b497efcf397fe856

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\mlf2v8h\imagestore.dat

    Filesize

    28KB

    MD5

    28b6383fb4ee94f92ae4f6f4dfc87379

    SHA1

    bece660953fd0ce3280330757c0d54b718149eb9

    SHA256

    f9b08d0ebae91bac83d52190f105f5beee44c8969c8576d3d585a083a34ccbcf

    SHA512

    cbc17c1313cd64955b00e7770f87b7fb42eb83296a5cfab1fed7ffe7b20a87f3405602d26110349b6c097109b2adc40ef42fd088f7292a606486e2f311406cce

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IRQON92X.txt

    Filesize

    601B

    MD5

    c2702a386b6851a6bec440975a0fd481

    SHA1

    a3c45cba86d264854805e5aa6db4e224a542df53

    SHA256

    8041b2f2b64b76109217494ab22f9d6f96b4f69b4c13fc28a4da8b4d0c2d2a78

    SHA512

    e7574783026afc82e91cad7f106a19a8c76ce4509da50279a3668f3c56a1514ebfee791265a88b5d1834710aed44d6912b37d1435b5cec4fae8355ebe4e1f560

  • memory/1704-54-0x0000000075831000-0x0000000075833000-memory.dmp

    Filesize

    8KB