Analysis

  • max time kernel
    135s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2023 01:25

General

  • Target

    TLauncher.exe

  • Size

    5.2MB

  • MD5

    58e22c0ee91280156cdaadacac7acddb

  • SHA1

    189c552c94a9b0ae0208763bca77f2801debc224

  • SHA256

    765cab48564743844b057e21eab768d5d84194a635b09d02d9d2909f632f5714

  • SHA512

    9f510c896d641919b037e201f5ba9de476241e7cab1004d92a85df4b9240ff947737619921b1223cd926c8c5a6e667dc76cad37e818d2a9d144b826836d562c6

  • SSDEEP

    98304:goW7Z7Wqa9a652L9kLttcV3hMfLOoUawcoU5Z/wx7ctxst7G8zUu:tWd7WqHxL2PctKfLOoURBU5Z/c7uxizF

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TLauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://java-for-minecraft.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5af2de5c04ceceac0ca47144fb588032

    SHA1

    be1ad850269bfeb0b6943cdabb4782ad2147a9b8

    SHA256

    ed32ee04dbd1a9749e62dc2bcd801ccf679c7cd72892c1197a00eb70373e759f

    SHA512

    6809f50d858b73c7024e9d6a85847470bea1321bb4278c97c23d2e4530ceaad39bd0cf4fc72a2dd877fa11ce1bde3dbdd1fa770785cbb58dbf5524f5697cedfe

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

    Filesize

    28KB

    MD5

    19bc507f07dd98738c52b7a113ed24ba

    SHA1

    7c89561411805a95c9c5f7fae95ac8783819aad2

    SHA256

    4c417a87420fab5295bc5dc3fabcc5a165557bc65b0d7db1850d6cdcb53bb35a

    SHA512

    fe4ea08f476402d71dab223c4f95808898a9e244ea72cc4ffd92a726da23630724751cf532889174992c8d08ed343d30f51e974a4796aae3600412d378c76f1f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NG03V956.txt

    Filesize

    608B

    MD5

    75ecd0705350989a5645f3eebec828c2

    SHA1

    2ea2b10fd6dc0c3eb2f72c5f3628bce8c292c9b7

    SHA256

    65dbcca1bd6a083f3c982816c5c3d568f48a427320d42fedf6fa2e29bc3d1fcd

    SHA512

    6da0d640505ce3dc3c20c038dfa8cdaf984bd0ad1ac29fb16e72fa3e6420699acca2409b8d9c15cf579f43e4baa3f3485e4da9b515dec51fb89bfbf12c222422

  • memory/1820-54-0x00000000757B1000-0x00000000757B3000-memory.dmp

    Filesize

    8KB