Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-02-2023 01:25
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
TLauncher.exe
Resource
win10v2004-20220901-en
General
-
Target
TLauncher.exe
-
Size
5.2MB
-
MD5
58e22c0ee91280156cdaadacac7acddb
-
SHA1
189c552c94a9b0ae0208763bca77f2801debc224
-
SHA256
765cab48564743844b057e21eab768d5d84194a635b09d02d9d2909f632f5714
-
SHA512
9f510c896d641919b037e201f5ba9de476241e7cab1004d92a85df4b9240ff947737619921b1223cd926c8c5a6e667dc76cad37e818d2a9d144b826836d562c6
-
SSDEEP
98304:goW7Z7Wqa9a652L9kLttcV3hMfLOoUawcoU5Z/wx7ctxst7G8zUu:tWd7WqHxL2PctKfLOoURBU5Z/c7uxizF
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "382329112" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50bcb3b30939d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D786D8B1-A4FC-11ED-A70D-7AAB9C3024C2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fbec07815684004d899a318f710de6af000000000200000000001066000000010000200000000036872e72cefa20376a27f7db0fdc3004819288bee7806b733e422570bd0e30000000000e800000000200002000000099c0ba7cd457dd3458a54b328d4561b5570671fe1d19dd8e57eb6cf2831eb5c62000000073e4bd91c291888257f2588ef7ab5c09a267453bc7a933d6927199532a3bf2cc40000000c7d20321bd91d4af744da599ff1de3fd15491bd6de3b1945e16577f857e8b632add83c706be1727f9ce28a87d7b35b470b58fd77d75d26a6ae5a83a388df7ab5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 764 IEXPLORE.EXE 764 IEXPLORE.EXE 764 IEXPLORE.EXE 764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1736 1820 TLauncher.exe 28 PID 1820 wrote to memory of 1736 1820 TLauncher.exe 28 PID 1820 wrote to memory of 1736 1820 TLauncher.exe 28 PID 1820 wrote to memory of 1736 1820 TLauncher.exe 28 PID 1736 wrote to memory of 764 1736 iexplore.exe 30 PID 1736 wrote to memory of 764 1736 iexplore.exe 30 PID 1736 wrote to memory of 764 1736 iexplore.exe 30 PID 1736 wrote to memory of 764 1736 iexplore.exe 30 PID 1736 wrote to memory of 764 1736 iexplore.exe 30 PID 1736 wrote to memory of 764 1736 iexplore.exe 30 PID 1736 wrote to memory of 764 1736 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://java-for-minecraft.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:764
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af2de5c04ceceac0ca47144fb588032
SHA1be1ad850269bfeb0b6943cdabb4782ad2147a9b8
SHA256ed32ee04dbd1a9749e62dc2bcd801ccf679c7cd72892c1197a00eb70373e759f
SHA5126809f50d858b73c7024e9d6a85847470bea1321bb4278c97c23d2e4530ceaad39bd0cf4fc72a2dd877fa11ce1bde3dbdd1fa770785cbb58dbf5524f5697cedfe
-
Filesize
28KB
MD519bc507f07dd98738c52b7a113ed24ba
SHA17c89561411805a95c9c5f7fae95ac8783819aad2
SHA2564c417a87420fab5295bc5dc3fabcc5a165557bc65b0d7db1850d6cdcb53bb35a
SHA512fe4ea08f476402d71dab223c4f95808898a9e244ea72cc4ffd92a726da23630724751cf532889174992c8d08ed343d30f51e974a4796aae3600412d378c76f1f
-
Filesize
608B
MD575ecd0705350989a5645f3eebec828c2
SHA12ea2b10fd6dc0c3eb2f72c5f3628bce8c292c9b7
SHA25665dbcca1bd6a083f3c982816c5c3d568f48a427320d42fedf6fa2e29bc3d1fcd
SHA5126da0d640505ce3dc3c20c038dfa8cdaf984bd0ad1ac29fb16e72fa3e6420699acca2409b8d9c15cf579f43e4baa3f3485e4da9b515dec51fb89bfbf12c222422