Analysis
-
max time kernel
61s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher.lnk
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
TLauncher.lnk
Resource
win10v2004-20230220-en
General
-
Target
TLauncher.lnk
-
Size
1KB
-
MD5
47575e64831683fc028e06fbd5c77ce7
-
SHA1
4ba0ad1250592a301fd54bf06f58bad7b294839d
-
SHA256
2c362af82d783627d018ae38a4624da7aec8ecb0722fe8c8ea32ee18691f014f
-
SHA512
e167e329296a3ba56c677e502a01bebd544d5b0b75ff0d2eb840ce4d321ff4797f182246c288dff920cb929a5a16b4a5c0e37b4686a62178fb9c9e30bc989db4
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133250193305923554" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3248 chrome.exe 3248 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3248 wrote to memory of 1004 3248 chrome.exe 93 PID 3248 wrote to memory of 1004 3248 chrome.exe 93 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 3776 3248 chrome.exe 94 PID 3248 wrote to memory of 2576 3248 chrome.exe 95 PID 3248 wrote to memory of 2576 3248 chrome.exe 95 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96 PID 3248 wrote to memory of 1224 3248 chrome.exe 96
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\TLauncher.lnk1⤵PID:3484
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85bb79758,0x7ff85bb79768,0x7ff85bb797782⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1808,i,1041772683114263236,12476518140985333669,131072 /prefetch:22⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1808,i,1041772683114263236,12476518140985333669,131072 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1808,i,1041772683114263236,12476518140985333669,131072 /prefetch:82⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1808,i,1041772683114263236,12476518140985333669,131072 /prefetch:12⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3292 --field-trial-handle=1808,i,1041772683114263236,12476518140985333669,131072 /prefetch:12⤵PID:508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4476 --field-trial-handle=1808,i,1041772683114263236,12476518140985333669,131072 /prefetch:12⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4660 --field-trial-handle=1808,i,1041772683114263236,12476518140985333669,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4788 --field-trial-handle=1808,i,1041772683114263236,12476518140985333669,131072 /prefetch:82⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1808,i,1041772683114263236,12476518140985333669,131072 /prefetch:82⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1808,i,1041772683114263236,12476518140985333669,131072 /prefetch:82⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1013B
MD529ce97df701b6506198152180491ffeb
SHA1d91af041b37e230b03531df81b21611dba0f22c4
SHA256d3ad7a7d5fec64117a936b19146c288772cf0402e5dfbdb7b589ece22f68360e
SHA51280191018620a787952203b353fedc626337959e107ade1a9716b6b3e5f413a0559cd2e7c7126a814241ca0d65ea2aeeac1c3b094c02bb40e4157dd931ec7e301
-
Filesize
371B
MD59eb6dc87a731a3f152d8458fbb656790
SHA12ad2a5ce19d2a9cb9ecfd1a7ea53b9f02a1d18c8
SHA2564cc35186ed0baf831a39116fd2a32aee3b034fedf8de682c99561ca56eba45f2
SHA51254abd7e79b43e59e47964b2663c67ba98916ac3fa986da81dfb82c33931604fd405c7641a42473b49c242d74401565586138b36676d83e5807235c19a97afb40
-
Filesize
5KB
MD5d0ee5f6d4cb9b46a5a78bb36ca2ff94d
SHA1dde0478e300f363191242e91418b47e23e6d4f17
SHA256c2aa3400c7970a7c70f846217e46b9d9612082b845994e9b1504aba3229958ae
SHA5124efcabf0ae25c69f8775ce6066b59eed96413748e80c0e5befcec1296e858a6068f0af333cd20491e0c9d1f11736ccaaddcbf0e7d0599ca40957fcc5dd026664
-
Filesize
174KB
MD5cbdad370340767b836aa1cc981a8ad79
SHA1f544df94e85f3335024c5b59d8b2de20457db210
SHA256da4be6f3c794a39e78b5b21c832c55e314bc23aec2f19f62ba445e5a89507af0
SHA5120457ebaec348df25b5159916bd5856fbb92374819c469b80291384a9a84df2ec70f5142d564741957bc3e9db97f95ffdb2e32f42ba79142111c8f64df703a15e
-
Filesize
174KB
MD52588a457955b5779f7d7fa9225f62357
SHA18ddc545820b2704319f086f96de11e2b8f98a398
SHA2561b42037a8cd9b65dd5b6652ccbc2bf1b0a8365f3f08944a701559b8900414565
SHA512d1491ebee911a352bcb4ed416bf8ff49deebac44e2829efa6515a4fca156184b97976824f47d5fed9dea257a9cce73ee1c5be1a10986e09c3aad83486d622590
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd