Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher.exe
Resource
win7-20230220-en
20 signatures
150 seconds
Behavioral task
behavioral2
Sample
TLauncher.exe
Resource
win10v2004-20230220-en
2 signatures
150 seconds
General
-
Target
TLauncher.exe
-
Size
6.3MB
-
MD5
545c62b3d98ee4cc02af837a72dd09c4
-
SHA1
54446a007fd9b7363d9415673b0ac0232d5d70d5
-
SHA256
738029a4f974128180fa2cd239e873b01e456e8bf53bfdbf34b8ba8b57897be4
-
SHA512
8bf9c754861ed267efd2055ac09b4ad44df61b989859fccd14190592dca1dab0fa8f57360209eaceabb5137f742c9cea73a1a985ab1955f87a6875d0be95fdcf
-
SSDEEP
196608:5f7ffML5vgtXB0IXf2tT2MzlHShlhmN7DGL:ulNIOtT22ShlA2
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1104 javaw.exe 1104 javaw.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4868 wrote to memory of 1104 4868 TLauncher.exe 84 PID 4868 wrote to memory of 1104 4868 TLauncher.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1104
-