Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2023 18:20
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher.lnk
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
TLauncher.lnk
Resource
win10v2004-20230220-en
General
-
Target
TLauncher.lnk
-
Size
1KB
-
MD5
6984845678619cdcb04e07f377939e56
-
SHA1
d0c331d312be501f9cc9ec9b692ee4275b7e0405
-
SHA256
e5c5b5ef2667ab3697380843377405cf3a5699163625f73497aa21f32919e68b
-
SHA512
e9203b10038105d6f5973a67c0dd2ed509376a7cbdb16803d19537b7650f14450f1a1a8df5cfc48e47696168ad4337ea7275e01fbc6b9bd0578bf15de18025ae
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133292533689077511" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1588 chrome.exe 1588 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe Token: SeShutdownPrivilege 1588 chrome.exe Token: SeCreatePagefilePrivilege 1588 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe 1588 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1588 wrote to memory of 4116 1588 chrome.exe 99 PID 1588 wrote to memory of 4116 1588 chrome.exe 99 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 2168 1588 chrome.exe 100 PID 1588 wrote to memory of 1168 1588 chrome.exe 101 PID 1588 wrote to memory of 1168 1588 chrome.exe 101 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102 PID 1588 wrote to memory of 5048 1588 chrome.exe 102
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\TLauncher.lnk1⤵PID:1504
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9a3ca9758,0x7ff9a3ca9768,0x7ff9a3ca97782⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1848,i,15860980331702098403,8138002475551910265,131072 /prefetch:22⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=1848,i,15860980331702098403,8138002475551910265,131072 /prefetch:82⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1848,i,15860980331702098403,8138002475551910265,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3236 --field-trial-handle=1848,i,15860980331702098403,8138002475551910265,131072 /prefetch:12⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3364 --field-trial-handle=1848,i,15860980331702098403,8138002475551910265,131072 /prefetch:12⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4580 --field-trial-handle=1848,i,15860980331702098403,8138002475551910265,131072 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4712 --field-trial-handle=1848,i,15860980331702098403,8138002475551910265,131072 /prefetch:12⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4728 --field-trial-handle=1848,i,15860980331702098403,8138002475551910265,131072 /prefetch:82⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5016 --field-trial-handle=1848,i,15860980331702098403,8138002475551910265,131072 /prefetch:82⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4536 --field-trial-handle=1848,i,15860980331702098403,8138002475551910265,131072 /prefetch:82⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4956 --field-trial-handle=1848,i,15860980331702098403,8138002475551910265,131072 /prefetch:12⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1848,i,15860980331702098403,8138002475551910265,131072 /prefetch:82⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1848,i,15860980331702098403,8138002475551910265,131072 /prefetch:82⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5fa0758f721cc2437a7f322c4ae6ba5e7
SHA158cd0201cb508bce343fa769adae2816b43cc540
SHA2565e3835b7dd87b24d696a9ddb91bf15fd96ed3d3ee02583229a56265f509c5204
SHA51250aa4f42cf8fc12775842d60681ef21dbabd7415bb4a0ce2e8babade8b6c70aa2419f12413697a158f13e56411af0165aef0f0c638f611a997fcaa07a0cccebb
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5c2302bdb241f90190e47ed08446edbaa
SHA1e49d83f484af48cdec9d3fd1294cce8ecfe307b0
SHA256724dfdb8e7c04d981e19fff336c32f1b9d3c2b50ce46c7191d578ea348c7472c
SHA51232eef02baae49ad6626901bf4d38912bb969b4f3ada5cbc6f0be69c6ee021b30dd2b65d5b3300d7ad05607553a807ef6253cf9e35863848934d7bb73f9f22c9f
-
Filesize
539B
MD5f0f9cf540de9892bcfef92e68cc4e711
SHA128e7cdc39f2b864383ae034db2a19c746433501b
SHA25684777cf7fcb09beee5955b930c91b81341146c9e5171a3ea499687096e0273eb
SHA512690dfe1d48c0375ad3bc052924dbb350e019d0243a8ae288becf0f9716f5f6a771b5db6262c0f8b42a455ba971f22f0dad00254a38aa636a84c83b75c96a4c4f
-
Filesize
5KB
MD58b69d8f5b8b29a14e9693ed19a013b50
SHA154c413bacc326b5eb5df37972775dbe88e1efe61
SHA256376baa77b5387bb674748a718e9ab87b1879848cc28d3d04ae958c39fae862a7
SHA5126a50a1e4e6caa25911edd4aad8928535942f024f834faab6e6325adcaf6c2776aac400be1725f59e029e201763e4576b6796ed67afeafc0831ac86f1be47a372
-
Filesize
5KB
MD57a56378f36c362891cd30d643c43aa78
SHA101507461677f0f192bceb3bc4ebcfe87d5f3ad04
SHA25645059ad6b44bbc4675cdf005eda86feb8ce3ca06e53e68a28ced9778b1ef152b
SHA5122218d1b840109fda5e3a0ff481aba787e6031bd0d2c98ebfeb33fb576c63bf356bc496063a8fa41d9ab00b11eaba8c63a4acd93cb96cb11614ca721597218fc2
-
Filesize
151KB
MD53f13abaaa5b4591db1b15c0e95ca4910
SHA1e282e1e33365f67c87203e47b0ab3f3b85ee207e
SHA2564cc30194fe61348f06170403bc011cac2dddce4da01db5f4eae30558d57fd636
SHA5123940b56584b42a24ff79e772cbcde3586d644cf095b632ef43d3cbd56edb567b27fb0c61c3beedebbef202a2fd93bb05bab94e55f6a763b0a9bf18b2b39004c7
-
Filesize
151KB
MD57bb89b40525c9e39e15e8e572476af05
SHA1f51ba226e5bcaf74074db22457876cd7971355aa
SHA256952f5a021105c9b5413fa5d07e0867b4c350332e1de22d710f9e71f31af95def
SHA512bee538040a76d658a89ffc5d87b739879ec4ce5bb882ca45528d5a0995c618d6110a9f039c46fc8c1a4e563420639c1c76681a480bb4349d12a1bc40d6cffb0b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd