Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 16:57
Static task
static1
Behavioral task
behavioral1
Sample
LaunchTM.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
LaunchTM.exe
Resource
win10v2004-20230220-en
General
-
Target
LaunchTM.exe
-
Size
178KB
-
MD5
e68abe4d3218d6a029f1889e7dcc3d5b
-
SHA1
afcbaf1c3bae5d87077bf54d43add68e73d0023a
-
SHA256
61261391d8f4283d539ba4cd19bed875296ba8e1aadceab272c9353f90a22df4
-
SHA512
2dfa0f2d824bef66dbaaed8e2e0b873c757a5a69a5f6fb5b8988152aca4c8221966b779d093c27186eabd64a45b05ee40c80283f2de7a6714d1a34c579a58c83
-
SSDEEP
1536:zUBuPm8UngMCw2I8FXmzOGDBdpunOl1UIHmejrDwkKgT43FVkXXPKedjXfaW:Ou3eCO8FXUO0iOlCIHmeRKPKk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation LaunchTM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1672 Taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1672 Taskmgr.exe Token: SeSystemProfilePrivilege 1672 Taskmgr.exe Token: SeCreateGlobalPrivilege 1672 Taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe 1672 Taskmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1672 1400 LaunchTM.exe 85 PID 1400 wrote to memory of 1672 1400 LaunchTM.exe 85 PID 1400 wrote to memory of 1672 1400 LaunchTM.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\LaunchTM.exe"C:\Users\Admin\AppData\Local\Temp\LaunchTM.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1672
-