Analysis
-
max time kernel
119s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
14/07/2023, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
TLauncher.exe
Resource
win10v2004-20230703-en
General
-
Target
TLauncher.exe
-
Size
6.3MB
-
MD5
a09d58d5281883d9b555cb8f99974f57
-
SHA1
f900108770e0ee69a88df27bfeb3aa13322385b0
-
SHA256
dd5891adfd1f98f945cd02c02a231a41c8224ccc350050b65e2b987e075920aa
-
SHA512
0f9fc01df7bd6fcf25893ef1a31d0105e19a853d81d475312c1ad4d3f17b77ad6cba659c4b78bda8040279c91947d9277987447a3795b7acb393a5eb95ae8f3c
-
SSDEEP
196608:kF52l8bIboBT5eN0Ca/TuQnxByJRHcj3pqxsY:hRNNG/TuoyJRui
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005a31a35914bcf84cb1db54e391e8cdcb00000000020000000000106600000001000020000000d57582b27c38cdc8d08fc5641d21f8205a12266d0fd9956c00f541966171329e000000000e8000000002000020000000c16e63cb51a6058114eb8705df4133d3e2422050e8e09a896ef121c6094636b520000000f3098cbff0ba7e6211e711b5d5391276b25858f519026583467204f740d4fd02400000006f269c38adaf507276196d1dcb4783527bc053b0f541606e6e9842251566914b9d9d764e4cce5e215f12b7e36a57b184449acaf3e2919b2cc6478a2dd45690ef iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107299f27db6d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396122943" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1BEAA761-2271-11EE-ADDF-4E44D8A05677} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2572 1696 TLauncher.exe 28 PID 1696 wrote to memory of 2572 1696 TLauncher.exe 28 PID 1696 wrote to memory of 2572 1696 TLauncher.exe 28 PID 1696 wrote to memory of 2572 1696 TLauncher.exe 28 PID 2572 wrote to memory of 1032 2572 iexplore.exe 30 PID 2572 wrote to memory of 1032 2572 iexplore.exe 30 PID 2572 wrote to memory of 1032 2572 iexplore.exe 30 PID 2572 wrote to memory of 1032 2572 iexplore.exe 30 PID 2572 wrote to memory of 1032 2572 iexplore.exe 30 PID 2572 wrote to memory of 1032 2572 iexplore.exe 30 PID 2572 wrote to memory of 1032 2572 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://java-for-minecraft.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1032
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5708518d942ded2065d8b600271a97c04
SHA18cb33669120bb323e20c0a4dcfeb3e19cf41a3f4
SHA25680cad0e806dde6c78594016dbce3b691e58f1a362edae0c3666c0d03941b4dc7
SHA51228a317eb501de04a3f882af8732404fc040a0a430b5709fa645a770a6bc9f2691c85228279d1b22af36e3fa777838a92637469a57d55b27f36c3dac53cfb750b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6199be894f3efea626c86c253565c35
SHA1fd9f1ee68336193ea02a009ff8881afd1d317c3b
SHA256074e434d9862d8502d18696d74586d6dfbd42a9ef572f9ea9e2e09c0861ed1b6
SHA51279cdb6dc67db9dec17084299186f7faf26068a2c50dc3188f99a4e5a5af98d1710c2d019ec785806ee271d72e0e6275d779a504bcb4a31bd4083441ed35a4c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5814b1ba2d27f99dc66edcdaeb633bce2
SHA11b1ce6d09bd915a48a07e4984b92dbca02e11134
SHA2568978e99912517b3638625a8ffc1d13b43ced45dd61cd0d8d5772a0edd6262366
SHA51228b15628786e8a4908e76b525d8920226bea15bf2dd40445bf2c9f44d52e7c5c9ee7739f13d9b55f093c90ddf92cc500217d76481f33f68a21342529819878c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed8cb2916ddcde3b48c3f40047b3dec5
SHA1e5a4518f6ed7ec108b449f0370d5f641a6f51d51
SHA256a276909dddce07703e4cee2e0efb334c025ac4d7bd54330a94f2fa72ca9b69bd
SHA5123b7f5d4f836ccb624b6cd2de1d00b7b3930db7f261ad05f43f3db0ce87414d021fbe5eb7af1cfb00ace706be8d725647a654aa3496985443a6ed4b76e337cf30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a966d4ee8c8d5d4e13afd5b46b9a2815
SHA1736949b746623dc610dec9bdca367f5537180a5c
SHA256d29387aaa03ae36d4e6ac073a997bd8e7a664110a7353043eb77682c31a37bda
SHA51218232037c0e80302f6e3d95c1f27008ab4cb3dcf41ff5df7afdb47efba2430dd9586582d65f090591f781e0e11764367f38510c54c20686bd00a6f1252485a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537879b66e58d2aa62f5b986de852fe34
SHA1fe5865b6df387aa2e01d830c28508d23a519bfec
SHA256a2ed2c00e62d1b2ad29f3188b952a4165189e0015c4cc3498bd1f7e2c6141eb7
SHA5124cf8d309bcbc860bd907e27256c0e46a47e806d9cdccf8339b754cc7df5a52cf2d0c80de75b451eb6aa9bdce43feeaec4ed3eec75f24a51dbe979862d4f82001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5562755d53de8eb74af63d07724d1ff62
SHA177e1ba166bebbe962f8012fe8f6a9ce51ed68637
SHA256b4f32a1dc75e1fe215498d3274805f43f79953e3414ea90626a8d5e51e9f8349
SHA5123ed4e8bfce3e7dcdc14fa5e8c486ceb6e8c32753ca5400e33167a3c65f98b9bc6436a4d28368ae4774343937b054fdf2b1f1fa4c25ae0bfe19b1718e3608f647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b9c6393e2ac995d1790a8269e2d44f2
SHA14da11cc48fce007cacd3d97739077d60169cd558
SHA256ef391c3a81dc70ce6c2a5a5df73931d18caa5605506cbaa9421c5cc4fbb024fd
SHA512ebe4222764a705a087a6cbde5e0875bf876b3603648f4861482eff4074d010cff677e4d1ed4458bcf3bde5f52384a5629c866312753b21fcb2637cc33f99f57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f215afd3082ca8186ae1b82016f90d26
SHA1ccb26856518afde76c1e3834a44695b2c6c7b7b2
SHA2565398a139de1c85ca47e35f602f63482f596c93b894d5c9722a558a3abc2f37d8
SHA512777ce2373c46dba72c0bcbfefbe086bc12eb2eb1c0d3f4a0d23505f1f94e886c6858aa3aadd3de623e54f0a75001df8fb97647e357f829677b7cbd7e3b2e65fc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1H774PEZ\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
596B
MD5350080b39b1e4d6695f1c6bcd78f446c
SHA1c5c79bfae5a575c5a6726647817dfe2fa7747dd2
SHA2565d85175b0276d9ad353e20ebc4157389b9537e768b8f98b2993dc3a74773ed28
SHA512ffcbaeff1c7e44bab46ad323408d7a2305acc7e094201c7ae2e3531b19e22dc62caabc216a9e9e73f71ed3fa57a16223aea38d12979956d8e520c07026becab6