Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18-07-2023 18:59
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
TLauncher.exe
Resource
win10v2004-20230703-en
General
-
Target
TLauncher.exe
-
Size
6.3MB
-
MD5
a09d58d5281883d9b555cb8f99974f57
-
SHA1
f900108770e0ee69a88df27bfeb3aa13322385b0
-
SHA256
dd5891adfd1f98f945cd02c02a231a41c8224ccc350050b65e2b987e075920aa
-
SHA512
0f9fc01df7bd6fcf25893ef1a31d0105e19a853d81d475312c1ad4d3f17b77ad6cba659c4b78bda8040279c91947d9277987447a3795b7acb393a5eb95ae8f3c
-
SSDEEP
196608:kF52l8bIboBT5eN0Ca/TuQnxByJRHcj3pqxsY:hRNNG/TuoyJRui
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a91d4b999c9854dbdd04be1b9b2202d00000000020000000000106600000001000020000000a0724d54962d95917ba1cac6b0665e65264423676e0635850cd86e25257b39e5000000000e80000000020000200000002cb3ca3fab7283f12e97314ebaf25e126dae65b65e6cefd6d752f848ce27b49020000000c70583bf6ade6335180329becd497be69e7ba562955c2d7807d5d95f600a233d40000000446d901ecbe837dad394a3389bb6081cff70b317c63b8fb09e1958f38221073b7260a447334b189f418ea6a235ee91a2308a0f252ca872a962c46d54600ffe68 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a91d4b999c9854dbdd04be1b9b2202d000000000200000000001066000000010000200000009f9d2a54ad5fe774ec1cb96ca527478ff3f48b2df0f4564e73c0cadd91f8c4a5000000000e8000000002000020000000263ab0ffbae9a414298bcaa9d7bcc8021b0e78e95893f7510556becd518619b0900000003dfad57a49877725ee4ba0ec3eac6ef19c1607924a9e7e2f2191b752248a5adbe21e3e825917fa575f440ca516bfbe15f2c048a4bf8a9eae01f09a4dbff7675b43941a94b95fa5a894d73c28e0a444530db022bc06be2c936b1fd10f205d939ab7d76b8ba9852b123a47c30bf86ac0124d31f7b0251968f57e26fee8ffeb453782fc6367f566502e325ce1286d6daa0f40000000d0400c1f0e362436626b28f955970c5e7d1df68e9bac258ec6d8f924e9492789d8213c41699053a2ff1ea36066eeb715a93e458112a4fd4347696c1cf318bbab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396471784" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51580441-259D-11EE-8FF4-7E970D42A387} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05afe27aab9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2796 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2796 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2796 iexplore.exe 2796 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2796 1492 TLauncher.exe 28 PID 1492 wrote to memory of 2796 1492 TLauncher.exe 28 PID 1492 wrote to memory of 2796 1492 TLauncher.exe 28 PID 1492 wrote to memory of 2796 1492 TLauncher.exe 28 PID 2796 wrote to memory of 2916 2796 iexplore.exe 30 PID 2796 wrote to memory of 2916 2796 iexplore.exe 30 PID 2796 wrote to memory of 2916 2796 iexplore.exe 30 PID 2796 wrote to memory of 2916 2796 iexplore.exe 30 PID 2796 wrote to memory of 2916 2796 iexplore.exe 30 PID 2796 wrote to memory of 2916 2796 iexplore.exe 30 PID 2796 wrote to memory of 2916 2796 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://java-for-minecraft.com/2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5336f412a809d8e4bd477d59337af9d74
SHA165263c46dc5b4b10469929df8f0003c05764d242
SHA2561d6c16d99045e2aeb2319942467062936b823bc8b33fdf474470f0c7b49dedb9
SHA51226a516b20df308f0836be77e3ae2f82c70296c9bcee72735ddea7e5ccbb3eb31153045f84c3afa89bdf99ceb6a28c7f75c55e6b9669ddab93c8acf9d46f04908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518addb8548613ac55c64c89628d9d15a
SHA16739407f5a8d3626d96dda618b2c4fcb8d7170da
SHA256c419291ee119c7b13b72dffa6f36f55b0024c15b6dcb45fe48c346050d8cb959
SHA5120bd24e5555543042fbbe85ab5a447f20762a994dcb9ed53c64b608001d1bd89735c0cc5db75d754f673de40d287c68d597ce2db056ac26b3beb72b12a3bfe7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597e068b6991ec0064ce256e0d538e8eb
SHA1480f11b684d9f110e12474d5f85328ed98d869f9
SHA256e30636d301d79aba3cb442879fe41dc4e7e7d11e9b1ef3b098c369eac785ad8d
SHA5124a909b3a422dcc0581880254219af9b201d1de34dabc28c75e7560c30fe74f7aed8dcd15df170fa83f91bea73f379b0f87bccfc7d030037048c9c02951e14c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcba30c3c265bca8a33326b4492ad4f6
SHA1cbacc61a32f8494474453e48a7dacaeb5b5a32da
SHA256698a9ac58341d99c8b8d933283b741713082f9ee28acd78f7191bcfc3550c6e3
SHA512d53cd6035dd4c2d7512626ad1274664fa8d1e51894199e544b5bd0e827c80d64b3a3bdd582c2a95ca9dba28843d71acca3d445d269647bb437cc52fb8bafa1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ff4a867dfd1a94cb6a2b4e7a42105e8
SHA1c8155084d352ee30f15cf0ca3e891fd77b9378e2
SHA256d713d72d6ed331aab7d4ba92acca8768333b3559dd4ef4210ef721af1797cb52
SHA512b1c93ef9d055348ebfe42b71b8f1dacd1274ffe2f7d8c200cceccbd4933069891e1bf9d02c36dadf942cc2b33da2e2b6d30f2dbc35f9e5e1d04d0eba8f494fb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f0e7fc5d05df07ec2d24e378f36b5e7
SHA1c4b60bfd6fefa1903db8fe5e08a2ca1b234c768d
SHA2568118eb287020a7980e821325c154ffab8912703a101932a66e5799fbf4064e25
SHA512f48e98f124ed4895622720fff4d93e5c278f0f9a9c00b807d72306e1007821be6dfe9c34b086241f4a337e08b430fecaae87f9da5ddb4fa4430c81bbda9def5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5059c4ce8af050bdcdbbaf7b5e9591fc4
SHA102eacacc260ebdc4e54f48d68b9f10252e41a36c
SHA256a0f790cae6504983349b306ca25a5f5c07c5c69c9273d73b2fdad52a33654358
SHA5128edf02580f2fd40d89da9a316b98ca2c42dbcfd86b5f92687d277416fa17c7fb2578db43ce4beb856f1438d93ef6fef87df3ac8e477bfba33dd288d911745383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cec55270d085b111fbeeb6911899c8af
SHA1ad0a7d1b3d60452010a39e743ca2b378e79bfb51
SHA25669fa20ef08a0728be9ed3917bfe09c020853f49c6294c7ab793eb486bb5bc7f8
SHA512c30d7dc62a701841f19009068d5cd3cc577d1ac3606f1e0e52dd20d5b107b1da49632d25855d8e74e725da8fa5cf531f6b2aa1bec229463f9c65b636dd097f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d3d1fba74b3ce9aa7a2069940728264
SHA18cdf2cfe4e3c0dd37e50f4bf1e50c1cc26b4f198
SHA256b336a5cbf12792195714fe42dba414f3a0f4be5188cd484aa78abfc526ff77b1
SHA512f862d6db8a60b59b334ef4674d849551e5ff3fe99f3da143e056b4ff2200c1b7381483d2871c86f1088a99f23cb507121f2389cd6f48f97650172eb106343723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d236d3b082bc8d4f6212afa4186dd87
SHA111d67b10621a6f14728ee5def03c0e1bf74772b8
SHA256f62561b7ce557b8f6f573e49104343cbbbefa7d00a69355d7905cd417ff6ae8a
SHA512db13ce2c7ce19389bdc982e8eeeaf4644bcd71b3214db0d4dcdf883d962e9a7c43a1c27e82548aa76c4c6507a5b9128c4731e7d598e1535e73976237bcd339e3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BNJTQ62U\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD51eaaf69d39d9588b89063d6506ed45eb
SHA1dfe2cb997002998e43a07a3f5a1b58a78be59bb0
SHA2564f56af1e8d582851d6abbd8cf5e4849b42ee2e7d2e905b527c45e6f72bc5fc7b
SHA51220af72bc43caec04b2b51c172a6b4e5668f99bb87b4742ee4427f9d3ae46afc54a31d0b0b878b2177db1ecbff0a14d18f1e64b891e290732f6b308b966ee3d10