Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/07/2023, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
TLauncher.exe
Resource
win10v2004-20230703-en
General
-
Target
TLauncher.exe
-
Size
7.5MB
-
MD5
6759c36759dd90ebb8e03ea74c80274f
-
SHA1
37ac28c755056c31db6c41bf636fce70005d9668
-
SHA256
9c0b2609ca1e6b0861ea23188bf29ac9c077f7c1df184fc424259a283a07391f
-
SHA512
712a8fa670320ef25ba5e5ac5de1e6fc910fa62d2b19b9d9d72b5cd7dec7a3423f0fbacf33a1d3564145d5caf26c0d38f518eef083b31f2d05de99d7619c628a
-
SSDEEP
196608:JPK0cP4gvtnn7YopNpN5BNc8nv+XjmsbpwWd17cjex+pAk:YAW3I8WXjmRWd1RS
Malware Config
Signatures
-
Downloads MZ/PE file
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = e885d7689fbdd901 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b14723a8e389564aa88fef2378dcfc630000000002000000000010660000000100002000000046af0807a15d9cebde7cf803a3dc9a9eab9625c2f2bd4b0e2ca803df638fe4c1000000000e8000000002000020000000d05f7da4c5d87be428f16fb50c61706f66a16f428b5e6a16a1d13ed1ffbf899420000000619a405f230fcd8625bd111c8a1ae7e73a4f7f5f173909050bc6f42ed38475f240000000448ed0de73dd13802f204581133e93bbec9aecc3c148168d2b494aee36f9484b4edd66693c2d971addcb24404e2b867f00d0115fdbc5a59a3c1c26697a72ccd4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a4b4769fbdd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A00EBAE1-2992-11EE-9A30-724B81B1CE5D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "396906996" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2604 wrote to memory of 3008 2604 TLauncher.exe 28 PID 2604 wrote to memory of 3008 2604 TLauncher.exe 28 PID 2604 wrote to memory of 3008 2604 TLauncher.exe 28 PID 2604 wrote to memory of 3008 2604 TLauncher.exe 28 PID 3008 wrote to memory of 2984 3008 iexplore.exe 30 PID 3008 wrote to memory of 2984 3008 iexplore.exe 30 PID 3008 wrote to memory of 2984 3008 iexplore.exe 30 PID 3008 wrote to memory of 2984 3008 iexplore.exe 30 PID 3008 wrote to memory of 2984 3008 iexplore.exe 30 PID 3008 wrote to memory of 2984 3008 iexplore.exe 30 PID 3008 wrote to memory of 2984 3008 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"C:\Users\Admin\AppData\Local\Temp\TLauncher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://java-for-minecraft.com/2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f6292709a0c382c138b68afe6738559
SHA1369e5a3c2570c0082537fa7901763bc32921744e
SHA256c7e30d3643b587fe67451d882e196b780aceae48a7005ea43789d387e8fbfc4a
SHA512a1b1fae507c786cafa9a9a5cf7a10d72147088294f44fa80dd7eab217cdb4f34d78256cbd1d13ecd6a10ec3f995239be6d85f04e27af8475be52f4934f4f41af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5799b559a0833403dd522fda884af72db
SHA161662e68af4863eb6e9e6dbdda3e09e697a7a14d
SHA256dbbc7d9ec7d34d5ccc4d5c4771bf9ab9fc1470eef4abf50d760a095fe3728c1f
SHA51266910497431c8a9ce6563f2fd7a8f79645e9466a8cda4f444fed7d65b3e5ba23e10637f2c67652bb76f8aaf0c33052870f3ba3bc9b14a64ad488d379c097d654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eca46b6c6d3fac977b8c0affd41f482
SHA1d97aad8f9c754f7e587722b644605890e9075623
SHA25657b2756adef7963bcbbafbf38fe96e1fbda1efc99e13dee95c24c0f2f79311ac
SHA512ba6ec1689caa8956edbdb553822ae8e61a543ed2017ae479e74c6d0f5c485b13e8355afd516ea35a6bcfa70bf09a01585d3aee1377d3a7541c15ac2fd3ba6a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572e268b9fb97b917e5981fe8afe93af2
SHA159cf148c1920914378d394ac623cfd3159a9fc81
SHA25625594c6a51335b5f8c99e7f2ad4dbb5abb17631a361516143fff54c98fffc826
SHA5122d1dbf1a0f4378bc8a6093d747012411994964f3d1e4f45384efe1d8711ee505a0c27beb2595b950931a8ab196abb9fa6ae12614d43335935fa0d0fe753379e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad2aba3f1dc5a340cd9c212848c5abc3
SHA1106e07dea854ab1eb4dcb697a29a0b590192937c
SHA256fdd825aae6db04ca8a9c9cd1b7fb0dac31f88ff6e03ce6f610378c4c4a38d9e6
SHA512792306f4c5b3a9a9d82420faab483870f9fdc0fef5bc4e34a5dd710c66cc9033cc6c0948b772d179db34020ae45f460de6a4119971265b4d12b0b1741c97180a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e7ea06cb3c3c237e925d4a9c6747680
SHA1ffbdeb07b4cebf551767822e75062442f4af669d
SHA2565f6c65f4cb9dc3e06d87c3e4225167b6536e2d05866b9bca470f484973f38db8
SHA512e3468ff45a5bd6346385e1b64adf9897137ebe5481d2d687d705ca182081700ee693f902d18d26f7d9e02c319b2b538a8fc79fc77999913b1dcc5038c4adb96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d20c37b3f6d7034281cc9ed9e1ca186
SHA14b1b7ff189ed6eb54b536d796bef2d13a64ff41b
SHA2560fa6708b3256f76c207389511658d4806e34dfe91908dafc6d6964bca4f793e9
SHA512a1daf88422f87175864c4a3bb99638e49a712497dba388254254122b9925b7c2856775ece138f357af0655acea4cdf4cd455f1b5ceaeaa449c9aa48b022a8b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5915aa3188454c11df83669f40dddd375
SHA18fab4a0ee99464f1ff4e50a68311a799ec40620f
SHA25657653c562b743c9f629d3a5a688dc93888ff458cd8eda3bb312642d1e05661ff
SHA512d0cd847cdd3f6f3ee5835b6ddbb1c10cd0fa8f279caf7d62f2679887fd3dd10d00132da15488d75366827f5834eb5dc4b8ce5a24a413aefba5f64ac98ec44cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57634a6eed4c678ca8326cfe97a660734
SHA18fc6bdc0963386c1d8838eeed5277621b478f5bc
SHA256839c330fcd4b89314a28f5630044307a980c6f49923f1f659b3cc055b5b208ad
SHA512cae1d725a51d0ce593983f76fa16e4c3a593b77773686f1abb296e1d67d15fba7370661de8846db292c8f1ff806d3ab3dba25a5babdcd4f4f9b4b4cf9ab2148a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555db531a0867987b90cd3f4032c9741a
SHA11622f754a895013ce961f9c6c12a3f5cfafbbae8
SHA2569835b2e066ee45fcd321eeab068e03ee6ee9530b56a638f00205f5cb435aea6f
SHA5123e351eb112e3f44f385a5bf5e7042832e505a86b31f10b9efadf52c43bd3e128272f19af80809d4f82883d782c86a11425b83bd1f51f2f56ebfd1b29a7ec0ab3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ULULORKV\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD590106cccd7511535f339b67d4643f1b0
SHA16c0ccff797ca97df2aeafdf68abd20388595fb06
SHA256707806f0fa6fcb35d82b683bbe7d25fee03c2ad245b9df5559d51cf0f6b7fc46
SHA512c55d33d1224b4af04bc364706b07d4af2230369f24f9d6e39926c36261086a172a2e6854568150a85293ae604cb4b695c218359717bba9d3c14c33ed8e34e6b9