Analysis
-
max time kernel
293s -
max time network
273s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-es -
resource tags
arch:x64arch:x86image:win10v2004-20230703-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
23/07/2023, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher-2.885-Installer-1.1.3.exe
Resource
win7-20230712-es
General
-
Target
TLauncher-2.885-Installer-1.1.3.exe
-
Size
22.6MB
-
MD5
bd3eefe3f5a4bb0c948251a5d05727e7
-
SHA1
b18722304d297aa384a024444aadd4e5f54a115e
-
SHA256
f1b132f7ecf06d2aa1dd007fc7736166af3ee7c177c91587ae43930c65e531e0
-
SHA512
d7df966eeda90bf074249ba983aac4ba32a7f09fe4bb6d95811951df08f24e55e01c790ffebc3bc50ce7b1c501ff562f0de5e01ca340c8596881f69f8fed932d
-
SSDEEP
393216:KXGWOLBh2NPfs/dQETVlOBbpFEjdGphRqV56HpkoaH3D8P2Q6YS6x9DOc:K2/BhSHExi73qqHpu34kYbzOc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation TLauncher-2.885-Installer-1.1.3.exe -
Executes dropped EXE 1 IoCs
pid Process 2132 irsetup.exe -
Loads dropped DLL 3 IoCs
pid Process 2132 irsetup.exe 2132 irsetup.exe 2132 irsetup.exe -
resource yara_rule behavioral2/files/0x00060000000231f1-138.dat upx behavioral2/files/0x00060000000231f1-143.dat upx behavioral2/files/0x00060000000231f1-144.dat upx behavioral2/memory/2132-147-0x0000000000480000-0x0000000000868000-memory.dmp upx behavioral2/memory/2132-474-0x0000000000480000-0x0000000000868000-memory.dmp upx behavioral2/memory/2132-475-0x0000000000480000-0x0000000000868000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2132 irsetup.exe 2132 irsetup.exe 2132 irsetup.exe 2132 irsetup.exe 2132 irsetup.exe 2132 irsetup.exe 2132 irsetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3628 wrote to memory of 2132 3628 TLauncher-2.885-Installer-1.1.3.exe 85 PID 3628 wrote to memory of 2132 3628 TLauncher-2.885-Installer-1.1.3.exe 85 PID 3628 wrote to memory of 2132 3628 TLauncher-2.885-Installer-1.1.3.exe 85 PID 4388 wrote to memory of 4440 4388 msedge.exe 105 PID 4388 wrote to memory of 4440 4388 msedge.exe 105 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1752 4388 msedge.exe 106 PID 4388 wrote to memory of 1508 4388 msedge.exe 107 PID 4388 wrote to memory of 1508 4388 msedge.exe 107 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108 PID 4388 wrote to memory of 3444 4388 msedge.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\TLauncher-2.885-Installer-1.1.3.exe"C:\Users\Admin\AppData\Local\Temp\TLauncher-2.885-Installer-1.1.3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1910546 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\TLauncher-2.885-Installer-1.1.3.exe" "__IRCT:3" "__IRTSS:23661420" "__IRSID:S-1-5-21-618519468-4027732583-1827558364-1000"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultd3c80540h8ecbh4924h89a3h4f7782481dca1⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff869e546f8,0x7ff869e54708,0x7ff869e547182⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,2076959776853188846,2070955219847272338,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,2076959776853188846,2070955219847272338,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,2076959776853188846,2070955219847272338,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:3444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD570e2e6954b953053c0c4f3b6e6ad9330
SHA1cb61ba67b3bffa1d833bb85cc9547669ec46f62f
SHA256f6e770a3b88ad3fda592419b6c00553bdadc50d5fb466ef872271389977f2ab4
SHA512eeacb0e62f68f56285f7605963ca9bb82f542d4e2ccc323266c08c9990cecdebd574e1ab304ae08ea8c6c94c50683180f83562f972e92799ebbcfcd8f503fb5a
-
Filesize
5KB
MD5fe6aac1ee7f8e39969b987b3dd1b2548
SHA1d482ca7ec092b0fb71330cd561f6318a0d473b12
SHA256e09fc5b87c46f6eb445c83fe2f0f227f5ccd218ed7879f71731aa4fac265cbb3
SHA512bd5fd91130656342916c85061616efe7481e0317111ab541190938ecddb74ea81f16429eb1dccae1a76b516f4e957a0876c1b0a1e82926d966d974bf2248d871
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b8d8dd5d-cc17-43fd-880d-58bdbf30d43a.tmp
Filesize111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
3KB
MD5baf25a4ef1d78a1c5ee4540282746881
SHA10958fdd3b20b319878f09b934d09dcc4bc0c4b83
SHA256a551c7d152ab0c7bc0ea34e8b75f2da3c64671d6e913f896fd1a7f19148fc3b0
SHA512f41713c8de42e28e59abc2cf0b8a28c4b7cadde60dd25398e4141308115da16f5b9a8a8cef4ee12fe6b3c913fc53fb1a1d4446f256f1300b85a9a4af3f36084e
-
Filesize
116KB
MD5e043a9cb014d641a56f50f9d9ac9a1b9
SHA161dc6aed3d0d1f3b8afe3d161410848c565247ed
SHA2569dd7020d04753294c8fb694ac49f406de9adad45d8cdd43fefd99fec3659e946
SHA5124ae5df94fd590703b7a92f19703d733559d600a3885c65f146db04e8bbf6ead9ab5a1748d99c892e6bde63dd4e1592d6f06e02e4baf5e854c8ce6ea0cce1984f
-
Filesize
1.8MB
MD5cb50d496ae05fa1c8bfbcb3b7f910bfe
SHA13ec4d77b73c4d7e9858b11224314e99d082497a8
SHA2567616c72f6659a3a2439d0452190459cd4ceb83fab2307e3e47c9604fa29d9f34
SHA51222051de06c7e52a37ad36250aa095a8ccc0b0e1cdbfa2e9073c146e77e278cbdbe89bdb078dcfd8babf48baec1902b303ac39cc9db4114ce1516b06552dc924d
-
Filesize
280B
MD55803b5d5f862418b64caa83396e69c7f
SHA197b6c8209b8ad65f4f9f3b953fe966bb09ee4e13
SHA256ee340f8560ba2e71d7e6d305b959ff8fa77869dac916287da2bff7ce5aa2e159
SHA512e9bf37f0c89299bfa369a8677ac56b12177dd3153246e5e6a9390577658111b731b0ab987044d30f43e05cb41d79ed31dae3b6f4521f225925920617d0414edd
-
Filesize
281B
MD560a19921c7ff3c75e28c302f95460994
SHA107ac64ffbb153c8675e2ce0651afeaa5e8c6652d
SHA25633341d30463fbc7cf3fba5070925569c822b6835aabdb8ef2c3cf09547912d46
SHA512b30b960152dc13b1a9d384c4972169392cd405bdf4d3ecf73f85cf8a9a68a075131b2495c0348f54d43d0e7a279907bc7b76ac103f4a624738cbfc73bbeeba02
-
Filesize
1.7MB
MD51bbf5dd0b6ca80e4c7c77495c3f33083
SHA1e0520037e60eb641ec04d1e814394c9da0a6a862
SHA256bc6bd19ab0977ac794e18e2c82ace3116bf0537711a352638efd2d8d847c140b
SHA51297bc810871868217f944bc5e60ab642f161c1f082bc9e4122094f10b4e309a6d96e3dd695553a20907cb8fea5aef4802f5a2f0a852328c1a1cd85944022abaab
-
Filesize
1.7MB
MD51bbf5dd0b6ca80e4c7c77495c3f33083
SHA1e0520037e60eb641ec04d1e814394c9da0a6a862
SHA256bc6bd19ab0977ac794e18e2c82ace3116bf0537711a352638efd2d8d847c140b
SHA51297bc810871868217f944bc5e60ab642f161c1f082bc9e4122094f10b4e309a6d96e3dd695553a20907cb8fea5aef4802f5a2f0a852328c1a1cd85944022abaab
-
Filesize
97KB
MD5da1d0cd400e0b6ad6415fd4d90f69666
SHA1de9083d2902906cacf57259cf581b1466400b799
SHA2567a79b049bdc3b6e4d101691888360f4f993098f3e3a8beefff4ac367430b1575
SHA512f12f64670f158c2e846e78b7b5d191158268b45ecf3c288f02bbee15ae10c4a62e67fb3481da304ba99da2c68ac44d713a44a458ef359db329b6fef3d323382a
-
Filesize
97KB
MD5da1d0cd400e0b6ad6415fd4d90f69666
SHA1de9083d2902906cacf57259cf581b1466400b799
SHA2567a79b049bdc3b6e4d101691888360f4f993098f3e3a8beefff4ac367430b1575
SHA512f12f64670f158c2e846e78b7b5d191158268b45ecf3c288f02bbee15ae10c4a62e67fb3481da304ba99da2c68ac44d713a44a458ef359db329b6fef3d323382a
-
Filesize
1.3MB
MD5a70accbc1f1001cbf1c4a139e4e5d7af
SHA1138de36067af0c8f98e1f7bc4c6bea1d73bc53ab
SHA256b000fef41ce0267255701aacc76c02159d207212c4595437077e7904b7968ca6
SHA51246fde27847dfab38d2f6fefca31677a0d5a5ac775951fc19f1fc0b4ec56969622f0c4f036ecacc05b33854871f03232a4944f3e93a747280cac622503f5c4f04
-
Filesize
1.3MB
MD5a70accbc1f1001cbf1c4a139e4e5d7af
SHA1138de36067af0c8f98e1f7bc4c6bea1d73bc53ab
SHA256b000fef41ce0267255701aacc76c02159d207212c4595437077e7904b7968ca6
SHA51246fde27847dfab38d2f6fefca31677a0d5a5ac775951fc19f1fc0b4ec56969622f0c4f036ecacc05b33854871f03232a4944f3e93a747280cac622503f5c4f04
-
Filesize
1.3MB
MD5a70accbc1f1001cbf1c4a139e4e5d7af
SHA1138de36067af0c8f98e1f7bc4c6bea1d73bc53ab
SHA256b000fef41ce0267255701aacc76c02159d207212c4595437077e7904b7968ca6
SHA51246fde27847dfab38d2f6fefca31677a0d5a5ac775951fc19f1fc0b4ec56969622f0c4f036ecacc05b33854871f03232a4944f3e93a747280cac622503f5c4f04
-
Filesize
326KB
MD580d93d38badecdd2b134fe4699721223
SHA1e829e58091bae93bc64e0c6f9f0bac999cfda23d
SHA256c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59
SHA5129f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4
-
Filesize
326KB
MD580d93d38badecdd2b134fe4699721223
SHA1e829e58091bae93bc64e0c6f9f0bac999cfda23d
SHA256c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59
SHA5129f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4