Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 15:25
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher-2.885-Installer-1.1.3.exe
Resource
win7-20231215-en
General
-
Target
TLauncher-2.885-Installer-1.1.3.exe
-
Size
22.6MB
-
MD5
bd3eefe3f5a4bb0c948251a5d05727e7
-
SHA1
b18722304d297aa384a024444aadd4e5f54a115e
-
SHA256
f1b132f7ecf06d2aa1dd007fc7736166af3ee7c177c91587ae43930c65e531e0
-
SHA512
d7df966eeda90bf074249ba983aac4ba32a7f09fe4bb6d95811951df08f24e55e01c790ffebc3bc50ce7b1c501ff562f0de5e01ca340c8596881f69f8fed932d
-
SSDEEP
393216:KXGWOLBh2NPfs/dQETVlOBbpFEjdGphRqV56HpkoaH3D8P2Q6YS6x9DOc:K2/BhSHExi73qqHpu34kYbzOc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation TLauncher-2.885-Installer-1.1.3.exe -
Executes dropped EXE 1 IoCs
pid Process 3384 irsetup.exe -
Loads dropped DLL 3 IoCs
pid Process 3384 irsetup.exe 3384 irsetup.exe 3384 irsetup.exe -
resource yara_rule behavioral2/files/0x000800000002320b-5.dat upx behavioral2/memory/3384-14-0x00000000005C0000-0x00000000009A8000-memory.dmp upx behavioral2/files/0x000800000002320b-11.dat upx behavioral2/files/0x000800000002320b-10.dat upx behavioral2/memory/3384-328-0x00000000005C0000-0x00000000009A8000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3384 irsetup.exe 3384 irsetup.exe 3384 irsetup.exe 3384 irsetup.exe 3384 irsetup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4292 wrote to memory of 3384 4292 TLauncher-2.885-Installer-1.1.3.exe 92 PID 4292 wrote to memory of 3384 4292 TLauncher-2.885-Installer-1.1.3.exe 92 PID 4292 wrote to memory of 3384 4292 TLauncher-2.885-Installer-1.1.3.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\TLauncher-2.885-Installer-1.1.3.exe"C:\Users\Admin\AppData\Local\Temp\TLauncher-2.885-Installer-1.1.3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1910546 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\TLauncher-2.885-Installer-1.1.3.exe" "__IRCT:3" "__IRTSS:23661420" "__IRSID:S-1-5-21-3791175113-1062217823-1177695025-1000"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5197cf2f234799e691b2f066287900897
SHA19033bcd5b34008ecd017da273062d1782ece2ccd
SHA2560f5bad7903ef1e30738838d50af716d0821733e02fe689e13fb9fbabba57a28f
SHA512a75ee83a88ef7f28751dfc0859fc82d057dfb7158f2a56bb4cd84da5b83edba68d940983158d8cb269d68fb7ec79b944995b83188af5c09cf9ca4c2e2a0392f9
-
Filesize
382KB
MD58d2b13800a7efea206eb52efaf4373d1
SHA1733459c1386d6423d91e33a43e0ea83c95df2b68
SHA25661d15c4ce6d449e21faad57984080a382065cab4d748dee75b1f816a83792202
SHA512dfd904ca690ec95e6d6e8de2ae2ae6e2309bc9bd3a79ea1d63a1c6244ba12c31b571749d331a521c7aba8b283698c732fdde5bb06df65a19070d5621206befaa
-
Filesize
1024KB
MD522518ce93dd2fb91a08e2f735bba9d89
SHA1861738d2266ae6c5f669f94245eeca864bb468a4
SHA256baa86f30baeebf1b141ea68c71b3a85f71935e4dc7d597a514929958c1bf8ce4
SHA5128facdcd3cc486d86c0ee36b6db37f94d9383553e24d2e12f0eb449569c803660e609fccb85793520b4095194c66c4537e128d7226edf63ad4312c52c354acbd6
-
Filesize
326KB
MD580d93d38badecdd2b134fe4699721223
SHA1e829e58091bae93bc64e0c6f9f0bac999cfda23d
SHA256c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59
SHA5129f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4
-
Filesize
92KB
MD51354872867caf8a06bb2849fb80d2caf
SHA1facbd8a332092e4a879590ca2ee0f91b62df9b9e
SHA2567afc835809fbe62361c97dcb215c34196a0e5653a139ff78c94803d00c0e781a
SHA512e65ada4dac5145dd79aefb39a8e91de4bdc145a037a014239f6999ac72fc6e6da8a2867a741aa9978d9ee0cd9380dafdb85899f86e3a4f68f0b495ea62923f94