Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 19:23
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher-2.899-Installer-1.1.5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
TLauncher-2.899-Installer-1.1.5.exe
Resource
win10v2004-20240226-en
General
-
Target
TLauncher-2.899-Installer-1.1.5.exe
-
Size
24.9MB
-
MD5
dc18b7f4917cb800b1fa51251bc5b6b3
-
SHA1
268524e70c51f2f1e0eeb82ef183943aa5285a7c
-
SHA256
0b1b9037233b62a601b31def961ed5a43773b7407d864c7ad40da9ab9ab91b71
-
SHA512
e02ace9761c7736175b5a2c2541a51246adc5090c87724962362ec540118b331be1aeffbecd15b469eb4ee0ec29d436cd76b005ef7f7f34cad9084bb2ff03420
-
SSDEEP
393216:QXeigDRT3h2dPfs/dQETVlOBbpFEjLsZqV56HpkBrr6of5MJ7ZWqxPAIgtMIMlFN:QOigJ3hGHExiTZqqHpCrrKJBH5lFRqs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation TLauncher-2.899-Installer-1.1.5.exe -
Executes dropped EXE 1 IoCs
pid Process 3592 irsetup.exe -
Loads dropped DLL 3 IoCs
pid Process 3592 irsetup.exe 3592 irsetup.exe 3592 irsetup.exe -
resource yara_rule behavioral2/files/0x0007000000023266-5.dat upx behavioral2/files/0x0007000000023266-10.dat upx behavioral2/memory/3592-11-0x0000000000020000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0007000000023266-12.dat upx behavioral2/memory/3592-284-0x0000000000020000-0x0000000000408000-memory.dmp upx behavioral2/memory/3592-294-0x0000000000020000-0x0000000000408000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "221" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 2440 Process not Found 4496 Process not Found 1624 Process not Found 2616 Process not Found 4636 Process not Found 2464 Process not Found 2552 Process not Found 4504 Process not Found 5056 Process not Found 3988 Process not Found 2608 Process not Found 3224 Process not Found 3632 Process not Found 4916 Process not Found 1728 Process not Found 1404 Process not Found 1472 Process not Found 3976 Process not Found 1652 Process not Found 2980 Process not Found 3964 Process not Found 3620 Process not Found 3060 Process not Found 4660 Process not Found 3924 Process not Found 3784 Process not Found 4448 Process not Found 4468 Process not Found 4052 Process not Found 4276 Process not Found 968 Process not Found 3920 Process not Found 3936 Process not Found 2784 Process not Found 4896 Process not Found 2844 Process not Found 3044 Process not Found 3368 Process not Found 3124 Process not Found 3940 Process not Found 4964 Process not Found 2596 Process not Found 3896 Process not Found 3516 Process not Found 984 Process not Found 2612 Process not Found 640 Process not Found 1560 Process not Found 2456 Process not Found 2696 Process not Found 380 Process not Found 4828 Process not Found 796 Process not Found 4592 Process not Found 2144 Process not Found 2496 Process not Found 4508 Process not Found 3436 Process not Found 4388 Process not Found 900 Process not Found 2652 Process not Found 3432 Process not Found 1384 Process not Found 4088 Process not Found -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3592 irsetup.exe 3592 irsetup.exe 3592 irsetup.exe 3592 irsetup.exe 3592 irsetup.exe 4564 LogonUI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3956 wrote to memory of 3592 3956 TLauncher-2.899-Installer-1.1.5.exe 101 PID 3956 wrote to memory of 3592 3956 TLauncher-2.899-Installer-1.1.5.exe 101 PID 3956 wrote to memory of 3592 3956 TLauncher-2.899-Installer-1.1.5.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\TLauncher-2.899-Installer-1.1.5.exe"C:\Users\Admin\AppData\Local\Temp\TLauncher-2.899-Installer-1.1.5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1910546 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\TLauncher-2.899-Installer-1.1.5.exe" "__IRCT:3" "__IRTSS:26073958" "__IRSID:S-1-5-21-3808065738-1666277613-1125846146-1000"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3700 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:2424
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\ea8f9cd851a14d9b8bafc342e938d01e /t 4440 /p 35921⤵PID:1700
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3919055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5e043a9cb014d641a56f50f9d9ac9a1b9
SHA161dc6aed3d0d1f3b8afe3d161410848c565247ed
SHA2569dd7020d04753294c8fb694ac49f406de9adad45d8cdd43fefd99fec3659e946
SHA5124ae5df94fd590703b7a92f19703d733559d600a3885c65f146db04e8bbf6ead9ab5a1748d99c892e6bde63dd4e1592d6f06e02e4baf5e854c8ce6ea0cce1984f
-
Filesize
1.8MB
MD5cb50d496ae05fa1c8bfbcb3b7f910bfe
SHA13ec4d77b73c4d7e9858b11224314e99d082497a8
SHA2567616c72f6659a3a2439d0452190459cd4ceb83fab2307e3e47c9604fa29d9f34
SHA51222051de06c7e52a37ad36250aa095a8ccc0b0e1cdbfa2e9073c146e77e278cbdbe89bdb078dcfd8babf48baec1902b303ac39cc9db4114ce1516b06552dc924d
-
Filesize
1.7MB
MD51bbf5dd0b6ca80e4c7c77495c3f33083
SHA1e0520037e60eb641ec04d1e814394c9da0a6a862
SHA256bc6bd19ab0977ac794e18e2c82ace3116bf0537711a352638efd2d8d847c140b
SHA51297bc810871868217f944bc5e60ab642f161c1f082bc9e4122094f10b4e309a6d96e3dd695553a20907cb8fea5aef4802f5a2f0a852328c1a1cd85944022abaab
-
Filesize
97KB
MD5da1d0cd400e0b6ad6415fd4d90f69666
SHA1de9083d2902906cacf57259cf581b1466400b799
SHA2567a79b049bdc3b6e4d101691888360f4f993098f3e3a8beefff4ac367430b1575
SHA512f12f64670f158c2e846e78b7b5d191158268b45ecf3c288f02bbee15ae10c4a62e67fb3481da304ba99da2c68ac44d713a44a458ef359db329b6fef3d323382a
-
Filesize
893KB
MD50ee55bad7f1b5aabb8273a890dba84e8
SHA168161ba616871691d560af6fd710da00b550b242
SHA256f01ef80c7e128f5a6c2c74c6c1d47633fd6300488d7aea6322e86aef02205630
SHA5124f19c97ffdd243e90ac06089ecfbe872bd08f1ff4237773763844374579abef7979226731eb378c13bfb7a22c34a2bf0315685b4d2a7897d58a37eabd4150590
-
Filesize
226KB
MD5c84878cc22681cb5039a457bf7027c8c
SHA19eb2b25d5ff65135c40df40a3599064607c20fd5
SHA256e04a97b9763e178b0ed6eb7af46809ce5071b3ba91d0a522cea0686c0c946173
SHA512386fa2ae6f87c730b3c0ad7ccfe2cd67d2b10a12cf8d1d8351df9caf04400ecbd30b1140d37f1d9b47941065e75c7d46646ed5a4bed5ad352f66d83a0a459c09
-
Filesize
1.3MB
MD5bba68732fb535f542f19acd46af00ddf
SHA1501b7058ce18858a22f6ce198dfc34fff832872d
SHA256da4577994a0653b6eccea81ecd078397f2088935d24dde5d8de30fbf178dd0e3
SHA51236b3d68b7163b7be4a12cc9b6fed2136300c8fdc4941e00b42faffe94f40436d104788808d4fcccfb7340e3b4a4bc4740bd66dab840260461a8ecc7785fe43b6
-
Filesize
326KB
MD580d93d38badecdd2b134fe4699721223
SHA1e829e58091bae93bc64e0c6f9f0bac999cfda23d
SHA256c572a6103af1526f97e708a229a532fd02100a52b949f721052107f1f55e0c59
SHA5129f28073cc186b55ef64661c2e4f6fe1c112785a262b9d8e9a431703fdb1000f1d8cc0b2a3c153c822cfd48782ae945742ccb07beae4d6388d5d0b4df03103bd4