Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 20:41
Behavioral task
behavioral1
Sample
TLLauncherCracked-2024.exe
Resource
win7-20240221-en
General
-
Target
TLLauncherCracked-2024.exe
-
Size
4.5MB
-
MD5
19f2f9f101f6a1018e1a37f0aec62d51
-
SHA1
94b2446dd6c11495b9022401bae8117ff3458a37
-
SHA256
e919ae7d21d27145b580beb65bb568efb6092d1863b3423bcb683367d6cc72d4
-
SHA512
06118ccf3844a986986c05b78b4bacce15e78f68134f3d9ad292323dfbd924aaf7981d6e61443adb1e008209fc3b00492d78ee1acb96f2355b9c70525f3e3ce5
-
SSDEEP
98304:et2qYSI7x8nquqk9OU602w8Eog5fafmOolbmsk:esPNvkvP2TSXosk
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TLLauncherCracked-2024.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TLLauncherCracked-2024.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TLLauncherCracked-2024.exe -
resource yara_rule behavioral1/memory/2096-0-0x000000013F310000-0x000000013FEBA000-memory.dmp themida behavioral1/memory/2096-2-0x000000013F310000-0x000000013FEBA000-memory.dmp themida behavioral1/memory/2096-3-0x000000013F310000-0x000000013FEBA000-memory.dmp themida behavioral1/memory/2096-4-0x000000013F310000-0x000000013FEBA000-memory.dmp themida behavioral1/memory/2096-5-0x000000013F310000-0x000000013FEBA000-memory.dmp themida behavioral1/memory/2096-6-0x000000013F310000-0x000000013FEBA000-memory.dmp themida behavioral1/memory/2096-7-0x000000013F310000-0x000000013FEBA000-memory.dmp themida behavioral1/memory/2096-8-0x000000013F310000-0x000000013FEBA000-memory.dmp themida behavioral1/memory/2096-9-0x000000013F310000-0x000000013FEBA000-memory.dmp themida behavioral1/memory/2096-11-0x000000013F310000-0x000000013FEBA000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TLLauncherCracked-2024.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2096 TLLauncherCracked-2024.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ba787e1977da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc500000000020000000000106600000001000020000000fdeed67ecf202ee06457864d1b093fc3ec7a5e134cea66d6038e0d94fdeeb570000000000e8000000002000020000000126f556cb9f80b94966af1540ef64958727589e959e962172456e597c896a13f20000000a873d22aff1058b217c85b334116269f3c061b9805482bc2e6ad6828466c82e940000000a8927e66a53b8a8f204a4f29a6844469eb932f230af514b83e40803ba9ae1d3a8ae7bae969afce2ae862a2e4bf798e447915c4781b8848ff988fcc991ff87607 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9834081-E30C-11EE-ACBC-CAFA5A0A62FD} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 2980 vlc.exe 2304 vlc.exe 1564 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2980 vlc.exe 2304 vlc.exe 1564 vlc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2096 TLLauncherCracked-2024.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2980 vlc.exe 2980 vlc.exe 2980 vlc.exe 2980 vlc.exe 2980 vlc.exe 2980 vlc.exe 2980 vlc.exe 2980 vlc.exe 2304 vlc.exe 2304 vlc.exe 2304 vlc.exe 2304 vlc.exe 2304 vlc.exe 2304 vlc.exe 2304 vlc.exe 2304 vlc.exe 2980 vlc.exe 2980 vlc.exe 2980 vlc.exe 1564 vlc.exe 1564 vlc.exe 1564 vlc.exe 2304 vlc.exe 2304 vlc.exe 560 IEXPLORE.EXE -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 2980 vlc.exe 2980 vlc.exe 2980 vlc.exe 2980 vlc.exe 2980 vlc.exe 2980 vlc.exe 2980 vlc.exe 2304 vlc.exe 2304 vlc.exe 2304 vlc.exe 2304 vlc.exe 2304 vlc.exe 2304 vlc.exe 2304 vlc.exe 1564 vlc.exe 1564 vlc.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2096 TLLauncherCracked-2024.exe 2980 vlc.exe 2304 vlc.exe 1564 vlc.exe 560 IEXPLORE.EXE 560 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2428 2416 wmplayer.exe 29 PID 2416 wrote to memory of 2428 2416 wmplayer.exe 29 PID 2416 wrote to memory of 2428 2416 wmplayer.exe 29 PID 2416 wrote to memory of 2428 2416 wmplayer.exe 29 PID 2416 wrote to memory of 2428 2416 wmplayer.exe 29 PID 2416 wrote to memory of 2428 2416 wmplayer.exe 29 PID 2416 wrote to memory of 2428 2416 wmplayer.exe 29 PID 1964 wrote to memory of 560 1964 iexplore.exe 39 PID 1964 wrote to memory of 560 1964 iexplore.exe 39 PID 1964 wrote to memory of 560 1964 iexplore.exe 39 PID 1964 wrote to memory of 560 1964 iexplore.exe 39 PID 560 wrote to memory of 1392 560 IEXPLORE.EXE 40 PID 560 wrote to memory of 1392 560 IEXPLORE.EXE 40 PID 560 wrote to memory of 1392 560 IEXPLORE.EXE 40 PID 560 wrote to memory of 1392 560 IEXPLORE.EXE 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\TLLauncherCracked-2024.exe"C:\Users\Admin\AppData\Local\Temp\TLLauncherCracked-2024.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2096
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Enqueue -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Enqueue -Embedding2⤵PID:2428
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file --playlist-enqueue "C:\Users\Admin\Desktop\ResetTrace.asx"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2980
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file --no-playlist-enqueue "C:\Users\Admin\Desktop\ResetTrace.asx"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2304
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ResetTrace.asx"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1564
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1392
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b6e5096d95b0bf351f1e31de6782e30
SHA111769fc2c234e9add3fb523e333ebbd6d5e05d84
SHA256f392f3970552024cb2afa311fd3ec989b9ecfeb080e972b14b2fb9c1c5d3bb1b
SHA51274b7f84e76cc27d906732ca01979771b331a7a5b6afcf6392956052653d4cb7586c7e611a83b3453e20f6721a09563097406836524f4c314e8becc39e630d238
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
76B
MD5698d700d02e9ccb33881c2c55d35a3e6
SHA1333710b999756b01d6d9f5005abbaf73c972ae7b
SHA256207ca57d56b5a7d3f0b10d78aa967f42adc92a0571fbb01aa7aca8e63718f4db
SHA5122ce1b3e80b2bef36041c7e5c1932ecda585f5657a0540aa83261a8c37fb799186aefecc01a5fa938d781eef15246428c819ddbb3a30404f94bfba22f4023e49c
-
Filesize
93KB
MD5478a4a09f4f74e97335cd4d5e9da7ab5
SHA13c4f1dc52a293f079095d0b0370428ec8e8f9315
SHA256884b59950669842f3c45e6da3480cd9a553538b951fb155b435b48ff38683974
SHA512e96719663cd264132a8e1ea8c3f8a148c778a0c68caa2468ba47629393605b197dd9e00efad91f389de9fcc77b04981a0cf87f785f3c645cdc9e4ebd98060ca1