File name:

TLauncher.exe

Full analysis: https://app.any.run/tasks/f21df112-c4bd-460b-ab98-2d619dd9b395
Verdict: Malicious activity
Analysis date: October 30, 2024, 18:00:34
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
java
arch-doc
arch-scr
arch-html
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 6 sections
MD5:

E5C408F4FFF6D8EF969560F7095DF944

SHA1:

A40F8DEA5F36892CB07EC57E1B2C1F6779530810

SHA256:

B7FD8E3F56CE5D3A87330DC53CD831D73D41D69E8A9380D885C79A0F72652C20

SSDEEP:

98304:UeZ/1TNf/F2eviCLVvwPR7vK+aTV1pFb9x9TYP+cE205gxOxufa6Akms2IeD7yyn:byH/+TlKAXkLDEwnOzlnN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks for Java to be installed

      • TLauncher.exe (PID: 6316)
    • Process drops legitimate windows executable

      • javaw.exe (PID: 3128)
    • Process requests binary or script from the Internet

      • javaw.exe (PID: 3128)
    • Executable content was dropped or overwritten

      • javaw.exe (PID: 3128)
    • The process drops C-runtime libraries

      • javaw.exe (PID: 3128)
  • INFO

    • Creates files in the program directory

      • javaw.exe (PID: 3128)
    • Checks supported languages

      • TLauncher.exe (PID: 6316)
      • javaw.exe (PID: 3128)
    • Create files in a temporary directory

      • javaw.exe (PID: 3128)
    • Application based on Java

      • javaw.exe (PID: 3128)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (41)
.exe | Win64 Executable (generic) (36.3)
.dll | Win32 Dynamic Link Library (generic) (8.6)
.exe | Win32 Executable (generic) (5.9)
.exe | Win16/32 Executable Delphi generic (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:09:16 16:17:06+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, No debug
PEType: PE32
LinkerVersion: 2.22
CodeSize: 25088
InitializedDataSize: 16896
UninitializedDataSize: 36864
EntryPoint: 0x1290
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.893.0.0
ProductVersionNumber: 2.893.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Windows NT
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: TLauncher Inc.
FileDescription: TLauncher
FileVersion: 2.893
InternalName: TLauncher
LegalCopyright: TLauncher Inc.
LegalTrademarks: -
OriginalFileName: TLauncher.exe
ProductName: TLauncher
ProductVersion: 2.893.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start tlauncher.exe no specs javaw.exe icacls.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3128"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -jar "C:\Users\admin\AppData\Local\Temp\TLauncher.exe"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe
TLauncher.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6316"C:\Users\admin\AppData\Local\Temp\TLauncher.exe" C:\Users\admin\AppData\Local\Temp\TLauncher.exeexplorer.exe
User:
admin
Company:
TLauncher Inc.
Integrity Level:
MEDIUM
Description:
TLauncher
Exit code:
0
Version:
2.893
Modules
Images
c:\users\admin\appdata\local\temp\tlauncher.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6704\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6728C:\WINDOWS\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\System32\icacls.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
594
Read events
594
Write events
0
Delete events
0

Modification events

No data
Executable files
169
Suspicious files
35
Text files
104
Unknown types
0

Dropped files

PID
Process
Filename
Type
3128javaw.exeC:\Users\admin\AppData\Roaming\.minecraft\tlauncher_libraries\org\apache\httpcomponents\fluent-hc\4.5.13\fluent-hc-4.5.13.jar.tlauncherdownloadjava
MD5:8F7E4F1A95A870EBEE87DDACC425362C
SHA256:F883B6B027D5E05C53E48E4FE3548715C52DBD590FFA3F52D039574F1A4D0728
3128javaw.exeC:\Users\admin\AppData\Roaming\.tlauncher\jvms\jre-8u281-windows-x64.tar.gz.tlauncherdownload
MD5:
SHA256:
3128javaw.exeC:\Users\admin\AppData\Roaming\.tlauncher\jvms\jre-8u281-windows-x64.tar.gz
MD5:
SHA256:
3128javaw.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1693682860-607145093-2874071422-1001\83aa4cc77f591dfc2374580bbd95f6ba_bb926e54-e3ca-40fd-ae90-2764341e7792binary
MD5:C8366AE350E7019AEFC9D1E6E6A498C6
SHA256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
3128javaw.exeC:\Users\admin\AppData\Roaming\.tlauncher\tlauncher-2.0.propertiestext
MD5:FA63E0587A9B4F67259BED168922CA93
SHA256:7FE62A093C4C0250CAECD17183E2B7BD6BC519492305F2D01136F5269097EEB4
3128javaw.exeC:\Users\admin\AppData\Roaming\.minecraft\tlauncher_libraries\com\google\guava\guava\19.0\guava-19.0.jarjava
MD5:43BFC49BDC7324F6DAAA60C1EE9F3972
SHA256:58D4CC2E05EBB012BBAC568B032F75623BE1CB6FB096F3C60C72A86F7F057DE4
3128javaw.exeC:\Users\admin\AppData\Roaming\.minecraft\tlauncher_libraries\net\sf\jopt-simple\jopt-simple\4.9\jopt-simple-4.9.jar.tlauncherdownloadjava
MD5:39C6476E4DE3D4F90AD4CA0DDCA48EC2
SHA256:26C5856E954B5F864DB76F13B86919B59C6EECF9FD930B96BAA8884626BAF2F5
3128javaw.exeC:\Users\admin\AppData\Roaming\.minecraft\tlauncher_libraries\org\apache\commons\commons-lang3\3.4\commons-lang3-3.4.jar.tlauncherdownloadcompressed
MD5:8667A442EE77E509FBE8176B94726EB2
SHA256:734C8356420CC8E30C795D64FD1FCD5D44EA9D90342A2CC3262C5158FBC6D98B
3128javaw.exeC:\Users\admin\AppData\Roaming\.minecraft\tlauncher_libraries\net\sf\jopt-simple\jopt-simple\4.9\jopt-simple-4.9.jarjava
MD5:39C6476E4DE3D4F90AD4CA0DDCA48EC2
SHA256:26C5856E954B5F864DB76F13B86919B59C6EECF9FD930B96BAA8884626BAF2F5
3128javaw.exeC:\Users\admin\AppData\Roaming\.minecraft\tlauncher_libraries\log4j\log4j\1.2.17\log4j-1.2.17.jarjava
MD5:04A41F0A068986F0F73485CF507C0F40
SHA256:1D31696445697720527091754369082A6651BD49781B6005DEB94E56753406F9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
42
DNS requests
22
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3128
javaw.exe
GET
404
78.46.66.120:80
http://res.tlauncher.org/b/client/jre/windows/jre-8u281-windows-x64.tar.gz
unknown
whitelisted
2364
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3128
javaw.exe
GET
302
78.46.66.120:80
http://res.tlauncher.org/b/libraries/com/google/guava/guava/19.0/guava-19.0.jar
unknown
whitelisted
3128
javaw.exe
GET
404
78.46.66.120:80
http://res.tlauncher.org/unb/client/jre/windows/jre-8u281-windows-x64.tar.gz
unknown
whitelisted
3128
javaw.exe
GET
302
78.46.66.120:80
http://res.tlauncher.org/b/libraries/net/sf/jopt-simple/jopt-simple/4.9/jopt-simple-4.9.jar
unknown
whitelisted
3128
javaw.exe
GET
302
78.46.66.120:80
http://res.tlauncher.org/b/libraries/org/apache/commons/commons-lang3/3.4/commons-lang3-3.4.jar
unknown
whitelisted
3128
javaw.exe
GET
302
78.46.66.120:80
http://res.tlauncher.org/b/libraries/log4j/log4j/1.2.17/log4j-1.2.17.jar
unknown
whitelisted
3128
javaw.exe
GET
302
78.46.66.120:80
http://res.tlauncher.org/b/libraries/org/tukaani/xz/1.5/xz-1.5.jar
unknown
whitelisted
3128
javaw.exe
GET
302
78.46.66.120:80
http://res.tlauncher.org/b/libraries/org/tlauncher/tlauncher-resource/1.4/tlauncher-resource-1.4.jar
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
4292
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5488
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
23.32.185.131:80
www.microsoft.com
AKAMAI-AS
BR
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4360
SearchApp.exe
2.23.209.189:443
www.bing.com
Akamai International B.V.
GB
whitelisted
2364
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 23.32.185.131
  • 104.119.109.218
whitelisted
google.com
  • 142.250.185.174
whitelisted
www.bing.com
  • 2.23.209.189
  • 2.23.209.179
  • 2.23.209.185
  • 2.23.209.187
  • 2.23.209.181
  • 2.23.209.130
  • 2.23.209.182
  • 2.23.209.183
  • 2.23.209.177
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.160.14
  • 20.190.160.20
  • 40.126.32.140
  • 40.126.32.133
  • 20.190.160.22
  • 40.126.32.68
  • 40.126.32.134
  • 40.126.32.72
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
res.tlauncher.org
  • 78.46.66.120
whitelisted
cl2-res.tlauncher.org
  • 104.20.36.13
  • 104.20.37.13
unknown

Threats

PID
Process
Class
Message
3128
javaw.exe
Potentially Bad Traffic
ET POLICY Vulnerable Java Version 1.8.x Detected
3128
javaw.exe
Potentially Bad Traffic
ET POLICY Vulnerable Java Version 1.8.x Detected
3128
javaw.exe
Misc activity
ET INFO JAVA - Java Archive Download By Vulnerable Client
3128
javaw.exe
Misc activity
ET INFO JAVA - Java Archive Download By Vulnerable Client
No debug info