URL:

https://tlauncher.org/en/#osselector

Full analysis: https://app.any.run/tasks/40991732-c88e-4d26-bc9b-0c60ca1793b7
Verdict: Malicious activity
Analysis date: April 09, 2020, 20:55:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

55AB7C09DE577B37FAFF2143B4D0AB73

SHA1:

598012B166B3207FCC27D95D1F84CBC421A435D2

SHA256:

EB0A82B9D85DD97F2DEAF6C6ABFF1E43E5E2CCE862AB2EBB10971E84F3308BAC

SSDEEP:

3:N8BEeLu5A5KWWAU:2K5bRr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • TLauncher-2.69-Installer-0.5.2.exe (PID: 3200)
      • irsetup.exe (PID: 2536)
      • TLauncher.exe (PID: 2544)
    • Loads dropped or rewritten executable

      • irsetup.exe (PID: 2536)
    • Actions looks like stealing of personal data

      • javaw.exe (PID: 3252)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • cmd.exe (PID: 1392)
      • cmd.exe (PID: 2760)
      • cmd.exe (PID: 1720)
      • cmd.exe (PID: 880)
      • cmd.exe (PID: 3960)
      • cmd.exe (PID: 2784)
    • Creates files in the program directory

      • firefox.exe (PID: 3336)
    • Executes JAVA applets

      • TLauncher.exe (PID: 2544)
      • javaw.exe (PID: 2828)
    • Executable content was dropped or overwritten

      • irsetup.exe (PID: 2536)
      • firefox.exe (PID: 3336)
      • TLauncher-2.69-Installer-0.5.2.exe (PID: 3200)
    • Starts CMD.EXE for commands execution

      • javaw.exe (PID: 2828)
      • javaw.exe (PID: 3252)
    • Creates files in the user directory

      • irsetup.exe (PID: 2536)
      • javaw.exe (PID: 2828)
      • javaw.exe (PID: 3252)
    • Reads Internet Cache Settings

      • irsetup.exe (PID: 2536)
    • Reads internet explorer settings

      • irsetup.exe (PID: 2536)
    • Uses WMIC.EXE to obtain a system information

      • cmd.exe (PID: 1392)
      • cmd.exe (PID: 1720)
      • cmd.exe (PID: 2760)
      • cmd.exe (PID: 880)
    • Application launched itself

      • javaw.exe (PID: 2828)
    • Uses SYSTEMINFO.EXE to read environment

      • cmd.exe (PID: 3960)
  • INFO

    • Reads CPU info

      • firefox.exe (PID: 3336)
    • Reads Internet Cache Settings

      • firefox.exe (PID: 3336)
      • firefox.exe (PID: 3684)
    • Reads settings of System Certificates

      • firefox.exe (PID: 3336)
      • pingsender.exe (PID: 2576)
    • Application launched itself

      • firefox.exe (PID: 3336)
    • Creates files in the user directory

      • firefox.exe (PID: 3336)
    • Adds / modifies Windows certificates

      • pingsender.exe (PID: 2576)
    • Changes settings of System certificates

      • pingsender.exe (PID: 2576)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
77
Monitored processes
31
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe firefox.exe tlauncher-2.69-installer-0.5.2.exe irsetup.exe tlauncher.exe no specs javaw.exe no specs cmd.exe no specs chcp.com no specs wmic.exe no specs cmd.exe no specs chcp.com no specs wmic.exe no specs cmd.exe no specs chcp.com no specs wmic.exe no specs javaw.exe pingsender.exe cmd.exe no specs cmd.exe no specs chcp.com no specs chcp.com no specs wmic.exe no specs systeminfo.exe no specs cmd.exe no specs chcp.com no specs dxdiag.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
280"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3336.0.1606594545\1495208656" -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3336 "\\.\pipe\gecko-crash-server-pipe.3336" 1180 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
604wmic os get osarchitectureC:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
880cmd.exe /C chcp 437 & wmic CPU get NAMEC:\Windows\system32\cmd.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1392cmd.exe /C chcp 437 & wmic os get osarchitectureC:\Windows\system32\cmd.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1720cmd.exe /C chcp 437 & wmic os get osarchitectureC:\Windows\system32\cmd.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1888"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3336.13.1972590376\899170732" -childID 2 -isForBrowser -prefsHandle 2648 -prefMapHandle 2652 -prefsLen 5996 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3336 "\\.\pipe\gecko-crash-server-pipe.3336" 2664 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
2056wmic CPU get NAMEC:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2128chcp 437 C:\Windows\system32\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\chcp.com
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2536"C:\Users\admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1905626 "__IRAFN:C:\Users\admin\Downloads\TLauncher-2.69-Installer-0.5.2.exe" "__IRCT:1" "__IRTSS:14984508" "__IRSID:S-1-5-21-1302019708-1500728564-335382590-1000"C:\Users\admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
TLauncher-2.69-Installer-0.5.2.exe
User:
admin
Company:
Indigo Rose Corporation
Integrity Level:
MEDIUM
Description:
Setup Application
Exit code:
0
Version:
9.5.3.0
Modules
Images
c:\users\admin\appdata\local\temp\_ir_sf_temp_0\irsetup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
2544"C:\Users\admin\AppData\Roaming\.minecraft\TLauncher.exe" C:\Users\admin\AppData\Roaming\.minecraft\TLauncher.exeirsetup.exe
User:
admin
Company:
TLauncher Inc.
Integrity Level:
MEDIUM
Description:
TLauncher
Exit code:
0
Version:
2.69
Modules
Images
c:\users\admin\appdata\roaming\.minecraft\tlauncher.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
Total events
5 985
Read events
2 244
Write events
2 506
Delete events
1 235

Modification events

(PID) Process:(3568) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
EC430BF408000000
(PID) Process:(3336) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
F4430EF408000000
(PID) Process:(3336) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
1
(PID) Process:(3336) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3336) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3336) firefox.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3336) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3336) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3200) TLauncher-2.69-Installer-0.5.2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3200) TLauncher-2.69-Installer-0.5.2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
13
Suspicious files
106
Text files
108
Unknown types
92

Dropped files

PID
Process
Filename
Type
3336firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
3336firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
3336firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
3336firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4.tmp
MD5:
SHA256:
3336firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-child-current.binbinary
MD5:5027177F513CDAE07DB2330E1DED5934
SHA256:0C53F16051E738287A4612F68E296238087627E594CFD6DDFA1FECC2E998328B
3336firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\base-track-digest256.sbstorebinary
MD5:4A1220FC03E11726F09E9981834345DB
SHA256:6AE7FC0FDBE217104F4034BF6A580A461106B50309ABCCFF6E309124DCA5EF39
3336firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\cache2\entries\C3C812118691287414BF6DFA873044D93D11218Ader
MD5:7D2FA6CF6D316E8AA9FF015F45C60B18
SHA256:AB7E8E92E5E3A238E0303F11E5999CBF657F4E4CC512F9ED143DB094724326FC
3336firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:354459382F30B8994109C88659DFA1F3
SHA256:E3E8E2B7E7EECA231620D83C70FA5A926E8B9CE74C51F595F71191DC0B50527E
3336firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:DE9496ACA551ADE408EF6466A11833A1
SHA256:8F9C7FDB3E0BC01024E43A8E242468FC4DD4F74C725E32A883571635203DC10A
3336firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4jsonlz4
MD5:6D378E0D40B6EACA22C8BCE899A1C5C1
SHA256:ADA2467B2477ACEFF837AC7820C435AD1EBBE844B2DA31C7AB9AE8D010C7A639
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
86
TCP/UDP connections
62
DNS requests
119
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3336
firefox.exe
GET
200
23.53.41.113:80
http://detectportal.firefox.com/success.txt
NL
text
8 b
whitelisted
3336
firefox.exe
POST
200
172.217.16.131:80
http://ocsp.pki.goog/gts1o1
US
der
471 b
whitelisted
3336
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3336
firefox.exe
POST
200
172.217.16.131:80
http://ocsp.pki.goog/gts1o1
US
der
471 b
whitelisted
3336
firefox.exe
POST
200
5.45.205.245:80
http://yandex.ocsp-responder.com/
RU
der
1.52 Kb
whitelisted
3252
javaw.exe
GET
200
104.20.50.26:80
http://repo.tlauncher.org/update/lch/update_2.0.json?version=2.69&client=bdbe8c1a-086b-471a-91b4-77425fd8fa10
US
text
7.69 Kb
whitelisted
3336
firefox.exe
POST
200
172.217.16.131:80
http://ocsp.pki.goog/gts1o1
US
der
471 b
whitelisted
3336
firefox.exe
POST
200
172.217.16.131:80
http://ocsp.pki.goog/gts1o1
US
der
471 b
whitelisted
3336
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3252
javaw.exe
GET
200
104.20.50.26:80
http://repo.tlauncher.org/update/downloads/configs/inner_servers.json
US
text
3.62 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3336
firefox.exe
172.217.16.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted
3336
firefox.exe
172.217.22.42:443
ajax.googleapis.com
Google Inc.
US
whitelisted
3336
firefox.exe
143.204.97.83:443
firefox.settings.services.mozilla.com
US
suspicious
3336
firefox.exe
216.58.207.35:443
www.gstatic.com
Google Inc.
US
whitelisted
3336
firefox.exe
104.16.87.20:443
cdn.jsdelivr.net
Cloudflare Inc
US
shared
3336
firefox.exe
93.158.134.119:443
mc.yandex.ru
YANDEX LLC
RU
whitelisted
3336
firefox.exe
172.217.18.162:443
adservice.google.co.uk
Google Inc.
US
whitelisted
3336
firefox.exe
13.224.194.50:443
content-signature-2.cdn.mozilla.net
US
malicious
3336
firefox.exe
23.53.41.113:80
detectportal.firefox.com
Telia Company AB
NL
suspicious
3336
firefox.exe
52.11.143.45:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 23.53.41.113
  • 23.53.41.105
whitelisted
a1089.dscd.akamai.net
  • 23.53.41.105
  • 23.53.41.113
whitelisted
search.services.mozilla.com
  • 52.11.143.45
  • 52.38.153.3
  • 54.149.124.142
whitelisted
search.r53-2.services.mozilla.com
  • 54.149.124.142
  • 52.38.153.3
  • 52.11.143.45
whitelisted
tlauncher.org
  • 104.20.49.26
  • 104.20.50.26
malicious
push.services.mozilla.com
  • 54.69.234.72
whitelisted
autopush.prod.mozaws.net
  • 54.69.234.72
whitelisted
ocsp.comodoca.com
  • 151.139.128.14
whitelisted
snippets.cdn.mozilla.net
  • 143.204.97.74
  • 143.204.97.29
  • 143.204.97.20
  • 143.204.97.49
whitelisted
d228z91au11ukj.cloudfront.net
  • 143.204.97.49
  • 143.204.97.20
  • 143.204.97.29
  • 143.204.97.74
whitelisted

Threats

PID
Process
Class
Message
1052
svchost.exe
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
1052
svchost.exe
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
No debug info