Analysis

  • max time kernel
    85s
  • max time network
    89s
  • platform
    windows7_x64
  • resource
    win7-20221111-es
  • resource tags

    arch:x64arch:x86image:win7-20221111-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    30-01-2023 18:53

General

  • Target

    SKlauncher 3.0 (1).exe

  • Size

    1.2MB

  • MD5

    32c7e3347f8e532e675d154eb07f4ccf

  • SHA1

    5ca004745e2cdab497a7d6ef29c7efb25dc4046d

  • SHA256

    107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b

  • SHA512

    c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2

  • SSDEEP

    24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0 (1).exe
    "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0 (1).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1780
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:756

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      4d42d0535a3a876ae02ce7404f232609

      SHA1

      19cf34c4513c34929e2a795d400265f23e23f1f2

      SHA256

      2915aa2c7827fb7212576c5a8323198e81ab4ce2ef0422b27604fc886c644e5d

      SHA512

      d7a6d8adc08fc8619ca479be1cbd86952515a0a85f7488f1eca3c6f63d2c3d1a07fb0e77436f515c15e3132a3c82e357dd97a45e58aaf46773c1e335dbea4b50

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\t9o3c8r\imagestore.dat

      Filesize

      2KB

      MD5

      fd9d293077ae8fff837fbd18ad89cea6

      SHA1

      46350f791bfd1acc52dcedc4896057a322fa6e2a

      SHA256

      608ea57ea10c53c5cf15e4cd25041dff643ac357fff6c9e0778733452d990cec

      SHA512

      f66344085b44e127170c6e596fca2cdb3494b333f93326c867efd553bc7b41c8ded63d701f4d6d4f6413591b4a04e82b2e8b9f9214837ff139d6a25b8c037223

    • memory/756-55-0x000007FEFBC51000-0x000007FEFBC53000-memory.dmp

      Filesize

      8KB

    • memory/1312-54-0x00000000761B1000-0x00000000761B3000-memory.dmp

      Filesize

      8KB