Analysis

  • max time kernel
    138s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2023, 15:35

General

  • Target

    SKlauncher 3.0.exe

  • Size

    1.2MB

  • MD5

    32c7e3347f8e532e675d154eb07f4ccf

  • SHA1

    5ca004745e2cdab497a7d6ef29c7efb25dc4046d

  • SHA256

    107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b

  • SHA512

    c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2

  • SSDEEP

    24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe
    "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1204

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          235edfbf7d02ca6c7a2cd51e3f038e8d

          SHA1

          747e0f1d057b74d6715040c775fb0d0cc1b0ca05

          SHA256

          f36bf6d2ec8bbf57cfbdaec6e61024e60562993f65ba2b7e7a4564bc9d0e1c57

          SHA512

          dd41083b32a083a01dd3787c895f5b12d8085069a23b783f3c230ceeafebfc05201519b2ae72b93ddfd4b15e3b4a9d46ceff027d2026ee96b9bc46d6980e9289

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          7cba21296a35fab1137d109133ace6dd

          SHA1

          97855444768fe22f410c51be5f1422a426a4cdfe

          SHA256

          2debcf202212a42929e474179f941efa925505427450d03111fa730800c13ae9

          SHA512

          a7a98839af4f3558d53ddadb22bb62564da047d4064db2cbef786536549fb24eb643b70195a850afa1c39d7411efbcfd96471453e3d9c451ea8b77638688dfb9

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

          Filesize

          7KB

          MD5

          2bbf8cab14655fd15a22ce857809f319

          SHA1

          36fa48c94d4f395f8708cfe843e5940e787f87ea

          SHA256

          cd3f64a26324bf06fac6c9c04f1423b54ec28fc50a9b9ede0896470425d32838

          SHA512

          44df199e7e35c2c40310ceace8c04201643964dc4332fa79702fe737104ddb8849326392cb767bbeffbff619e8635c0e34e69b8ca53444e5a7b2d8e48b9a53d8

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OC1V6SA5.txt

          Filesize

          606B

          MD5

          0a1885929e27b2b7776a8caa26ece981

          SHA1

          6bc196c4e523604b6aa327f4ecf0de908d3df866

          SHA256

          2d1ec13811e6b1e3438e6fc222bbcf027dbe5da459886322fd09ece2d1aeb69a

          SHA512

          2b4d44246bcc74e026d49734cee4349a815042c6eb7e25114c6f8a0332c2e8a07fe67e6d7e717b8bcb4aab112a9eb978babf7de6992d2cf3ca2b433306cf7b86

        • memory/1720-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

          Filesize

          8KB