Resubmissions
03/02/2023, 15:51
230203-taw9labe31 703/02/2023, 15:47
230203-s8p3habe21 703/02/2023, 15:44
230203-s6jgyafh93 803/02/2023, 15:40
230203-s4h4dsfh85 8Analysis
-
max time kernel
100s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-es -
resource tags
arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
03/02/2023, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.0.exe
Resource
win10v2004-20221111-es
General
-
Target
SKlauncher 3.0.exe
-
Size
1.2MB
-
MD5
32c7e3347f8e532e675d154eb07f4ccf
-
SHA1
5ca004745e2cdab497a7d6ef29c7efb25dc4046d
-
SHA256
107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b
-
SHA512
c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2
-
SSDEEP
24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 736 javaw.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\symbols\dll\ntdll.pdb javaw.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3772 chrome.exe 3772 chrome.exe 2328 chrome.exe 2328 chrome.exe 4940 chrome.exe 4940 chrome.exe 4628 chrome.exe 4628 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe 2328 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 736 javaw.exe 736 javaw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4980 wrote to memory of 736 4980 SKlauncher 3.0.exe 83 PID 4980 wrote to memory of 736 4980 SKlauncher 3.0.exe 83 PID 2328 wrote to memory of 4892 2328 chrome.exe 86 PID 2328 wrote to memory of 4892 2328 chrome.exe 86 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 4156 2328 chrome.exe 89 PID 2328 wrote to memory of 3772 2328 chrome.exe 90 PID 2328 wrote to memory of 3772 2328 chrome.exe 90 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91 PID 2328 wrote to memory of 4420 2328 chrome.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff905454f50,0x7ff905454f60,0x7ff905454f702⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1712 /prefetch:22⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2980 /prefetch:12⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3776 /prefetch:12⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4464 /prefetch:82⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4636 /prefetch:82⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1676,5077641755306021447,359880092540712782,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4052
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4296
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5697d496ac9f5aaab8ae025322358c61e
SHA12043eac8cdcc2e24b854af1eacd77a5f2a395a27
SHA256a7273a4cf48ab3413f2c186cc95a3367a73ce99f8d45329383219d4cc27003aa
SHA512b6702cd49a3af9f97f697565136f140692af9f8b271e672f2e91c920a23212b778583786f2377078117113647926338614a92c4a2423318b7a21ba2fe3a89838