Resubmissions

06/03/2023, 20:12

230306-yy42kaeb9v 7

06/03/2023, 20:11

230306-yyernseb81 7

06/03/2023, 20:10

230306-yxwzkaeg35 7

Analysis

  • max time kernel
    72s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2023, 20:10

General

  • Target

    SKlauncher 3.0.exe

  • Size

    1.2MB

  • MD5

    32c7e3347f8e532e675d154eb07f4ccf

  • SHA1

    5ca004745e2cdab497a7d6ef29c7efb25dc4046d

  • SHA256

    107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b

  • SHA512

    c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2

  • SSDEEP

    24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe
    "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:876
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:592

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b38dc7d60ff226065063edad6eae6567

    SHA1

    e75b67bbc45f7d9d31effddc8edc411f8e387bbc

    SHA256

    dfa4b70d21f587d175269c6d040a1db017a6b2d8e245c611a9dcd6418c1e96ca

    SHA512

    b89228c80490aa1fd943f48924a9391e29437d11e466c3e7bae9c9937d627fd5a86472bc8dbf7f723754e39247c960f18b177006c7938171c0a8511cbc0f1d47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    db058cdbbbbf0b6d739831ed12c3693b

    SHA1

    7b33c6141b88ef5956e43ddac4824df31b4357cb

    SHA256

    3835da0bc0e4bcd943a7b349d76ed55c9866cf9bdc8a64cfffcc80c808ac3e40

    SHA512

    2fc7a30b901d435b113436250ec3cddd1f5901c92470228dfe4426d67b467042aff5a27767d4a00d419b33d4726bf124f7e27b6d9364ceced983b626956e9410

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8e808ebacef3a51d075138b3508d09d0

    SHA1

    68254144df2cc00d08aaf86bca6711580e1068bc

    SHA256

    a403f1f7655924bd86b5759b33055a00ef8026919590679bab7aa37d56a5b012

    SHA512

    3e0639d385fcbecb88dcd850a4d5fb558d5365d70d20bdfeed6ffb6f0c1a80832ded2365ecedf12454111b44672331401e2a09d00a8f8ba7ff76d88f4d5d44ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    02f14ae3ffb7c56e640f58a160719e77

    SHA1

    54a02c7958471d4d3fd1f4548486e802c746cb60

    SHA256

    18f4e52c15e77bb4a714b181687ce5f0123a3f2bac35d7b3f12b1cbea29ba81c

    SHA512

    d2b48f9eefe5d274a3f37bbbc8934d5d8b8374b40c2c217568313c99b39837f9d541faedc5100371965167e1ed86a8cab08635142c3c3a175b98874a057bd859

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    272869c2eb61b416e577cdbab91a6514

    SHA1

    70cd57838361160553f2667ce29b90b86d031a73

    SHA256

    72eb547c368e58821e1b1cc5b7befff15ea59821b01b6b93ef5635e01ac7a08d

    SHA512

    e5d9013540f310341730cbce65936d31c202fa5925355e3b3d0b3a05933443250183f0212368fdf82718a75ed35f23b52bf44492c351672d55dbb0a98793d7dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a5434a62f6de63d07aabfde1e567f8d1

    SHA1

    1db34294c9371d4ea85108d95b2d9ab3820a03a7

    SHA256

    c6fbbe33b60a71a670f88461ca594d7dfd65d61cb3cd4d1a6f6a7455eff8f1c0

    SHA512

    edf149d3fcbdbe89ba7c6698be5632361bc0485d5ed4b98b2e78ace29fb3cb431323ea6576ed65b2eec73f472de834b48cc32420afe4132a274a74ef03e6ab01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    dd50e45bb23087a5424214b3f742358b

    SHA1

    42f408b27b878fda6c46bffe8f1d8f44b04c1e7d

    SHA256

    a19f4f5905f3102bf67aecc64271e58fe783fce220f998257a6f25977716d7d4

    SHA512

    50858a66f0387e79a4d3caff670cb2dfad09d442b7f3246d1fb1bfe1702eaa31e6cb68e4e38068db013dd8b11c38f4b2c717ac4910cfd853b093749c484b027d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e3389f62d7f3c9f5b80b7b23a7b5c7f8

    SHA1

    e01fb702d9bd8b9cfb4fd8174099a4faaa10562d

    SHA256

    f36beae8546e67af230ff006894da8d483139ec2c66ee606d0daea5a9e70d223

    SHA512

    52be508b478d90ab23103ae37c4308144bda1c4b747c20f2b6ddbc16d3fa508f9869019ffe2751e31ad9af028138ede106974708b834021e3469b2992ae4a555

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    250f8e577d484d6c86752a0a856e9bea

    SHA1

    687f18293a291759b6a5f59c18d4f871780b64e8

    SHA256

    8a42e67c1480d6beb89a8b03908dab2348848d7ee1be319e238627950dbd5867

    SHA512

    f36dd88af7d3c6139380a064e88664611e927e605e53736682854c3b0d6fd07db401928fb9985ab72cd9d7356e33682d623f4baac4b122ac74eefc0f0f3b8702

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    10b8c02f1211edbccccbec604568b04a

    SHA1

    58ef83d0ddfb2a76f6a6ba9d1a27f6f45fa51300

    SHA256

    3aed98040ab7f74f982e68f4e265c053de1573458cc76fe66aeb633e512bb9cd

    SHA512

    cb233c05d25f3be527660ade78e342b3c4a08b60c7e7a8588b29d42b9a447147e190b03b23978633862d9c56d14bd35529f7f5d8dabc9aae9aa2aa6a39c030c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    51c31bbc6f74d829d92d35144bd3450d

    SHA1

    084d7620606966daf419c73c9acb66e8d178b6eb

    SHA256

    759be252f46355cb16b6b710036f1cd3a2d4ab50ca8edf9572be4d6eab0e53dc

    SHA512

    114878f97518d9442d523476a29da1df764d1c0b43566a4fee65b3158e3d9ea139af0eb6a1a0f103e6e511728af95bb8d1a9aa301b4a76df1ea449c4c2ec81e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8d645cf7af33321f176be99614986116

    SHA1

    39e5261b992519477a640d196573ce91d588b013

    SHA256

    fe7e9b38b5197684b82c6aaae58d8985e2a86c6f41bfcabb9964feb2bc03f527

    SHA512

    4d14bec586bab64bfb0bc8332a8caf3ccfa5ddda3b2319906b63ce70d45c7fa5aadaa6da9bbfc8e19300fc631ce0e978f03cd8e78a8cedd991dbe6d3efdf993c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\07asiie\imagestore.dat

    Filesize

    7KB

    MD5

    172f6e044ce01b39f404c58e3647dae5

    SHA1

    6f03f39821066b7548a87063d7e7f6bb112f57ac

    SHA256

    607b4fd659bafc1f135c70e2d0cba4d72b4a1c303fb9f03b0cd522d628d74824

    SHA512

    8e67d88fb7c08e5e7c7a1b9cc946f7f356f1d63eade55ee7258558876ddd8056f922f296a61f865eabf6761b2ac3282f195466ad35dd929c1595636a0dabd396

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4D33E1QE\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S7FIT0B8\favicon-32x32[1].png

    Filesize

    2KB

    MD5

    dfb98b35bec083cddf7e575ccbc12efc

    SHA1

    f77c5e6f37aec582c5977a76691f992e3ebc3a05

    SHA256

    f053cec8f37df661ce13646ff5ecad7050bd50c4afb4f7ad12cd252577207e66

    SHA512

    17d2d675bc677f126fabab826b4fc79a05eece52cf586a97b7d8093dc402d0160f273fbf9d38978f01befc9f85a979208c2355cc0a4c129a2232ffa4554961ef

  • C:\Users\Admin\AppData\Local\Temp\Cab34F8.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar35BA.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FDGXNK04.txt

    Filesize

    598B

    MD5

    9efa1a28bba61c58353804a468e381ca

    SHA1

    18456a894907dca6bbbe37c6c5ac20bae0749b6c

    SHA256

    d460a3b7b2444762695d3d8d01164ff2d6f7358fe8dbf392b3752d4d1e80d5c9

    SHA512

    6b3a5e3a92b6823b2bc45c5c2a99b88b4f5f640c7ac6bf2cd86ca71297ad2bbe8a6f905ff33d2ace80f9f8bb5574bf409ad210b2d1afd2eba26f5b7f27577248

  • memory/592-56-0x0000000002730000-0x0000000002732000-memory.dmp

    Filesize

    8KB

  • memory/876-55-0x0000000002960000-0x0000000002970000-memory.dmp

    Filesize

    64KB

  • memory/1400-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB