Resubmissions
06/03/2023, 20:12
230306-yy42kaeb9v 706/03/2023, 20:11
230306-yyernseb81 706/03/2023, 20:10
230306-yxwzkaeg35 7Analysis
-
max time kernel
72s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/03/2023, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SKlauncher 3.0.exe
Resource
win10v2004-20230220-en
General
-
Target
SKlauncher 3.0.exe
-
Size
1.2MB
-
MD5
32c7e3347f8e532e675d154eb07f4ccf
-
SHA1
5ca004745e2cdab497a7d6ef29c7efb25dc4046d
-
SHA256
107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b
-
SHA512
c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2
-
SSDEEP
24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dbb59ddc676e394a83d3f942d26f43ca000000000200000000001066000000010000200000009d67cbdbc322236393dcef8eea6640d805a6483326875e12ab6a627f7f3010df000000000e800000000200002000000025ea20a487c84ff737cc5a95bddce629e3717fb13b1459ca8d511868193ece89200000005c68b9d140ed24dfc43ef2f8632b8857e1e59b41d6afb0b8a8a5c4f1e1bd59ef40000000859d09d9159d3fcb3c0f641f60b4bd5c621de24d0308bcc065d6c8ac03d5b87fdea2437df958cfbf2c6a6e2c0ee7bcc44c30433c572c027afa579bb1db637dd4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 406a0d397050d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5FBFC931-BC63-11ED-A6B7-D6914D53598A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "384902026" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 876 iexplore.exe 876 iexplore.exe 592 IEXPLORE.EXE 592 IEXPLORE.EXE 592 IEXPLORE.EXE 592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1400 wrote to memory of 876 1400 SKlauncher 3.0.exe 27 PID 1400 wrote to memory of 876 1400 SKlauncher 3.0.exe 27 PID 1400 wrote to memory of 876 1400 SKlauncher 3.0.exe 27 PID 1400 wrote to memory of 876 1400 SKlauncher 3.0.exe 27 PID 876 wrote to memory of 592 876 iexplore.exe 29 PID 876 wrote to memory of 592 876 iexplore.exe 29 PID 876 wrote to memory of 592 876 iexplore.exe 29 PID 876 wrote to memory of 592 876 iexplore.exe 29 PID 876 wrote to memory of 592 876 iexplore.exe 29 PID 876 wrote to memory of 592 876 iexplore.exe 29 PID 876 wrote to memory of 592 876 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:592
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b38dc7d60ff226065063edad6eae6567
SHA1e75b67bbc45f7d9d31effddc8edc411f8e387bbc
SHA256dfa4b70d21f587d175269c6d040a1db017a6b2d8e245c611a9dcd6418c1e96ca
SHA512b89228c80490aa1fd943f48924a9391e29437d11e466c3e7bae9c9937d627fd5a86472bc8dbf7f723754e39247c960f18b177006c7938171c0a8511cbc0f1d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db058cdbbbbf0b6d739831ed12c3693b
SHA17b33c6141b88ef5956e43ddac4824df31b4357cb
SHA2563835da0bc0e4bcd943a7b349d76ed55c9866cf9bdc8a64cfffcc80c808ac3e40
SHA5122fc7a30b901d435b113436250ec3cddd1f5901c92470228dfe4426d67b467042aff5a27767d4a00d419b33d4726bf124f7e27b6d9364ceced983b626956e9410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58e808ebacef3a51d075138b3508d09d0
SHA168254144df2cc00d08aaf86bca6711580e1068bc
SHA256a403f1f7655924bd86b5759b33055a00ef8026919590679bab7aa37d56a5b012
SHA5123e0639d385fcbecb88dcd850a4d5fb558d5365d70d20bdfeed6ffb6f0c1a80832ded2365ecedf12454111b44672331401e2a09d00a8f8ba7ff76d88f4d5d44ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD502f14ae3ffb7c56e640f58a160719e77
SHA154a02c7958471d4d3fd1f4548486e802c746cb60
SHA25618f4e52c15e77bb4a714b181687ce5f0123a3f2bac35d7b3f12b1cbea29ba81c
SHA512d2b48f9eefe5d274a3f37bbbc8934d5d8b8374b40c2c217568313c99b39837f9d541faedc5100371965167e1ed86a8cab08635142c3c3a175b98874a057bd859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5272869c2eb61b416e577cdbab91a6514
SHA170cd57838361160553f2667ce29b90b86d031a73
SHA25672eb547c368e58821e1b1cc5b7befff15ea59821b01b6b93ef5635e01ac7a08d
SHA512e5d9013540f310341730cbce65936d31c202fa5925355e3b3d0b3a05933443250183f0212368fdf82718a75ed35f23b52bf44492c351672d55dbb0a98793d7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5434a62f6de63d07aabfde1e567f8d1
SHA11db34294c9371d4ea85108d95b2d9ab3820a03a7
SHA256c6fbbe33b60a71a670f88461ca594d7dfd65d61cb3cd4d1a6f6a7455eff8f1c0
SHA512edf149d3fcbdbe89ba7c6698be5632361bc0485d5ed4b98b2e78ace29fb3cb431323ea6576ed65b2eec73f472de834b48cc32420afe4132a274a74ef03e6ab01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dd50e45bb23087a5424214b3f742358b
SHA142f408b27b878fda6c46bffe8f1d8f44b04c1e7d
SHA256a19f4f5905f3102bf67aecc64271e58fe783fce220f998257a6f25977716d7d4
SHA51250858a66f0387e79a4d3caff670cb2dfad09d442b7f3246d1fb1bfe1702eaa31e6cb68e4e38068db013dd8b11c38f4b2c717ac4910cfd853b093749c484b027d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e3389f62d7f3c9f5b80b7b23a7b5c7f8
SHA1e01fb702d9bd8b9cfb4fd8174099a4faaa10562d
SHA256f36beae8546e67af230ff006894da8d483139ec2c66ee606d0daea5a9e70d223
SHA51252be508b478d90ab23103ae37c4308144bda1c4b747c20f2b6ddbc16d3fa508f9869019ffe2751e31ad9af028138ede106974708b834021e3469b2992ae4a555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5250f8e577d484d6c86752a0a856e9bea
SHA1687f18293a291759b6a5f59c18d4f871780b64e8
SHA2568a42e67c1480d6beb89a8b03908dab2348848d7ee1be319e238627950dbd5867
SHA512f36dd88af7d3c6139380a064e88664611e927e605e53736682854c3b0d6fd07db401928fb9985ab72cd9d7356e33682d623f4baac4b122ac74eefc0f0f3b8702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD510b8c02f1211edbccccbec604568b04a
SHA158ef83d0ddfb2a76f6a6ba9d1a27f6f45fa51300
SHA2563aed98040ab7f74f982e68f4e265c053de1573458cc76fe66aeb633e512bb9cd
SHA512cb233c05d25f3be527660ade78e342b3c4a08b60c7e7a8588b29d42b9a447147e190b03b23978633862d9c56d14bd35529f7f5d8dabc9aae9aa2aa6a39c030c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD551c31bbc6f74d829d92d35144bd3450d
SHA1084d7620606966daf419c73c9acb66e8d178b6eb
SHA256759be252f46355cb16b6b710036f1cd3a2d4ab50ca8edf9572be4d6eab0e53dc
SHA512114878f97518d9442d523476a29da1df764d1c0b43566a4fee65b3158e3d9ea139af0eb6a1a0f103e6e511728af95bb8d1a9aa301b4a76df1ea449c4c2ec81e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d645cf7af33321f176be99614986116
SHA139e5261b992519477a640d196573ce91d588b013
SHA256fe7e9b38b5197684b82c6aaae58d8985e2a86c6f41bfcabb9964feb2bc03f527
SHA5124d14bec586bab64bfb0bc8332a8caf3ccfa5ddda3b2319906b63ce70d45c7fa5aadaa6da9bbfc8e19300fc631ce0e978f03cd8e78a8cedd991dbe6d3efdf993c
-
Filesize
7KB
MD5172f6e044ce01b39f404c58e3647dae5
SHA16f03f39821066b7548a87063d7e7f6bb112f57ac
SHA256607b4fd659bafc1f135c70e2d0cba4d72b4a1c303fb9f03b0cd522d628d74824
SHA5128e67d88fb7c08e5e7c7a1b9cc946f7f356f1d63eade55ee7258558876ddd8056f922f296a61f865eabf6761b2ac3282f195466ad35dd929c1595636a0dabd396
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4D33E1QE\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S7FIT0B8\favicon-32x32[1].png
Filesize2KB
MD5dfb98b35bec083cddf7e575ccbc12efc
SHA1f77c5e6f37aec582c5977a76691f992e3ebc3a05
SHA256f053cec8f37df661ce13646ff5ecad7050bd50c4afb4f7ad12cd252577207e66
SHA51217d2d675bc677f126fabab826b4fc79a05eece52cf586a97b7d8093dc402d0160f273fbf9d38978f01befc9f85a979208c2355cc0a4c129a2232ffa4554961ef
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
598B
MD59efa1a28bba61c58353804a468e381ca
SHA118456a894907dca6bbbe37c6c5ac20bae0749b6c
SHA256d460a3b7b2444762695d3d8d01164ff2d6f7358fe8dbf392b3752d4d1e80d5c9
SHA5126b3a5e3a92b6823b2bc45c5c2a99b88b4f5f640c7ac6bf2cd86ca71297ad2bbe8a6f905ff33d2ace80f9f8bb5574bf409ad210b2d1afd2eba26f5b7f27577248