Analysis
-
max time kernel
204s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/03/2023, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SKlauncher 3.0.exe
Resource
win10v2004-20230221-en
General
-
Target
SKlauncher 3.0.exe
-
Size
1.2MB
-
MD5
32c7e3347f8e532e675d154eb07f4ccf
-
SHA1
5ca004745e2cdab497a7d6ef29c7efb25dc4046d
-
SHA256
107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b
-
SHA512
c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2
-
SSDEEP
24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e8f12fa8cd8fd499ff2c01df6bc8a3c00000000020000000000106600000001000020000000e7382240d419c622f4d2ac270df28a8bc5d888f034cdf16f858d70d556632a89000000000e80000000020000200000004bf14578ccdfe08d13df56a86e1be439721dfbf5131be123dd4e9bbaf4a2078e2000000025b5309574e5be5c11668bda03b621b8d485b650d01d677f03b6f2b630c5159340000000b56f4a16a6c446c1ecc7ba8ba3c2817441df6d48333903eafc5c5d0865541878aaf0426891e4b22e7a0122bd866c44ce72d19e489b0de7b19af8576e2ccb1266 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b93b416358d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65D23D31-C456-11ED-B56E-E6D401764DCF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "385776063" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 956 iexplore.exe 956 iexplore.exe 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1460 wrote to memory of 956 1460 SKlauncher 3.0.exe 27 PID 1460 wrote to memory of 956 1460 SKlauncher 3.0.exe 27 PID 1460 wrote to memory of 956 1460 SKlauncher 3.0.exe 27 PID 1460 wrote to memory of 956 1460 SKlauncher 3.0.exe 27 PID 956 wrote to memory of 1864 956 iexplore.exe 29 PID 956 wrote to memory of 1864 956 iexplore.exe 29 PID 956 wrote to memory of 1864 956 iexplore.exe 29 PID 956 wrote to memory of 1864 956 iexplore.exe 29 PID 956 wrote to memory of 1864 956 iexplore.exe 29 PID 956 wrote to memory of 1864 956 iexplore.exe 29 PID 956 wrote to memory of 1864 956 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1864
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00cb89332c239d4a8bb9310caaa01f9
SHA1736df482417ef8debed54fe1bf0ddc97d74260fe
SHA256ec75e9079112a49c5df1e4dbf3b2c3cf2527f6b80e56a4b7978734bff8f4f3bd
SHA512278b0b2cc6af24277376455471ba873c1c7d06e049a0e1bb94bff5e8aa424e87cfbf0c67127be51fea583a0038ad734293f5662853e950705de210618a1a282d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502161ef0f574d4c7d9bba4ef174933b6
SHA1d40043773de45335d5965c76d79e33e75c7b6964
SHA256f39efb45f4bdeb05cdf29f1cb9defaa054ae982c072a880ce01edf57a92e54ad
SHA512920d38f1efee69446c9534d9686fd62888f26f50e31f9341c4a93caa47b3431002a26133d3225b211a2d873e5d8c1d6886ded17836f20b47aa4fc9b0d5f21685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5601e61dd88c92ffa6a1980328dda5655
SHA1d9a839410fbf4a94c1d880f7742e44f854bb6726
SHA256d68265cfb3c43572128f12fd6683d0e333cefce892f128799081d5c3c23b9011
SHA5126e8399445f892d2553668fa20290f0b2b75935e6af8ba32b44703bf7ea7a6ef30381e6efebb97ae63017224ec77f7d7ad4b5e253bc41516b65d7094a697da76a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89dc48f0912b085fdb58a63d2dc08e8
SHA15a511ab34ae4031b35353790117466cbf88c6733
SHA2561f63fa1633d11c251b9f20a9f915f07332b5c2e933a35c0dfce7d182d160e2b2
SHA5127e3cdeff3b1a07531e4f1a479dbe80f97d12332a31cb33eb2909f8100c35bf4c97ffe126802abbe08870a1f875a11524e9302dc2227bda263f79645fe279ea6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f1505e26f493d0beadcbd456ea5125f
SHA1dc069f3b86f7ce16a6dd43d27ad7570c425a257e
SHA2561166e3fece68a465754e933168c9c7eaaee01180ec44dfc37b587e57ec98f7a9
SHA5124488cf49f7295e170abc020334b86e619b1e75d299d35fe4f34a68d0643c4ae2f75730c09fd67fb219a7cb7cfaac2c502676a800c2d71c51aad7f96cfb5df024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb51d46f3887e63bc86d07d60517f42
SHA1971ca433b31d54395c18a9f9dbac294e8a3fdcc4
SHA256feabf3c4fbe1b1f09e9a8fb0d1a16901cc790295e86a496865f682bc2c06966e
SHA51270fd704ad8a879f1ea792398ccc724836fc5ec52e249bd076d1e12bfef8d4a57c1d1608109743099cdbe254fdf7e89877018df3b217e9d3e269d997b82ee2bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55164cd9862044980db5c0b0bedd0083d
SHA117c865beb75e68d6427dd6b654b0233e1b9a2f86
SHA256b49ba9ddf6053d7fa857195893192df785a0b81a34af44a093f9410e98d4a954
SHA5121a13139125344d4ec838d039fcee24bd64ca94f7f647b8523d9a9e48b00b071fa4e65b2231349a184ee1e1afcae23df68885407aa93d67215634f5fa6e3b7060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee8506e8385573993f12dd746041f222
SHA146acd0e5ebd1bd69750577bd68cb9545ca34b9e6
SHA256df8df3963c3e08fc612f37d69a2ae69c3379fff2b1efefdf2fb9e4a9c8ef496a
SHA512bae68f7142b5cef9560d80a6c2ff4e914852eb8473436340a97e45cd37a7ed3f054e317b0d27d4a718f169068dc705b2be7183db50935162f467e7cc2199108c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d518adb0aedbbbe88d66720e6b6a1132
SHA198763ce924d3f6d230631e0e1eb7145222b9675f
SHA2560ebf79936baecc5f20611567a8c4ce49c9297186135b14817ecad0eb22693d1a
SHA5123131860bbb35a760a9f4fbbdbbd2398a525ac28ba52825b7f051ad5bfc3b2197795b74685d69fed73c07c1a01a88c7c817290cfddc4a7caf53ee5966409b390c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187eae00c083a8a73d840bf1663117d7
SHA155a6c1ac723fd2f8bea154c2a448fca48f32aac8
SHA2568060c5ab8c0139eebd418898e719c6b29377fa6c42dae3633d0a66f72829233a
SHA512f77f93c22ad6cb8eea329f4e01a2589b08010ce25f5c2c7475848984ba26bfa49b70284ea9a8d61e023c2d9a015ff622c58f4926d4dc06e5271042fc0b237dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741a258a86a51e567ce08f1271d8f860
SHA1b0d1a3b50ce7508714514abecf55ab155e6167c5
SHA256aaae2c41c01cac27bcb234fb9c1045f78fa2567634ff7eae53e80a5453118d48
SHA5123d1093b7f9425059c4062984f5afddc6765ec81c7e9aad55615d58a1a0976a6d7677dac541c88a7ab5b12f307ebbf1b4ad466903dfb65195952be9649630d1c3
-
Filesize
7KB
MD54fa62c72cc0b5575422eee5edb8e35cd
SHA17e8ac19cdf6d961d1da97bd82f487937d7d39130
SHA256a0595e5c56b270692483418d36cd0b660b78caa1d8c49282ae6d246823e4de76
SHA512df722420d1e4f5a69fe979c2431b83cb71cd94e5d0e1bca8ec19dfbd6192c38a77e98a7149dd463a6036f34c1a2add33b541171367410724785c856806daa0b5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BJWXLGAS\favicon-32x32[1].png
Filesize2KB
MD5dfb98b35bec083cddf7e575ccbc12efc
SHA1f77c5e6f37aec582c5977a76691f992e3ebc3a05
SHA256f053cec8f37df661ce13646ff5ecad7050bd50c4afb4f7ad12cd252577207e66
SHA51217d2d675bc677f126fabab826b4fc79a05eece52cf586a97b7d8093dc402d0160f273fbf9d38978f01befc9f85a979208c2355cc0a4c129a2232ffa4554961ef
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
608B
MD5fba1681e2e43810b231fb1d253abbb01
SHA1cc7a8f24454dd2614dd281210ed909b271dad9dd
SHA2564ff6252dcd23ed5ef3a110212347638b1546480da1a2bee8e2931be40d9d6e73
SHA51247264b268643e79df85638db8e1be21d1e6ecf4a923ba0530ab1675a409cff71f5162919b21c4d5d0c0e9e5efde668fa1f21fafd290a9f57afe0f3cef236fe32