Analysis

  • max time kernel
    120s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17/03/2023, 15:50

General

  • Target

    SKlauncher 3.0.exe

  • Size

    1.2MB

  • MD5

    32c7e3347f8e532e675d154eb07f4ccf

  • SHA1

    5ca004745e2cdab497a7d6ef29c7efb25dc4046d

  • SHA256

    107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b

  • SHA512

    c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2

  • SSDEEP

    24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe
    "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1060

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f4566f481260f2b580e54a4ed9f19907

    SHA1

    cd2ad487cb530477fc9da9646068ea2ec74de95c

    SHA256

    2fae6416f2e4bbe1fc1f4f7384fa69813c892d3bebd7bb5ef9e5876e39995529

    SHA512

    a2a65948238aa4e612c1717d6c272c4af735daada634d4140950837f26a59a28ab54bcdcd734507885035ebf8b9e651fe7d5dda87c93e29b03a5fbf85c2a7ea4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90a53ecdee8720b62b303a1071649fc9

    SHA1

    ad2c0d4360ccf84a53a23277f859e228efd1770f

    SHA256

    98b12a92d38b6ea1134e4250854a3bd19fe85f7d5c6ed0ba5e543d08ffb7e70f

    SHA512

    47e6912ade5fd67b6372745128053ab6a08f5b65dbac9033afe8e3ad2bbf90a899977b0ca6ff87eadf915892c49595c0dde66f36bea9a8888b763896d579f384

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a80082f690846156f98668f2db714844

    SHA1

    c846fc85c1c886194ded64397db2bd4ad882eff4

    SHA256

    897a143ff12a4f66711e86a7e6fb3879936e30271364e41fe0140d44ead1cd58

    SHA512

    dd3a62b4c56c2faca817fa0da4e08a3bb907380050ee1b4de005a8e14f539c31463ecc80afc37086ab51526d49d972934ee4f6d6bdcf09353063a1cf15351765

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a696e4382cb569e78fd20c6c1051fd9

    SHA1

    17d6dbf3a60cd7ee73b63b1cf2033d1fa210368a

    SHA256

    04a8b69a6405547e94f36997d5d7d9ca09706991175d92d80c93584eafb28657

    SHA512

    40a833c52d3685d58db15cc289c0c8f79fa00273563b94239f41cd88d720accae4ce0294530bab91519c009162967ccc9f95fb59d9df8b2e7b2f4378164d12bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e85b4324bddd3c0c4923d28d7398fa4

    SHA1

    bf3a55079f0dbe41c6b07b3056b596106a9082c2

    SHA256

    15aa8255ea2733b84de54f87251c583543291ce9092679d143f382c0cf0edff2

    SHA512

    4f6febbe53636d5e7d85c85a5956deb00ca16efe4e194bc85ba15bd0b8c7edd963efa07a04a81148e5612f39793f89cb62003af7da255f6048c627691596e7eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56dbbba3ea78b77ced3b1611e5c78f1c

    SHA1

    0a8332de21b43ce85152bc04c782cf22b3dbc7bd

    SHA256

    c30b31464e11f169ad868363620484076ac21f297ed42469c217167463ec6ecb

    SHA512

    aa7d1cbc4e0ed2ca395b6e3d68f15df20cd9577c21e4b4168f7686e3576e0fc0845be95da4f4e70d85238397cefa94c1fac8fa369406d736d4586346d86abc64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d74006938e8d82a21d9fac4aacfd93b8

    SHA1

    23c7b815b423cfe5a3ee690ba4b85cdaabf9837c

    SHA256

    1d28b4042f5177f11adaeb5bd3ae49a16104f671f05990f160cf16b6e095cb15

    SHA512

    9295479be7cc62b4b7e7ab66d6e93e172b1c4f363738142f0bf01c7411d60587fbf36d86026030e94ece051f424865b9178a88680b56c817a618d6df0a82f6b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d15c67c15adb0a01f61a820072ba9a2

    SHA1

    08403fcd6ba1dbcfb0edf37fdb42e6b909a9244e

    SHA256

    dbe1acfe5c9d3e2022f4624562e48c7c8872d8760ce2512103e0484c39d4e430

    SHA512

    4ea3f5757668ccefe887bd435bdce85a3f8841da0590cf18705adda902cf499b9a754a0ab1973b0f14da32a9a2da3dc19833da505fcdd4c791124009f121fabd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3994258daf6a393200042c2b43d97855

    SHA1

    e9c0e11449e97b507fb746969b6bcd43a92cf918

    SHA256

    df0a0b0fdb7404fb4d374982338661c2aa8802f5f9d0d3378f8324b86ae964e3

    SHA512

    ef291ea8ff42c6f04b3ed49288c69e40c19e1d5b397caef8c2714d05da3be63781e933dc3a498d15d1693e56889fe32767352895ce066bdffa33576c8b40fe3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    230071e0177f5a96df99e3c5a8a6be6d

    SHA1

    01aa7a94eeb3084cb1e31c445b76b308c91577db

    SHA256

    94868b8d40047890bbd2b1589e8eb3220b8272887d1875ef3ce154765b1bfcde

    SHA512

    13682ffc931db114f2d42932c09080b661f645ef301aedd292719ce2191e21241606e4bebc594114e9c0ebcd507979edcd4c7eaff4c12154036b23641eee7c56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad1f81d2a6242d85e5ae08f56a1a4a24

    SHA1

    8cd41f1fd67e075c395ebf3c25e686d301868219

    SHA256

    2db023a896e735f23f5defef668544ac1e3342f5cf142b8caaca44c6fbe29044

    SHA512

    e8afba7104444d3c6d13277442b3b0edb3fbc71fe2f563f8cadffc7543862f2a5eebd468bb9200c950cd5ff0e6788757985d55b91c5a5574f6373796ada948e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48e1db01a11872d3db41530239556826

    SHA1

    80adac5d05fb36d2774b3045ea775091acb8feea

    SHA256

    dc7a7b56599d3407c53f8e42d8ee4ca7db7bc5d19cff17923fecc98298fa2d1d

    SHA512

    b7debdee33e267d7bcc961086c9d2f609b33521cedd3968c3c44e87d0227d9e0d4b5f66d279bb5e43cf651c772a78d1da48cc00f3f90f7479206bf347f43dad3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z62wpf5\imagestore.dat

    Filesize

    7KB

    MD5

    88e2730d8455544b20b0926ef7baf711

    SHA1

    be7b072d16dc6d13507fe0a914bf01df5504cf1e

    SHA256

    abe45b27483f6e3e661b7b037bd36925ba526f2a1f2b2f2d58761dc76c80970c

    SHA512

    5b7bdf2358b73752d06550eab9038a2c7f07a090b42c629c65df9ac55bb37dcb5c4fbc48ba4043f30d6f318aa257095a845b6c68edd687572b8ba82da0e41ab2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\03S7L47X\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KTB503AZ\favicon-32x32[1].png

    Filesize

    2KB

    MD5

    dfb98b35bec083cddf7e575ccbc12efc

    SHA1

    f77c5e6f37aec582c5977a76691f992e3ebc3a05

    SHA256

    f053cec8f37df661ce13646ff5ecad7050bd50c4afb4f7ad12cd252577207e66

    SHA512

    17d2d675bc677f126fabab826b4fc79a05eece52cf586a97b7d8093dc402d0160f273fbf9d38978f01befc9f85a979208c2355cc0a4c129a2232ffa4554961ef

  • C:\Users\Admin\AppData\Local\Temp\Cab5238.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar5442.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DQ3Q2KAU.txt

    Filesize

    606B

    MD5

    71fdc249d256247754cb36dd1449ff70

    SHA1

    46f7f586cb0473ad95f69994a3ba52af13f3675e

    SHA256

    ee703d3b25a8d2e0fb5ee7f5f20be73755896327074065fb284da232adf61d9d

    SHA512

    4e9d83550222b3949a7c273c34fceb810b0c77e71892a12ad5e2828c29e60b06686465e66d3a6880260a0c19907f0c433d0cb933918da4a53d2ce309c5334a65

  • memory/1148-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB