Analysis
-
max time kernel
120s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17/03/2023, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.0.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
SKlauncher 3.0.exe
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
SKlauncher 3.0.exe
Resource
win10v2004-20230221-en
General
-
Target
SKlauncher 3.0.exe
-
Size
1.2MB
-
MD5
32c7e3347f8e532e675d154eb07f4ccf
-
SHA1
5ca004745e2cdab497a7d6ef29c7efb25dc4046d
-
SHA256
107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b
-
SHA512
c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2
-
SSDEEP
24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b983b3f058d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "385836812" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007837404bb2ac374381d657b4bfd4f9e2000000000200000000001066000000010000200000003754420288eef197d4857d2556eea3244cc6f6540bfe4b3f42730560badbcdbd000000000e800000000200002000000057ff884aa7be70435a8e2b94bb5fd2bf2b7a1f16a88ffcedd3d21223f3b0dc0b20000000bdb1266052e98ad051108357ae6eee33fbc2105dcb022fbf158b8454786ea65e40000000b7dd1f86b86a4af59b802a4df13b8ccd687f0a5a831f49d65a6c1572e256d9c063457db40e253ef6f632297ea61c15e2cdeda40f18f0df264523c7f3aa5c884d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D705E731-C4E3-11ED-88B7-F221FC82CB7E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1748 iexplore.exe 1748 iexplore.exe 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1748 1148 SKlauncher 3.0.exe 28 PID 1148 wrote to memory of 1748 1148 SKlauncher 3.0.exe 28 PID 1148 wrote to memory of 1748 1148 SKlauncher 3.0.exe 28 PID 1148 wrote to memory of 1748 1148 SKlauncher 3.0.exe 28 PID 1748 wrote to memory of 1060 1748 iexplore.exe 30 PID 1748 wrote to memory of 1060 1748 iexplore.exe 30 PID 1748 wrote to memory of 1060 1748 iexplore.exe 30 PID 1748 wrote to memory of 1060 1748 iexplore.exe 30 PID 1748 wrote to memory of 1060 1748 iexplore.exe 30 PID 1748 wrote to memory of 1060 1748 iexplore.exe 30 PID 1748 wrote to memory of 1060 1748 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1060
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f4566f481260f2b580e54a4ed9f19907
SHA1cd2ad487cb530477fc9da9646068ea2ec74de95c
SHA2562fae6416f2e4bbe1fc1f4f7384fa69813c892d3bebd7bb5ef9e5876e39995529
SHA512a2a65948238aa4e612c1717d6c272c4af735daada634d4140950837f26a59a28ab54bcdcd734507885035ebf8b9e651fe7d5dda87c93e29b03a5fbf85c2a7ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590a53ecdee8720b62b303a1071649fc9
SHA1ad2c0d4360ccf84a53a23277f859e228efd1770f
SHA25698b12a92d38b6ea1134e4250854a3bd19fe85f7d5c6ed0ba5e543d08ffb7e70f
SHA51247e6912ade5fd67b6372745128053ab6a08f5b65dbac9033afe8e3ad2bbf90a899977b0ca6ff87eadf915892c49595c0dde66f36bea9a8888b763896d579f384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a80082f690846156f98668f2db714844
SHA1c846fc85c1c886194ded64397db2bd4ad882eff4
SHA256897a143ff12a4f66711e86a7e6fb3879936e30271364e41fe0140d44ead1cd58
SHA512dd3a62b4c56c2faca817fa0da4e08a3bb907380050ee1b4de005a8e14f539c31463ecc80afc37086ab51526d49d972934ee4f6d6bdcf09353063a1cf15351765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a696e4382cb569e78fd20c6c1051fd9
SHA117d6dbf3a60cd7ee73b63b1cf2033d1fa210368a
SHA25604a8b69a6405547e94f36997d5d7d9ca09706991175d92d80c93584eafb28657
SHA51240a833c52d3685d58db15cc289c0c8f79fa00273563b94239f41cd88d720accae4ce0294530bab91519c009162967ccc9f95fb59d9df8b2e7b2f4378164d12bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e85b4324bddd3c0c4923d28d7398fa4
SHA1bf3a55079f0dbe41c6b07b3056b596106a9082c2
SHA25615aa8255ea2733b84de54f87251c583543291ce9092679d143f382c0cf0edff2
SHA5124f6febbe53636d5e7d85c85a5956deb00ca16efe4e194bc85ba15bd0b8c7edd963efa07a04a81148e5612f39793f89cb62003af7da255f6048c627691596e7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556dbbba3ea78b77ced3b1611e5c78f1c
SHA10a8332de21b43ce85152bc04c782cf22b3dbc7bd
SHA256c30b31464e11f169ad868363620484076ac21f297ed42469c217167463ec6ecb
SHA512aa7d1cbc4e0ed2ca395b6e3d68f15df20cd9577c21e4b4168f7686e3576e0fc0845be95da4f4e70d85238397cefa94c1fac8fa369406d736d4586346d86abc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d74006938e8d82a21d9fac4aacfd93b8
SHA123c7b815b423cfe5a3ee690ba4b85cdaabf9837c
SHA2561d28b4042f5177f11adaeb5bd3ae49a16104f671f05990f160cf16b6e095cb15
SHA5129295479be7cc62b4b7e7ab66d6e93e172b1c4f363738142f0bf01c7411d60587fbf36d86026030e94ece051f424865b9178a88680b56c817a618d6df0a82f6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d15c67c15adb0a01f61a820072ba9a2
SHA108403fcd6ba1dbcfb0edf37fdb42e6b909a9244e
SHA256dbe1acfe5c9d3e2022f4624562e48c7c8872d8760ce2512103e0484c39d4e430
SHA5124ea3f5757668ccefe887bd435bdce85a3f8841da0590cf18705adda902cf499b9a754a0ab1973b0f14da32a9a2da3dc19833da505fcdd4c791124009f121fabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53994258daf6a393200042c2b43d97855
SHA1e9c0e11449e97b507fb746969b6bcd43a92cf918
SHA256df0a0b0fdb7404fb4d374982338661c2aa8802f5f9d0d3378f8324b86ae964e3
SHA512ef291ea8ff42c6f04b3ed49288c69e40c19e1d5b397caef8c2714d05da3be63781e933dc3a498d15d1693e56889fe32767352895ce066bdffa33576c8b40fe3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5230071e0177f5a96df99e3c5a8a6be6d
SHA101aa7a94eeb3084cb1e31c445b76b308c91577db
SHA25694868b8d40047890bbd2b1589e8eb3220b8272887d1875ef3ce154765b1bfcde
SHA51213682ffc931db114f2d42932c09080b661f645ef301aedd292719ce2191e21241606e4bebc594114e9c0ebcd507979edcd4c7eaff4c12154036b23641eee7c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad1f81d2a6242d85e5ae08f56a1a4a24
SHA18cd41f1fd67e075c395ebf3c25e686d301868219
SHA2562db023a896e735f23f5defef668544ac1e3342f5cf142b8caaca44c6fbe29044
SHA512e8afba7104444d3c6d13277442b3b0edb3fbc71fe2f563f8cadffc7543862f2a5eebd468bb9200c950cd5ff0e6788757985d55b91c5a5574f6373796ada948e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548e1db01a11872d3db41530239556826
SHA180adac5d05fb36d2774b3045ea775091acb8feea
SHA256dc7a7b56599d3407c53f8e42d8ee4ca7db7bc5d19cff17923fecc98298fa2d1d
SHA512b7debdee33e267d7bcc961086c9d2f609b33521cedd3968c3c44e87d0227d9e0d4b5f66d279bb5e43cf651c772a78d1da48cc00f3f90f7479206bf347f43dad3
-
Filesize
7KB
MD588e2730d8455544b20b0926ef7baf711
SHA1be7b072d16dc6d13507fe0a914bf01df5504cf1e
SHA256abe45b27483f6e3e661b7b037bd36925ba526f2a1f2b2f2d58761dc76c80970c
SHA5125b7bdf2358b73752d06550eab9038a2c7f07a090b42c629c65df9ac55bb37dcb5c4fbc48ba4043f30d6f318aa257095a845b6c68edd687572b8ba82da0e41ab2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\03S7L47X\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KTB503AZ\favicon-32x32[1].png
Filesize2KB
MD5dfb98b35bec083cddf7e575ccbc12efc
SHA1f77c5e6f37aec582c5977a76691f992e3ebc3a05
SHA256f053cec8f37df661ce13646ff5ecad7050bd50c4afb4f7ad12cd252577207e66
SHA51217d2d675bc677f126fabab826b4fc79a05eece52cf586a97b7d8093dc402d0160f273fbf9d38978f01befc9f85a979208c2355cc0a4c129a2232ffa4554961ef
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
606B
MD571fdc249d256247754cb36dd1449ff70
SHA146f7f586cb0473ad95f69994a3ba52af13f3675e
SHA256ee703d3b25a8d2e0fb5ee7f5f20be73755896327074065fb284da232adf61d9d
SHA5124e9d83550222b3949a7c273c34fceb810b0c77e71892a12ad5e2828c29e60b06686465e66d3a6880260a0c19907f0c433d0cb933918da4a53d2ce309c5334a65