Analysis
-
max time kernel
55s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/03/2023, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SKlauncher 3.0.exe
Resource
win10v2004-20230220-en
General
-
Target
SKlauncher 3.0.exe
-
Size
1.2MB
-
MD5
32c7e3347f8e532e675d154eb07f4ccf
-
SHA1
5ca004745e2cdab497a7d6ef29c7efb25dc4046d
-
SHA256
107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b
-
SHA512
c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2
-
SSDEEP
24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8023872a325cd901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c8a3886e844ee04ca528537b5bc45899000000000200000000001066000000010000200000004dc4dbe2aeaa535245b2fb6a40c14c2a7befd227e1218ce43b50ed086f308720000000000e80000000020000200000005a52cd9ca39f8200bafd5a742fe2750190988aeef8db4153500ab3c638b2d41c20000000fc7ddb67543f01cf6a5b23498de6d95e802567eb193367717e7e0d755e1df62d400000004ba2a0044890441fee4784366d280bcc9ef493a25641f02577cb20b88737fe1c76f88c050b71bed4ecb740c06ab78d2c115475fb165fa94af54a915fce34e7df iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E12C701-C825-11ED-9F32-72D88D434236} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1208 iexplore.exe 1208 iexplore.exe 572 IEXPLORE.EXE 572 IEXPLORE.EXE 572 IEXPLORE.EXE 572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1208 1712 SKlauncher 3.0.exe 28 PID 1712 wrote to memory of 1208 1712 SKlauncher 3.0.exe 28 PID 1712 wrote to memory of 1208 1712 SKlauncher 3.0.exe 28 PID 1712 wrote to memory of 1208 1712 SKlauncher 3.0.exe 28 PID 1208 wrote to memory of 572 1208 iexplore.exe 30 PID 1208 wrote to memory of 572 1208 iexplore.exe 30 PID 1208 wrote to memory of 572 1208 iexplore.exe 30 PID 1208 wrote to memory of 572 1208 iexplore.exe 30 PID 1208 wrote to memory of 572 1208 iexplore.exe 30 PID 1208 wrote to memory of 572 1208 iexplore.exe 30 PID 1208 wrote to memory of 572 1208 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1208 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:572
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d578e138ba97ff89d08eb8bdcaaae6
SHA12b9b470f8a21eb351c754701ddb9421f697a10a6
SHA256768478bb3851e9e7a84b53e5522a14242c802d92921f18087a5ed7cf5f96fd19
SHA512db79e02bab510306938b60eca55819e51a0394f20c12378482e371417b4dfbc5aba3402bf899c3e6c5563dda425292d54d1953bf3e3aa9c493e0ebbb60add784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dbfb25c52b1fc99c158bca361ff044f
SHA1bb6056ecc624207cc9a68fadf6c866ffcf827fc5
SHA25604326c5595af27725adbb34766ae1cdd535199b9c92cc376b90067fb9f573350
SHA51230f20ff068cea77b91267906e204cfdd50dc32f9f6635d07c1a9bf4ce5879be7ef394cdb616aae9cc10cae6837c0416b3eee0f3ee42e239ff075efd281984948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43e4172797035b05d0c5488420eb70e
SHA1ca367b281189848ba9f81d09f928ef146798aa68
SHA2568b65d1e4ef39cad0898d579394512e4bf64e20bc21ff724b662e91741134da9e
SHA512e901c75a37fc43d22f55faa9d4f0381da349723ee3ec0363ffb87fb4e013655634d2a21f4a9ec58caccb4f1bb035b4c3d0eddc552e537c8ee16e0fc96c7fc61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b5573e77b53ac9cbfe3ba32fb9e84ab
SHA1a5ebc02664123919d973d2f3fd5061ab23cc3aea
SHA2560461954a9f3815898d4b1d67107bf0a049c11dcfca9a93bce84565a0a814208a
SHA512d348c136186c8ad3119a1de8031ea802412784b5123362843c62951400c96214ad577d4d0c64cc6ab6db83cf26fe3a9023681052caab0ca5099fa2f97e0dead4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb483decfad7a916a08b8499e7fcb4d
SHA184745f63d258275f5f9b4118b15c2e049d383bb0
SHA25683d2852955da3c072bf021b5c8861d4066c58da569108ad0a518b827d7e1b8bf
SHA512bd696450158f326e31ebe0702d2dbba865d64f03e6a1d81f2e45a86d66b29e6a3f2419b0c5393bcb8690adc36317fe8429b7821b1067f5c76561a68ec6237075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a1eece5293d5f7d9139babd76be9f23
SHA1ca0a11aa6e8979f295da909d672a18acd39c47de
SHA256a6589dda0ce058ce59ec5a48043ae5bc77275a254a4edf1ff844b011f711f6b0
SHA51242e3ca52ec97bfdf4ca116a97b854ecd4d13e053542fd24a405e6957b805420ea084dc8ac2d4ea8553993e974c4310df86f071d723c54f513918260ab04b017c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8b5d69beb4a188cb316ebde97ebf5b
SHA17749bb2825b1b12487b2b2605f33a964045b1d76
SHA25609add58cdd0921be1a41150b54a02cf43cd5b8be4b32ecd0dc133938581e5e2f
SHA51258b2bbc8328eb933cbbe54a81fc85a5012b7c03ab4b262884377ea90bbbeaf8a2f7df16f74327c32ec7b0517c1f0054e596e7863537c665c90465aac402be40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561813f967aecbbd4919e6355684b1d38
SHA1d90acacdee1f0f7fcbb923609c3ed260a4ac8a27
SHA2568b10b2cc3fb21c89397bc82e9dabdf30b1d89ebae9066f61b9fdf4f8c6b04aee
SHA5127608587a1c32700e2879e851d894e2334d619e4c7c2bf8b007e86f15acfe4a0a730954dbd7930acdc4fe38279768cbaf0d20c08ace9a9a07f1232ee95f1be6d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51984dfa8923422908367b8a2a410603e
SHA134e040450c2a8b0f42b99b610690c423a7a99b8d
SHA2569a2244c68d5bcc1de99b23307ebbd6cde6c0f037f497c720a32ad732ad29006f
SHA512b18e1e55d7f8c25ebe35556ed49f6ebb5f7792fbdf230894a059a7d0b4470427c66573eafbf07dfd8b11687fa0d6a8df633d36efbae0c24b10a57a0dcc85bb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee25d0d35853d101dd1ddcc5184c955d
SHA1edd9d050ac546d801f49614cecdba1118a7db19d
SHA256b2c46f35d134956080c772a661064340ae6e3364a22124ddb0e292a2d26689b7
SHA5124564cff71b7f7a5ab90914b18d6702ea2060db80e070d994230cfc2aeb84d2cf60bcb3be21cb022dd448d89a2b2de0d9433eed4437e4336814568329f5645541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514388536b15c6415c5a43038baa17c9d
SHA16d8db15a4e24f4c45a85e79df81bd97cdc728d96
SHA256c80b0152fc00e064459b78f9517171417c70774a3d97c5d8b164a1e9dda9650f
SHA512012885c97651f48dc86e8ac8efee703d57d0547c6ebe04c57b078b02c5a6be6dde865b4847ab1daa664e10b27b712068b9d61cc5f9a8c96925050a5fb8d1407c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a52865cbb883d3758529a5f1c8e8fb
SHA136420a4b7121f881a1fc857190292c31714b7316
SHA256c82f184b2ad41f1a582c00448e3e0e03721fcda700a03546ccaba56083c5d8b9
SHA5123a5ee91dc20e1dae918fde29e65ff3546d0e0b1dee859f6a07db50bd6ee6f6bd57a4ec9cf3ca5f31b6363d5aaff7dc8bc55fe0e1c444d62ddc86b8f709e7dbd8
-
Filesize
7KB
MD54127dc871930800720d487b9f9cdc39a
SHA1211aad5a947c6b9881012ebb5da6cfcc76ccdb31
SHA2568f9b462f8a368a7ccbde468d0fb8e4d505e462fc321999eaf59f3884b4d478bd
SHA5129985fa3bb5b1e1ca6aad2860b3cc6568329d6386a52612a613dda02a16ac31b70a24aa7609c0be6a54e0186d095579656233498acc7829b78292e15c45414318
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TOS3MI7U\favicon-32x32[1].png
Filesize2KB
MD5dfb98b35bec083cddf7e575ccbc12efc
SHA1f77c5e6f37aec582c5977a76691f992e3ebc3a05
SHA256f053cec8f37df661ce13646ff5ecad7050bd50c4afb4f7ad12cd252577207e66
SHA51217d2d675bc677f126fabab826b4fc79a05eece52cf586a97b7d8093dc402d0160f273fbf9d38978f01befc9f85a979208c2355cc0a4c129a2232ffa4554961ef
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
16KB
MD5f02bc44aa6d04ee86e9361df30aeba3e
SHA1a675f11d1c7c56b6837bfee537b757a9e71cbec8
SHA256c9750c198abb473d8c1cbf8047ca1f64a7949392d237cd3c43c7a858719d783a
SHA512ffbce6116224115c4c5ebd4b4a9ff4049580557db7425432e047036efcf03c08577deb9bca81ab9c779d1848269007408d763beefce6d8bab4e011b275e5a040