Analysis

  • max time kernel
    1783s
  • max time network
    1502s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-05-2023 17:42

General

  • Target

    SKlauncher 3.0.0.exe

  • Size

    1.2MB

  • MD5

    32c7e3347f8e532e675d154eb07f4ccf

  • SHA1

    5ca004745e2cdab497a7d6ef29c7efb25dc4046d

  • SHA256

    107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b

  • SHA512

    c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2

  • SSDEEP

    24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.0.exe
    "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4500
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.0.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1416
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 408 -p 3836 -ip 3836
    1⤵
      PID:3400
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 3836 -s 2620
      1⤵
      • Program crash
      PID:2956
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Adds Run key to start application
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbd7369758,0x7ffbd7369768,0x7ffbd7369778
        2⤵
          PID:3040
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:2
          2⤵
            PID:4876
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:8
            2⤵
              PID:1616
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:8
              2⤵
                PID:4836
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:1
                2⤵
                  PID:2476
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:1
                  2⤵
                    PID:3300
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:8
                    2⤵
                      PID:2360
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4252 --field-trial-handle=1872,i,16002696191553406089,9077164642045366512,131072 /prefetch:8
                      2⤵
                        PID:2688
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      PID:3284
                    • C:\Windows\system32\werfault.exe
                      werfault.exe /hc /shared Global\941d7837ed9c4d83ace92916eab03c89 /t 2940 /p 3284
                      1⤵
                        PID:2848
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        1⤵
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:4136
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:4968

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\71768651-0eed-4362-8ff3-6af12d433b07.tmp

                          Filesize

                          5KB

                          MD5

                          1a6596fa82c9d33661fa5a24f0338293

                          SHA1

                          50996ab3089d8dd232cb5150dc26162df9309d33

                          SHA256

                          59f3eb9d3f31b721a09969112046db37d23fe24d3a4fe948bb6ca9d31c25801c

                          SHA512

                          b1786898fe5fa58bef6735c029915a941542518c35e9a3e25a6751029aa43337403c8e2ac4304d3381cd4949abe70308e4f6779b586b8faec55a927ecfc04326

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          357d1ca5e011c123729173ec48c36e22

                          SHA1

                          57452aa43d5a5db890ca9ba6f32728c08b93095e

                          SHA256

                          bf89601cbe043f42aaf0503ee60240b5bcc270d894d3aa7852fbabbff17761e1

                          SHA512

                          b69413dd34ddc1aa74a1f66fa9cf478a8377c549dc3658b37b787bea14aacf65d693a11414d9b210724db09ca1672d5606e31eb6fc99865c61218ecb7ac9a34d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          e64efeb30727ae7c70a2a6d2a14a3613

                          SHA1

                          b707fdd8c7249ce428638e7efbd3e3ffb4b24fc9

                          SHA256

                          cb50b03c4fc95f78b5978c053cdbb81775c6f2981724148a2aa6a6e8999f437d

                          SHA512

                          05c41c60025b09156964f511513e7097aa5c3f16822ba7cfb6ef004f5c45a42e911a386a07daa0e218c2ee5aa0aa88d207413be0818ccc1e9686ef0a688b7d1d

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          e47c0cbb59d11c95ab020cea7887ad93

                          SHA1

                          08571fa70ee74becd977d9bbee2c1667d7829bb6

                          SHA256

                          122c8465128e8c189e2c9a70f241a761f8d43d1790517f556c866f79ea4c7c94

                          SHA512

                          ac33552db6fb566ee1b44ebf88d72157738e8933ef65b792d7509fc9d65c175d3a50978a4f40387fa33e9517732f4392f308d6e94531ddd4b33d3dc510d32183

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                          Filesize

                          264KB

                          MD5

                          10e05c3c2667de18efdc460960a48273

                          SHA1

                          8ace0f56f760e7762fc587fb59572207241057ca

                          SHA256

                          0f4ed07a21e4a1e13050f72b99ae672e0d6a864ff58d3622a7e871b37f4b2e42

                          SHA512

                          947f216d36e818d45ec4cfe31f79c2e4e23365348bd8055c58540975d619a688b3d9f81e3130d89ff2167da853d72095d42be84d886461ebd1fb2d9cb7e4a939

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          71KB

                          MD5

                          e840d70e202e1e7fc6f4764433e38882

                          SHA1

                          7ea3fef98c4c7db990e53c72afc704aa6a2864cb

                          SHA256

                          ff75861344c876dd9cf891490bc1cb459c767640ba4a4016c5b797bac0b8e060

                          SHA512

                          6f436f55f7c38b51cead6c259a4caa0642621e8a23ea118c6fa39d13c0f1ed0872e92e2727143bb0d5bb44ad342f6a0480e2a6469b25099ac46ef62793b80a8f

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          71KB

                          MD5

                          3df2196ab2844b06a62b18d5d7dbd378

                          SHA1

                          eed644bf9e19034b2b82e48dfaa0385930f7b04b

                          SHA256

                          d89f34043cfa0183471fb5eea883632ec15caa868d88102709072b1bd8cd52c9

                          SHA512

                          6dd8b1cd94863998ffd6484ff7858368976ddd7b9d1bf177e4385c1baf52933fbccb3af3a2e0f109e258e268dfdc703aca09ac324ac6bab119d8819885177ba4

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                          Filesize

                          2B

                          MD5

                          99914b932bd37a50b983c5e7c90ae93b

                          SHA1

                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                          SHA256

                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                          SHA512

                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{0A6AC72E-ED8C-C16F-38B6-05831557CF24}

                          Filesize

                          36KB

                          MD5

                          8aaad0f4eb7d3c65f81c6e6b496ba889

                          SHA1

                          231237a501b9433c292991e4ec200b25c1589050

                          SHA256

                          813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

                          SHA512

                          1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_WindowsPowerShell_v1_0_powershell_exe

                          Filesize

                          36KB

                          MD5

                          94b56d65a8b7f7253aeacac345d4b096

                          SHA1

                          7e11e248ae804d3647479a4fe5f03835a1eee4bc

                          SHA256

                          0f312587a999305794730da6f2198c82a346e64211e2fb054256102ac70315be

                          SHA512

                          538cc0c1b4dc66e8a3c6ca9a17ddac128441874248589bcc6c88b64ad7d3b93ff143867d6fad0002cbb4584e951d0e82441c350396e6d59b73207a3ffe0fc055

                        • C:\Users\Admin\AppData\Local\Temp\flatlaf.temp\flatlaf-windows-x86_64-4298277402000.dll

                          Filesize

                          9KB

                          MD5

                          697d496ac9f5aaab8ae025322358c61e

                          SHA1

                          2043eac8cdcc2e24b854af1eacd77a5f2a395a27

                          SHA256

                          a7273a4cf48ab3413f2c186cc95a3367a73ce99f8d45329383219d4cc27003aa

                          SHA512

                          b6702cd49a3af9f97f697565136f140692af9f8b271e672f2e91c920a23212b778583786f2377078117113647926338614a92c4a2423318b7a21ba2fe3a89838

                        • memory/1416-199-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-229-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-236-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-240-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-241-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-269-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-272-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-291-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-232-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-233-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-227-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-225-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-206-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-146-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-190-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-183-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-158-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/1416-151-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

                          Filesize

                          4KB

                        • memory/4500-133-0x0000000000400000-0x0000000000435000-memory.dmp

                          Filesize

                          212KB