Analysis
-
max time kernel
54s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08/06/2023, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.0.0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SKlauncher 3.0.0.exe
Resource
win10v2004-20230220-en
General
-
Target
SKlauncher 3.0.0.exe
-
Size
1.2MB
-
MD5
32c7e3347f8e532e675d154eb07f4ccf
-
SHA1
5ca004745e2cdab497a7d6ef29c7efb25dc4046d
-
SHA256
107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b
-
SHA512
c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2
-
SSDEEP
24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81A5F1B1-059B-11EE-9D2F-CED2106B5FC8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b054d05da899d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000044c0fd3dfabced44b4b685a0c952309500000000020000000000106600000001000020000000470afb1e5f683b760cc6943f55d53ee079198e4a587879a137f1f0291a7912b9000000000e80000000020000200000001acc09aadb2af78c380f59ff8c69bbae74d6ac08957e56b02c1a7b9453f0b98a20000000f8f094b5e0c97c43a9bde4b17c93022ab39d1a2b2f4fd8e2e32cb3bf093a7948400000004ce84508c3543e8dc94338cbfb2b10ebfed867aa4eb9bb5bbaa821a6f00d0a0bd036096d44ac387c726c283bd9599f25190d13d173bb9e9be03631897ff15048 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1172 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1172 iexplore.exe 1172 iexplore.exe 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1172 iexplore.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1172 2028 SKlauncher 3.0.0.exe 28 PID 2028 wrote to memory of 1172 2028 SKlauncher 3.0.0.exe 28 PID 2028 wrote to memory of 1172 2028 SKlauncher 3.0.0.exe 28 PID 2028 wrote to memory of 1172 2028 SKlauncher 3.0.0.exe 28 PID 1172 wrote to memory of 1476 1172 iexplore.exe 30 PID 1172 wrote to memory of 1476 1172 iexplore.exe 30 PID 1172 wrote to memory of 1476 1172 iexplore.exe 30 PID 1172 wrote to memory of 1476 1172 iexplore.exe 30 PID 1172 wrote to memory of 1476 1172 iexplore.exe 30 PID 1172 wrote to memory of 1476 1172 iexplore.exe 30 PID 1172 wrote to memory of 1476 1172 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.0.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1172 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed3a338136e643044d7c68f4976efd62
SHA16d2cb7fe943613f0365aae175c17a0b72f18d9fd
SHA25618325d858b58ebc91de3a09366f45430ffc9bf21df7e2e56c1f7b1fe6f7f64d1
SHA512acf1903b9949a9238ec6d31573e09529b8aa1de0ea11fd28bd6aa5d25a7f7b19ae1cd0a36ce91582c10ae0ad2096d8cca314b1007497f8fc570134c56f3eba1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e19de433bbb12a86c884bcdc8f596272
SHA1034821eae1e847b540e914a33e802498d41d262c
SHA2569632bb68332882c7fd3f1c0a7c48508ab18f54886c10c90b46ad1957e96fd7b5
SHA5125ec7ca0d9226830373d654b5be311f038d63d551dd324882b066e785bf780c18f98bd25d5b5c211dbce29998a82970c1f22b38ee4f05cf23dc5a6edfeec21952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8ca8c3c597bf9b55fbb24df7ced4ae0
SHA1eafc955cbdef1f4b29965bac7953921874bcd9a5
SHA25610a35f7dae1ae1efbb4abca7ed082a1cf1921436c2d808c29038f1a542494cf1
SHA5120bb3229d74ca9b915fc2443c5605508ea56ebd185d4a09d42dd1416b439f26749559d4479d39b4d4c323651fd1fe2620c2936adfe1817ea8d68fc0c88407298a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d54f805aa4bdc869d54aee5b7c4d091
SHA177ee1c315e76a43f0f584dcf5e27c34aedc3b6ab
SHA2568336d1bd727a2d9f833b56f56cfdea149c034d776655655ea2a6aeae1458ef9a
SHA51215359f943188e93a114a9fe378052f1b04099e8ff35ee070d0622d52f0057f27a06e9fe94c3e8d20b374c6a85171fbce0fdb0d55c8cb51627c24cb8643b1f203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5b54e27352f7092aa2d1ba60e0dda3a
SHA1ca5470e58569f28035c5619fc78655fc40dbfb2e
SHA256023c259ac20b6e0c819d2c7ea2fa4439893f226c0d276ca280f7a32a02fed8ba
SHA512071735ded7d01eda1624c5b46538c7b34dd1f6bf551fea291c85588361db1a51121cbe8e8743bdb43d930f83e4e79645edfb979431ffa7ff47f1faa519d6f3f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c20cf44133d96eaf156d8478f5301d05
SHA1366627cbb3b65608d0517f8c92b563abfdb08b7a
SHA2563fb6e388131f1b5801464bd79c4353a2a18c6a76a687b13c9966154f04cd8cf4
SHA51262ae8bf5cea746f6dae3b04c74793144c849b79ad0a2a50fd53df551865ef589c29ccb0b0fe02978fce40a31fa6e730353d4758da099cd7415664d50a0e3c10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee7e2e652d9383f654648895af661caf
SHA1a4a961cd1ad0092371b0008c299667e551062a8a
SHA25672ec6043be45bae61682a5020b629309c083568a5940af22bec4e499e551a2c3
SHA512dfd8b8967b4999c395bba980d631d6673594de32f2586bab828ab36b7278d0dd7437e02849af9af408042652d6e5bf3a619b9fc1dfd4ec947e344cf7d03d61f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51de3dd4f2926c2a16b7bdc7f83bcb3a6
SHA1b5f7602c1b993c4368a6a4909807e700b3cb0ef5
SHA256ccdbaee2828a6da6e9a37818c36c2a5aa3920d69b651890cf9806ccfb64959c7
SHA512822899626622c808f07a4096e7997f6341d10701df323567e189366ebbc1512991a1ae2d72fc28b555c46913449bb9a4bd03acdb835aacbeba0023120a5ddaf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52629f225b61e0c4ee7d738727714042a
SHA196e05ca5d40515ffddadbbac6efdb54ed62dcc1c
SHA256932663505b0255f3d27d97291bde34f66e1bb4447c419e3d9d28fa43c2d71840
SHA5125a6b41c840decc295db5f85922f3ff96134d30c4ae7f99288f0ee3455e70e7fddd1a3be3d49af323bfb295b57443ebbbbcc20e70e2587632d20355a13abfcc56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548b3f94f0591a0281b5e0603129603c0
SHA18a72c70a0c5b65be882424bd54a494e13492ec3f
SHA256e45e49ff93143f21b9ee585b17bcdde65e2336dc3a6c311d67420d31cadad74c
SHA51287baff6780a30e0081f4cf0317d819366bf3489123ad8b7429c31e6e65b715fc769798cb2148479226bcf1fa46f8bf01fc3c99b9121961b40a3db026dbde42c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a9a0597f021628ae5b96db913abb827
SHA1fd4a0e5c563379c7a58b0c4ede36d2cd98e1bbdb
SHA2567669ba88f210a054b60d97424b322547c14b3d06cf909f45ad79c9f295f27f95
SHA512f33eb610d34803fdd41890324b6602659b561a13920aa48eeb2e16840312b2b87d7862f2e1082cbf3286c4c0d8ca5f2d4b9a85e6fc8cac4ddd4a048cc7d9c36a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c188e99334f4004ec6a34b738436ba1a
SHA13eaaca70dc26ae33691a1fdde5b0d8d6dc953fcc
SHA256508294253c54469075d48ed0e001764795cdd258f737efec043b424a11a3813f
SHA512221da6d26b55c6f32573a4e36dbea0311ffa27f37dbb753199bf79a1391eb01a1fbcd140d91bfc8ad8dfdc64651db820a0363cc13e7db3e2048292e4c58e43a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549a2d8ebbd8f1e668d71a296349e4dd6
SHA18e1da69d50df76c01974b27fb69bff6367b816ec
SHA256faec7233fc18131778af3369043d91e1ac572e711c607d80042da34b55ce8622
SHA512d0e5b07b9ab47f98344905fde9ea8210eb755109e748fb3ec730864617e3da9560bbd8c37c61964e1fd429dc403b9fe87cd73b2a66a6f126256a534e0afeef08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d0da5dd8bbbd40d468f95c0bac430b5
SHA168334cb896ee8dbcb11da5f54837dfda0c53cc53
SHA2560575a2e76885cadc4df13da016ecb105551413622cf172854b8b07abc09b1f22
SHA51284538a99dc46339adc737b9fb8d640c14fbc2a3b5f913b972bd649498fc0d4a44ccd34a511e5707f9bc7ae472770ce0667f706f94c27fddc0d94a75ebb4d88eb
-
Filesize
7KB
MD5356f50cd623fc2126a31b80c33757031
SHA15ec8959202c89ee3f24d3afdaa6622d371cb80cb
SHA2564dcee68ba0feafc4051eb192802efe511a356fc792b3ae34795423e5aafc8e79
SHA5128d56023fe2ef7471cf5b462a62979644dfee9bc03b8c89dd779d2091d7958c74200272476f17770d6cf41d686ab99bf1b381010f769270225b424cee9abb1b9e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\favicon-32x32[1].png
Filesize2KB
MD5df4253088bb850c76f81c91db284d4f7
SHA146e3e3c42a159f22038d86bf39fbde118c91dcbf
SHA256590d33ce64b321c321644bc8c840c354257371f8c247f776b788a5ce2c9bbc72
SHA5127804f8507d35adc2a3f65a4fb017bc50219fd2ee326693dfc5011cc9e22df61f50533ee7eb597133ac69e502683b7089df89735f03e11807a4724564061b0b22
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27