Analysis
-
max time kernel
175s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10/06/2023, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.1.exe
Resource
win10-20230220-en
General
-
Target
SKlauncher 3.1.exe
-
Size
1.1MB
-
MD5
021b53abfc25a261077282498e5726a0
-
SHA1
ba7f38a28444504e6e8e1f995cc40ceb70ff6409
-
SHA256
c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620
-
SHA512
484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d
-
SSDEEP
24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3356 javaw.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3696 taskmgr.exe Token: SeSystemProfilePrivilege 3696 taskmgr.exe Token: SeCreateGlobalPrivilege 3696 taskmgr.exe Token: 33 3696 taskmgr.exe Token: SeIncBasePriorityPrivilege 3696 taskmgr.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe 3696 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3356 javaw.exe 3356 javaw.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2652 wrote to memory of 3356 2652 SKlauncher 3.1.exe 66 PID 2652 wrote to memory of 3356 2652 SKlauncher 3.1.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3356
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3696
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\160f447b795b4f7cbcb8f99b0ce21b16 /t 3540 /p 29081⤵PID:1500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD54ca3290a99adadde557930cd481d7539
SHA126034442a76131dd3d37c8f28b6e9bebc7c1fe7c
SHA256dd130c68dc36bcedbe51a6b8ec3b3358a460d45952f6280e12331f48850b6b3b
SHA5129341c60f92dd3f89f82555055924bdae6fcce1e4cd13a7dde5129ebdce04bae377292237a2ed6c3e7623b242e82b01c7ed1717af4d7db8ca473e9fd7b7b190d5