Analysis
-
max time kernel
35s -
max time network
87s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2023, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SKlauncher 3.1.exe
Resource
win10v2004-20230220-en
General
-
Target
SKlauncher 3.1.exe
-
Size
1.1MB
-
MD5
021b53abfc25a261077282498e5726a0
-
SHA1
ba7f38a28444504e6e8e1f995cc40ceb70ff6409
-
SHA256
c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620
-
SHA512
484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d
-
SSDEEP
24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2408 javaw.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2408 javaw.exe 2408 javaw.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2408 2084 SKlauncher 3.1.exe 83 PID 2084 wrote to memory of 2408 2084 SKlauncher 3.1.exe 83 PID 4520 wrote to memory of 4888 4520 firefox.exe 93 PID 4520 wrote to memory of 4888 4520 firefox.exe 93 PID 4520 wrote to memory of 4888 4520 firefox.exe 93 PID 4520 wrote to memory of 4888 4520 firefox.exe 93 PID 4520 wrote to memory of 4888 4520 firefox.exe 93 PID 4520 wrote to memory of 4888 4520 firefox.exe 93 PID 4520 wrote to memory of 4888 4520 firefox.exe 93 PID 4520 wrote to memory of 4888 4520 firefox.exe 93 PID 4520 wrote to memory of 4888 4520 firefox.exe 93 PID 4520 wrote to memory of 4888 4520 firefox.exe 93 PID 4520 wrote to memory of 4888 4520 firefox.exe 93 PID 1232 wrote to memory of 1388 1232 firefox.exe 94 PID 1232 wrote to memory of 1388 1232 firefox.exe 94 PID 1232 wrote to memory of 1388 1232 firefox.exe 94 PID 1232 wrote to memory of 1388 1232 firefox.exe 94 PID 1232 wrote to memory of 1388 1232 firefox.exe 94 PID 1232 wrote to memory of 1388 1232 firefox.exe 94 PID 1232 wrote to memory of 1388 1232 firefox.exe 94 PID 1232 wrote to memory of 1388 1232 firefox.exe 94 PID 1232 wrote to memory of 1388 1232 firefox.exe 94 PID 1232 wrote to memory of 1388 1232 firefox.exe 94 PID 1232 wrote to memory of 1388 1232 firefox.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
PID:4888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
PID:1388
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD54ca3290a99adadde557930cd481d7539
SHA126034442a76131dd3d37c8f28b6e9bebc7c1fe7c
SHA256dd130c68dc36bcedbe51a6b8ec3b3358a460d45952f6280e12331f48850b6b3b
SHA5129341c60f92dd3f89f82555055924bdae6fcce1e4cd13a7dde5129ebdce04bae377292237a2ed6c3e7623b242e82b01c7ed1717af4d7db8ca473e9fd7b7b190d5