Analysis
-
max time kernel
119s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
27/06/2023, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.1.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
SKlauncher 3.1.exe
Resource
win10v2004-20230621-en
General
-
Target
SKlauncher 3.1.exe
-
Size
1.1MB
-
MD5
021b53abfc25a261077282498e5726a0
-
SHA1
ba7f38a28444504e6e8e1f995cc40ceb70ff6409
-
SHA256
c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620
-
SHA512
484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d
-
SSDEEP
24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{228876F1-1525-11EE-8729-CA9D3A953884} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0092fdff31a9d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000376c0b4d0fc806448c2c8b4fb3cdeabc000000000200000000001066000000010000200000007e436bc993493bb2cc2cf0444967bd89e10bfe81c7b7e1b1f873346d27a957a5000000000e800000000200002000000006a3d141e308bc5807cd766d3707d81ff9d7fff7f10b2c4fa41adb43382e6ff82000000095e1f08d753dea05bfdf6d64e04febbc37e94ba323053ccbc788de0effc631554000000012e70a2d213d4e2b3c476302eed8b985f88be810e460465c8b367381921d5f35c0fa5d3d9a1607ca6b0ac8155d0ea1dbf00787d1c5fe868299345ede8341dc9f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "394660949" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4102714285-680558483-2379744688-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE 1328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1108 wrote to memory of 2008 1108 SKlauncher 3.1.exe 28 PID 1108 wrote to memory of 2008 1108 SKlauncher 3.1.exe 28 PID 1108 wrote to memory of 2008 1108 SKlauncher 3.1.exe 28 PID 1108 wrote to memory of 2008 1108 SKlauncher 3.1.exe 28 PID 2008 wrote to memory of 1328 2008 iexplore.exe 30 PID 2008 wrote to memory of 1328 2008 iexplore.exe 30 PID 2008 wrote to memory of 1328 2008 iexplore.exe 30 PID 2008 wrote to memory of 1328 2008 iexplore.exe 30 PID 2008 wrote to memory of 1328 2008 iexplore.exe 30 PID 2008 wrote to memory of 1328 2008 iexplore.exe 30 PID 2008 wrote to memory of 1328 2008 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1328
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590dd799951ec2ed9763711616a4b40a0
SHA1f261721c6fd19df9b94a75a3c16dcea0ea014509
SHA256b686b9b97ea8e6b65a372df501e196c57a4511ec8097a7e451bdeba3282164d1
SHA512a01d665812ebe9b24ce07a5154fbffa7f23f51eea902375107a9333f8c4b329ba0d381e269257db2f2c8a991d6193d11804ee1cd019335c5cdafa10f3fe7f0b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577ceaf63eb5847ba28c549603703fbe5
SHA1fcb51652387b86d01c667069ec1fef959717d002
SHA25600a0f4494f1ec05093fb8a2a30be1413639dadea82a2a77203b92c5601388e7b
SHA5129a1596e6bfe56e55df26eff120e98542681497a418733160988b8f9740d9333893863360b82468277e6622ebbbfbbd0db2ea99303f60333b6396e53f3f21453d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282382a41033c356fe59813ea178f6df
SHA10035c3451690f0a95aff7d39904ddaea4e5757de
SHA256e09b24e845d8c58078460268be8942e331c8084ea263de8b849f6df371c86dc8
SHA51208872b3faf2cac2eddcc0d920c1e5e2f8d24361babbd629a31df08db537f17d53dabfed908144465e729e8753d091631fb9474dbe0a4dc33d59b103d09d2b251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54be0410d18d4def0104cc3960f3f062c
SHA15c9dc1071c249844ca5a79b752208cc5104f5632
SHA256a53b0b05b4673b75918266d7f851bba9e35253f618851b62f9a07abef8b0af1d
SHA5129760d9ea448f7a2b3eada23f25a2e0e988dd3eeccf3cd0b47c82b1f4f739421eced4277af3511940c4e2d70c2f31f8dca50401a8ca76b984dc9c0d64e131a9ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6fb534ef36e05031c16fce215f96fd3
SHA1c6d4de3046d37529b2de4a6aeff515fd125b4044
SHA256d2f0fbc488ae6c9d475d6ce8ed2ad2e368fb0b1681960b9ff7c743a9ce761d92
SHA512e664196a19da648f19565732738cc9d33229a6e1bb73ddddd2a2fbcb61a4d65fa1960896214f9876410dd8d7891e32144b06a8765c5d50d693abbeb664381c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f133b57371f403f740593ddee84eb339
SHA1e7e03f31a1c1221a2d7e1c58ee4a7ce5b73e999a
SHA256067bd1f497707f1505d2e14c41efa4a39e8af64cea17c0c663b39d335b540bbb
SHA51244688ecb5a19e16f81277fc05cbde1142324fb645b568cc0fa264d983cea9811c60d154edff25e57529789c14395fdd37b51262d45b5926d88f92f1878d29ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c79f8b88570c55ecad8a9c390e5d1f6
SHA1df521107d88cddec4f62dcdba30acbd8a2030a82
SHA256fba461a05b436bb43c12f22927290c68e8d7dc886c073cafd5853f78721b5927
SHA512df95720ef636dcf5879516f9cc748b239ef4d2d52e220305150bdc26a88092f0a4cce17d716cc0a336665844be897736342c994f9ced192a9ed3282894cf5bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7f5fe61f6b5eb7bbe3e7bf4d39f4b75
SHA1371020952f4b773a27ae5fa70308c0bdee5397dd
SHA256c54b18a03ceb158dcb007397d96b83692a654c7bebc37ce2ce44145ae184e3b1
SHA5125fbd7ce9d52734d69f329db988eaa0e23eb92039f977373f92284ef9f0d253955c337bd1e930205cfcdeff75617b5e774ee9b50330eb113f1f2efa2f68bf651d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d031c763c3d28aa852461ce947c474d
SHA12558ff448e0c996f39ae078d22b55dda36d4a1c8
SHA2568087e79a00b1bf0ccc0488305c5eb5190acc88268767ff3a40cb5a14e730bf0a
SHA512963450ed44afe7aa8b06f21a5873245da0eacdb38db9c283e97306de8997d29839c3be439c11a356ee9a87c7571856c5397f07b19d950ca55f942cdb603cbcdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5409ed196e61b810c229cc82ead994220
SHA11f4d45a2548abf93cdb611cc2a1afb0c7bc56af7
SHA256751dc22bd340fde2178e996d2c0c944bb8e531a60060574ca3c7784a33281591
SHA5120a9df66a1eeaf2bc3c287a925e34bad3614676d71b9f154db3cb8b1a4dcf875ca304dc308ac0ed281a6cf2ea6aca91a6e0d68d2f3f96f92f9721ebdcbd3e0f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505999a9bd17b69f4f7cc2789876005a0
SHA1aea9798c932b1d48445ef2c6dbbe3e961801e558
SHA256f8bc22bb7a1301f86d8f9594357d6017dac25771ccf369257d3dccc97ec5b820
SHA512a80e3b4a2df15c6296ebf269db387f848216cb72681760afb139ad602cb21d3f14d3c21705c1eb5b2d87717c34ec0ffe7409565bdf3ea14e2a413c757b717e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfadf0bee63d2e23f30e92100f781939
SHA1dd2cae680dd68ac0afa63de5157315d65149fea2
SHA25673036ceff5d012f75b63b5faaa0a39355bd6ec52d6d899d30a61fab65684ca68
SHA51208b605d0a108ab652d96a65bd6056c9a3f584a8220ed0614a408781969f070bf2611955837f87a06f9958ca13c74c62a638a727a9d364447df8f169b7596c5e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ca67549b9081a34085eb79360554e11
SHA1c796ec6ed3c03d86f2b90c563bc0df6b9dfe08ea
SHA25696ab6dec2a5cc8c1309cbdbd3daf2ed141c36c67fd2ba10b48750f83701dfd34
SHA51208d376b56fa4c8be022d4eb247d26fdf29f8e39c3f0da39630c34485bbf3153351d531c1d82df8e090701e350b644c65c528dfdeb5d9ec724476d1208607d06f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538d254275e10e3c18d20a8a9eed84c6f
SHA19cb2b71e59d70575762d0fc5db5cae29b27a3885
SHA256b8f7f2dc22c105593411ff4625b902cacdc77885c0a65bfc90c146e997b64196
SHA512507b6b79b6335470e1284ec6f616bf4fec9967b0b76227c76186625b6a003bbaea8dd6a050735722c4a4c7b43a710a6471d56ab259561f92527c72bbd0cea718
-
Filesize
7KB
MD50d4cf0ca0e25bef02cce375aa0878ef4
SHA114d7c65d7b027bb0a07ee39cde02ee10362f7e4e
SHA2562d3c258c69d2142b894fc389607f047d95677dec51f6ca8d0c7c85a4098aa677
SHA512effc519a8f323de725ac964066b0233267285f052228c6f9a6a633037c67195dfb7e8c1479bc3d5d223b66fa7849b002c281f21d43cbc4618fef7d0ff1abf345
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A45MYXV9\favicon-32x32[1].png
Filesize2KB
MD5df4253088bb850c76f81c91db284d4f7
SHA146e3e3c42a159f22038d86bf39fbde118c91dcbf
SHA256590d33ce64b321c321644bc8c840c354257371f8c247f776b788a5ce2c9bbc72
SHA5127804f8507d35adc2a3f65a4fb017bc50219fd2ee326693dfc5011cc9e22df61f50533ee7eb597133ac69e502683b7089df89735f03e11807a4724564061b0b22
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C7A8D1KQ\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD5af5279e604170aa7cf6d7314944fd973
SHA1afc1983ffddeff7d90c987b40d6ca70ed8b2411f
SHA25685c73d437282496fadd81e8bf3c0361a24cfbb0fce3489b5c9707e465f884537
SHA512f4ec03f6860a4877e0e4d6825f8ce09a3e788e8fc88121539bc73e174dc333359197790df4ff302000c71453c27915668ce95bffcbf3c278ec004f4365dba7f3