Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05-07-2023 03:22
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.1.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
SKlauncher 3.1.exe
Resource
win10v2004-20230703-en
General
-
Target
SKlauncher 3.1.exe
-
Size
1.1MB
-
MD5
021b53abfc25a261077282498e5726a0
-
SHA1
ba7f38a28444504e6e8e1f995cc40ceb70ff6409
-
SHA256
c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620
-
SHA512
484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d
-
SSDEEP
24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395292344" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37613D51-1AE3-11EE-944B-4EA296F4CEB9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cacdb9c8f7e7d1478a5f6d5a6cb4c290000000000200000000001066000000010000200000007188989921e5d65a0aea8f53d0cb317f40737d06a192fc25b17939889bf88677000000000e800000000200002000000057e684f0289323e78f4a30547bfeef24c35cdec1aca6f3092099c652db9c1d77200000006fc598a0ba5a3460404c38df5dfc92df192d3e8d84792170aaddb087bceeab784000000014e1ba510f079c3bc75ee4616a56faaa9443b3226f4c4b375c56f5d555f4ffd7ec6f1d1a1d7b61c5b4fe2e5eb96277c5459834c1f51e84b226478971ca7699d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a13e0ef0aed901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-264077997-199365141-898621884-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE 1368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2240 2136 SKlauncher 3.1.exe 28 PID 2136 wrote to memory of 2240 2136 SKlauncher 3.1.exe 28 PID 2136 wrote to memory of 2240 2136 SKlauncher 3.1.exe 28 PID 2136 wrote to memory of 2240 2136 SKlauncher 3.1.exe 28 PID 2240 wrote to memory of 1368 2240 iexplore.exe 29 PID 2240 wrote to memory of 1368 2240 iexplore.exe 29 PID 2240 wrote to memory of 1368 2240 iexplore.exe 29 PID 2240 wrote to memory of 1368 2240 iexplore.exe 29 PID 2240 wrote to memory of 1368 2240 iexplore.exe 29 PID 2240 wrote to memory of 1368 2240 iexplore.exe 29 PID 2240 wrote to memory of 1368 2240 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1368
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54744e6200744488da513e1b59985a6af
SHA176c76d22928eb9540f650860ade110adc173fcba
SHA2563642092f1910fc2c656333e2c861b8443caaa746b2dc11d75120e402c4eae41e
SHA51201ed343b7adf70b37de66bb84fda5fcd4ddd4fae638eb3ba01ff47e4126db43488020564a19b7bc3af8a43669a15e3c96468d4f05de3ff67d8bcbf327a1e7648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520a9ee2022ea959aeb06f676a0c2c0f9
SHA16ba3422927bcd282c1238fbddbf2f498fa619705
SHA2560a4dae4b8a1b839292949851a86abab2f0eb0f4f74b54b65075822929dd613bf
SHA5129a9d4a0f25ff0f6f82c0d1f3d7f5793e52af064f23c36c4bf5359f6ab58e20796fbf7e4d37faaa73d93bf3e16e4ad4f3c510066304a9c8cda085c726f0d79481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0cb6e60ac590634966c98df59f7aee3
SHA12b7e10b55aa71a9b683dad75cce62946e3085e4b
SHA256a52bee02df85692d9a81b9100051eb0eb12687211bb5f1abf81f7c94b6306512
SHA51257bf5c2c7a05d3f3b38db835bead883f4c70b473c8e1c548271908a21d33edd369b899b52ae2d21d1aaf03a17890d658293e01a7b439f752e4b516dd42165727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505519892aa6cce71b3f6ca4418c146f1
SHA17cbad5c8bbfec901837fc97538f13ed982674e54
SHA256dea24bb422865672104c0b057e480316e41cc0e30c1e1aca716c1ebc88a6afe0
SHA512dc5e00b05abef52625082cb0df49b1a9842e3c0178ff39980e35eee25832ef6e937f08b8253c63fcc5f9bc43fbf05d3ddb4cabce2e6440c10e88cbe5b516e253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59febc47c6ceb903a7121ec24c1632dc8
SHA13f34ae9fd2f96d6b59049192f558ee7bd7fc4892
SHA256aa684ce860036540bad7e4558582b1e7a60ddc980f3b15259da08510043c8581
SHA512a1da40e0b6dfebc8ef37856212de5991af83275ea0f81b9358bbc7154588b5d3b5eb46aeb745aa3784193863d15e9e278bdb727a38141a9d5d1c367963ff3852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc5d213125dbb0b37456077b21529362
SHA1fb7d87c7e4201303f40b43b23233cd93cfd477f9
SHA256f7e89e3ff14247e4e2633560deebb735c076591b85cf965bca97aa3871b03968
SHA512cd60d3d0ccd87d1b8fd68522e13477e7cd84edbd5c048912a921f7fa9f4d86fbe514b0c8a22c14c7ae4f211271171a9a719b3abcc15dfa4e09e48f0d4b07248d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5043ea0a172cb6a86d332a626294aa3b8
SHA13b345ddd51e7ae2bc7b6d806391e405a25a6ab3f
SHA256f622215f5e6f3c05f9724e6deebb93d9db9ee7fa6fcf165def63e6bb0ff8e0c6
SHA512094a43bf0ad0839faf84595f072c86b8a4bff331e7ae70409ea43aa5e08991ecdc2baf3916d379abf5e660562673e1807cfadfb95015464e9ec0cbc744e88078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e7b0441b2ad738e9f480d6488bc0779
SHA1803546fb1a5a51bca5ba4a7ada4bb434e2d55167
SHA256adf8ec2e55d91e6e8fb3102e3b85e0e4ca20e3e007206158983a70000a124e6a
SHA512ef3ff61d533b15b20b113b78e842ae14ac46429868ca6f4521ae901da6dfcd4c7ac3a77f6735027c117118c781ab008ce14cb9be22a8bb4d1ccc5855fa3dd2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b95d32a99985fa438cba90a61eeae483
SHA1f8495b03b73879c3f272ae47afbaa5a8f78b1d0e
SHA256ef53a9d8261840fc7e4b3d3046f134370e4b7e0df0010202bbd59f9c9b9c8ead
SHA512ce99c1005f3b0ff4467cfe6c88aef32e754fd44d49088aff8caddcd79965e3b2f9631d8403d9e9a6f398fd657d772a48f0d517fcc507d1497786e6a8f5a9d856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e4e855306f7264ab7ec04e9d8d09f0c
SHA1e39a3718f734a7838a0c36df24fe018c1a2f9136
SHA256809d8b662fc773b67deaa3f80195008c5b2c2f79309ad4403552509c68096211
SHA5122506b97ef3ffde71c46f8d61cfe62c8fde92add87c16e4ff8b867fed2384844169e010ad397ca4aa1c14768efa93add7157f898bc1bbf5ef82e789d3df552cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59004073ba5c07cf92a5dac8673adedb7
SHA1da411bbc17dcbbd11ab2bdeda146d3185f82f6c7
SHA256f3da2646fbf21eed7d4ae9a37c749875f8049701ea3608ca65e0b4251a09025e
SHA512015b240c254371cc486e6eb08ae9b084b19050f513fb336b5b977150c6a0c1ef842e7c30e3b2c45c3c1c6b88d16d8dfbdcc09e5b57b4a6fe6f7beead48ddbea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c65445aa1cd7771113e548d0386d72b
SHA11bbae4ea8ae2c19b486803e8b8e5f610828ddc7a
SHA256448f17aae1415142bd40907298f8c4de958ef10704cc5753f1ab59a31c7a3bb9
SHA512157fdebfde93072e581a089b91f6ddc57ccc2dc1c402da02137bb7e9d3f98897576e98cc3601dd6ef3fa98ffbc90857f3380118e707d2276cd392006225cd189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597e1b9f5f16875fabee67e1276d8bde9
SHA1deb42dad73d22de9748fc4792d80311b37f35956
SHA2560e554d5e355feb4dc6432fc6403e3fff658e2a112a12b9d9135e7d0bd45bd4fc
SHA512bb59771ac362598cef6d8eb999303586db464675c0282bbf4a02da56c8c4c9f6ccdcc9c240656ca1b407b8470cd382ffea0939e48293346c25e701b9ad84ded0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526d23538ab85a7207f5ae0e6e0a7fcfe
SHA1b3de49469fdc8c62a7a520d9e26157f7f03d528a
SHA2565b8382b0ba802a43e83dcca4e0fa080871c265c852496c427a754cebafa97492
SHA51289a8545388863426296484d41d78ffeefbd668fbe57c26b13d2c242c5144c84c7830b5b4723d56508845004326fd4270c5eb9fc3d2c1b82baabc986be07f3ec8
-
Filesize
7KB
MD5b26c9dca69933f6c3067c0714527c103
SHA1f0f9a8f65a01ba666e476f1118ff67fb95ee58a2
SHA2567d53831f49994e4a05f4fbdf08412c030d88f1cfad8b0ad40a86071ef2b764cc
SHA51214d230264b87713d0172989329994dd88b29f58e614b7581faf7b0ba3e00e1a54401d5dbf697fcb9285b201da905824beb5409cd624a6209ce18a85b4fad62d2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KX3UJNA9\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\V6CQZ6HZ\favicon-32x32[1].png
Filesize2KB
MD5df4253088bb850c76f81c91db284d4f7
SHA146e3e3c42a159f22038d86bf39fbde118c91dcbf
SHA256590d33ce64b321c321644bc8c840c354257371f8c247f776b788a5ce2c9bbc72
SHA5127804f8507d35adc2a3f65a4fb017bc50219fd2ee326693dfc5011cc9e22df61f50533ee7eb597133ac69e502683b7089df89735f03e11807a4724564061b0b22
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
603B
MD5d3d65b1a99d1587ec701219b37846218
SHA15d9d45d602b7baf57eb69b33747178c14d79e816
SHA2569ebd2c7af70635e40ab5780f65dc60dc4b83af73687a8b6d8031a4ba95610eb3
SHA512384dc83e50d82f92ee1aef526c969711d35254f9cc80d995939bff7184796d469ea1c1753138d90355b27c834ef063642dabf851ff13df22b30dc289d885fbea