Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
12/07/2023, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SKlauncher 3.1.exe
Resource
win10v2004-20230703-en
General
-
Target
SKlauncher 3.1.exe
-
Size
1.1MB
-
MD5
021b53abfc25a261077282498e5726a0
-
SHA1
ba7f38a28444504e6e8e1f995cc40ceb70ff6409
-
SHA256
c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620
-
SHA512
484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d
-
SSDEEP
24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c7eaec47cb7afa4887efc5e3f3ae1d8c000000000200000000001066000000010000200000000ec72ebe87edf8f95cbf5b5df4f8b8e8277b58084005a3ee7fde2c7964e7ae9f000000000e80000000020000200000005abe3d4c23cf43302b90ac8d1b6668997508446421be5458ee885a32e97e4cb2200000003bb54d032d9483ff3eca2e5d5974a33659161d69942082fdef0a40813d31b7944000000083e4951a6c0e13038702ee26fe1f67f391caec64a07d384793db1f02531d3b644cf140cf159968a8fbbdfe3491d83a594d026a7cafbc12f1ca68118a01e4c5c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "395960028" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ed14a302b5d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA902A11-20F5-11EE-829F-C20AF10CBE7D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2644 2660 SKlauncher 3.1.exe 28 PID 2660 wrote to memory of 2644 2660 SKlauncher 3.1.exe 28 PID 2660 wrote to memory of 2644 2660 SKlauncher 3.1.exe 28 PID 2660 wrote to memory of 2644 2660 SKlauncher 3.1.exe 28 PID 2644 wrote to memory of 2056 2644 iexplore.exe 30 PID 2644 wrote to memory of 2056 2644 iexplore.exe 30 PID 2644 wrote to memory of 2056 2644 iexplore.exe 30 PID 2644 wrote to memory of 2056 2644 iexplore.exe 30 PID 2644 wrote to memory of 2056 2644 iexplore.exe 30 PID 2644 wrote to memory of 2056 2644 iexplore.exe 30 PID 2644 wrote to memory of 2056 2644 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a9f95ccfb8ed166a4cce49f28e5c4102
SHA1399da446e65d61834e62333a06fb60f9e43a5a54
SHA256b2c44ff3e2797999a9138cf06d5e1647536eee9f69c763e3143d33baa7d8bc1c
SHA512addf35f5e82adb0dfc38024a4ce26154efac6e697b596a4b1007dfa118d03ae7df27d5bb4e1a189918ca5796603bfdb16494870bd1e9132a80d775ff9acb9db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD563fc7c1f1c8c4ae7b6b8aa78b42a3846
SHA1360d85dbbccd10ea53fd4ca9c6aec0cc858aaf8f
SHA25670c81e0534ea2767899535b6357972f3250d58d166c09cd89a0b91834a3daa1e
SHA512d2b518cb37c2b585c21971c179eff2df4b00aad64481e58d9e25a3e38d3ef3fe31662faedada90d168bd2fd245ecc56aa728425286753c645e8eb90f5a0fad46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b21f7a8ed0747308018a895e66240244
SHA13d9d856d654aaaeccf88e77b71aa03fbdff89eed
SHA256cecd8ed875c5a2e581591a03dfb045d21179c39ce9448211ff3025a4b765a699
SHA512f3dfbcc2b5ea70432fd8be4302b84d6e4d999bde4ba502a60529c13278c333b6f17043e054208ff54a273cf6d07a0895994a2cfbeb21d68aff0ceb56d016ec94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD587e4cf515efc28355bf0d471803d0550
SHA1b80f36f54e4834ff2ff703bddd55d81baedb8efa
SHA256653042a8f7318c96ef1b87081887473c0b157b0de3a1193779390b2bb535e94a
SHA5127f2d1bf2086c18aa230bf2357a1faee8661f25ba1c52700f238c0b9b2824f072823afcb92e48412c71907a667fdf8a8a3b1fd9d5a57a4067974d3bd69372a5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59c59efba4d38844269206ee53a55662a
SHA1c0b795cf4f46c4a509dcc6ecd9616a20328a29e6
SHA256287bb171bd0a8728bc190374d4e9c215be595f44c280784fc66f86813b20c300
SHA5123b9eaa038492555f499cd097e189c8719d9aaee55f74d35d85122a7901aea8f2f558890e939671ee76598c1d38902d9084b17347db91aaeaef214741641276d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD568bd154dd76a7a433d9c6dedf4a5c8ac
SHA1ce79d041bb2a49177c5ee66e2d4000f7806eb87b
SHA2566cf611929337b08661378435bbd8cc6c341a754a2bc18d7bf00e0cfb39826dd7
SHA512f3c8a0b48f2f6f76d98d41eb8cdb72bb5752cfefd4905d0016e9ef20eea9c119df4ce575b730a0db29325a790874271e8db5faa6c1913505fd3243b91328fedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD521c073a6631f2e406ec3cb4bc3dbabfb
SHA17a100499f67c83c5749bcca6b85549d404c83b9b
SHA2560f7deb160462085130a366c9851c6ceca5c1f39d36fc75c3b5d5d86fb237794e
SHA51226690d2220a050436882d670b7f2e0258e19a2e6af27696045d309d58004259c92f2ddb13860ae06b7be9dc585250197fa37491b56b8f145bb47985872d8ba8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD518c3b204fab0c546efec1eea98465919
SHA145b2f7f7897791e2a521be912747ade77123eabf
SHA25695463269f2e95fec19f275c1429d4062941db6220841ba46b767930c96a2c191
SHA5128c3952f0dba1d2362b136b0bc7dfcbe4ccbecff59c1aad4f1c77b47d99e9909d3be77ae26bad1907220b0ca1c858ded45edc7dd5d698174a6311ef2402154b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58520d07ae75c2d54810229716569340f
SHA1dc5a93649cfb6021c8cc263fc578a59b1325ae2d
SHA256953213f794c55fa91386515ed8d0684bdcf43f60307a7971c5199011416f14cc
SHA512a927f6fffce24fab3edadbf610dac3d41428341bcdbdb3166e825dd7eb89ad38875b770852cf72fce560dc314280ac02277bd41172b1d2bff64fe69ab43a5a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55f6ccc7699f3a461b21e16af33650697
SHA1b34541e8fbccd6ee748982f9770c473fead94588
SHA256bfe550beb6a6f127a46941cafd178379b11930f074324a816b44a9f175cd3dd5
SHA51225a229547e6203582618bc634785269df5f79e5f67fde7113413a73095dd42ae3953550dd00e8593c7dc6f80cc334e0c3151e424f8dcb101075e67e5b33ad05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57e24ec122db04236659931a509b50248
SHA16a6811b2f4ca10f444d4a8fa7ca70a5179ece29a
SHA256adfc2831f7254418d9e78b1c72dcd89ce1b637cadd0319ade3338c0f6d820ae2
SHA51272f35c5fb348f85434634925e2b0c2efaf9c4ab70cfdbd19fc18b8c9c4cc1383067429a56455e7b555ffb5176aac58b1c0764d6a5a16fe4076d0908d9e4f0ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD518d86e35dadd1f538e8c7d21ceaf00a4
SHA1eb0b591ee1106a3ae939b9ceaa9158e2ed2f2c60
SHA2563c34bf5e4b8c1c585bed23cfc13f3d34762c78e2fc4773446fd2b9d91d246370
SHA5120973de038dec9da2974cbf5c5a7168ee3ca611707025662d42c13b7cbe1024be91450f882f7d02e2ce56287aea5bc6a3ec6bade157a8b65f6b8b8daaa05027b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f7be02b709ebdf91e46e1f3279cee89d
SHA16e06763d579d291a10b86fad7b0392b9e00309ec
SHA256d804748f22884407745b1b75d066030da2f8304f285925d6b04128dadcf7bdf2
SHA512dea0cb7bebbbac002eb1776cff470ee811d99fe23f6c4e559ad7de7f7d145083cd774a66d5251ee2330ebf18aa2f431335cc9f8614d5b2d7a17afe8cf3962bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52ec3755ee3ffddec36e052c8492dcf93
SHA19b8b206036434121d25ac6e7b5ac8f64ab6395ab
SHA2568c4b648fe3cdd523086eee1b6654664214452f60d877456d8df6a8e5463a5b30
SHA5128efd999b7623c48e6eb647b3e638fa7bcbd0baf06359ea22da6e54ac24807841c6f741fe7a9d613c5b2d6665c4c962b5f3b0a2bb2f66824be4791ad1a1d00987
-
Filesize
7KB
MD5b918db2ecabd2b8408bd3cbb3e3b8486
SHA1dfdc3aefbcfa48f3c5315c474f86accf7b34ee82
SHA256808ea175271fa815221b92db100bd7c1200ac9cee293388f08b7576722ed5406
SHA512db93110d19a471305e539de7b13de83369d0f166e0bd4d98cb96c9943ff5fc2291ef02da59ee176857168f50d23c383bab646aab4f26967bfef2fec7b06950a4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8AJTUMOT\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H1823X4Y\favicon-32x32[1].png
Filesize2KB
MD5df4253088bb850c76f81c91db284d4f7
SHA146e3e3c42a159f22038d86bf39fbde118c91dcbf
SHA256590d33ce64b321c321644bc8c840c354257371f8c247f776b788a5ce2c9bbc72
SHA5127804f8507d35adc2a3f65a4fb017bc50219fd2ee326693dfc5011cc9e22df61f50533ee7eb597133ac69e502683b7089df89735f03e11807a4724564061b0b22
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
605B
MD5d2784bd7783e8788c36daf080043baf2
SHA18a690073f21f188d6aed6d73cd430120fef1650e
SHA256167ff53f08cd711250641f5f4e717a244b649e360a2047f15e7f104545fe33c6
SHA512607a318aac4b024d03b7098264f84407116b22646fcd21dee7e8d04e03c0a29f7cadffb46a69438c58e941898fddeb7c21c26569db0b6c666c3e66a96f270a07