Analysis

  • max time kernel
    779s
  • max time network
    528s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2023, 20:50

General

  • Target

    SKlauncher 3.1.exe

  • Size

    1.1MB

  • MD5

    021b53abfc25a261077282498e5726a0

  • SHA1

    ba7f38a28444504e6e8e1f995cc40ceb70ff6409

  • SHA256

    c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620

  • SHA512

    484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d

  • SSDEEP

    24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe
    "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1884

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\flatlaf.temp\flatlaf-windows-x86_64-4844431550000.dll

    Filesize

    21KB

    MD5

    4ca3290a99adadde557930cd481d7539

    SHA1

    26034442a76131dd3d37c8f28b6e9bebc7c1fe7c

    SHA256

    dd130c68dc36bcedbe51a6b8ec3b3358a460d45952f6280e12331f48850b6b3b

    SHA512

    9341c60f92dd3f89f82555055924bdae6fcce1e4cd13a7dde5129ebdce04bae377292237a2ed6c3e7623b242e82b01c7ed1717af4d7db8ca473e9fd7b7b190d5

  • C:\Users\Admin\AppData\Roaming\.minecraft\sklauncher-fx.jar

    Filesize

    14.3MB

    MD5

    32185a73d865f69bc134fe7bfe66bcd4

    SHA1

    726fbb3b979c12d13f5418343920e543d076a32a

    SHA256

    9da5ffbdb5c362810cafa159ca7bca93023f275fdea4aed63b9db7996a383146

    SHA512

    ad8f31ea7e433e2a77931f892928ec2edfd2b50725033472306f8bf8a5f121246ce74b5b2e4f45c0ea17c884b747cd57cb16dd960a22d66493e30086e55c116c

  • memory/1884-222-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-229-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-173-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-182-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-183-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-186-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-202-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-205-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-208-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-233-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-148-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-144-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-209-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-238-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-252-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-254-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-257-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-277-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-285-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-292-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/1884-296-0x00000000009B0000-0x00000000009B1000-memory.dmp

    Filesize

    4KB

  • memory/4680-133-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB