Analysis
-
max time kernel
20s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2023 22:16
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher-3.1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SKlauncher-3.1.exe
Resource
win10v2004-20230703-en
General
-
Target
SKlauncher-3.1.exe
-
Size
1.1MB
-
MD5
021b53abfc25a261077282498e5726a0
-
SHA1
ba7f38a28444504e6e8e1f995cc40ceb70ff6409
-
SHA256
c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620
-
SHA512
484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d
-
SSDEEP
24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1108 javaw.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1108 javaw.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4108 wrote to memory of 1108 4108 SKlauncher-3.1.exe 81 PID 4108 wrote to memory of 1108 4108 SKlauncher-3.1.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1108
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD54ca3290a99adadde557930cd481d7539
SHA126034442a76131dd3d37c8f28b6e9bebc7c1fe7c
SHA256dd130c68dc36bcedbe51a6b8ec3b3358a460d45952f6280e12331f48850b6b3b
SHA5129341c60f92dd3f89f82555055924bdae6fcce1e4cd13a7dde5129ebdce04bae377292237a2ed6c3e7623b242e82b01c7ed1717af4d7db8ca473e9fd7b7b190d5