Analysis
-
max time kernel
110s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 12:16
Static task
static1
Behavioral task
behavioral1
Sample
KLauncher.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
KLauncher.exe
Resource
win10v2004-20231215-en
General
-
Target
KLauncher.exe
-
Size
18.4MB
-
MD5
d2f7939c25f392e000f9731bc67274b3
-
SHA1
70e0dfc92605340267404be5c05476fbeb00b9ce
-
SHA256
891a3528b807f283a98d6dd92b5b08cbb42cbbee4c48f61816edf72adf7f4c95
-
SHA512
fc30aba479d2f7bb09eeaf0209acd0f82ecf7d0b8994c7fbd7990393aa4b40f5349ffd12af7beeea2092ae73071470156bef2abc2c9b17e56d881b0761795d0d
-
SSDEEP
393216:jHOsugDBfcbVnMJnGrT8t+7vyE6tL8a10Zh4pOsrKadFu7xmwaMzry04PcMx0C:jusb1c6JGrQtQvyE6D10Z2ksq7xvDz2V
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4512 icacls.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb javaw.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb javaw.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 3408 4404 KLauncher.exe 87 PID 4404 wrote to memory of 3408 4404 KLauncher.exe 87 PID 3408 wrote to memory of 4512 3408 javaw.exe 89 PID 3408 wrote to memory of 4512 3408 javaw.exe 89 PID 4128 wrote to memory of 4860 4128 msedge.exe 110 PID 4128 wrote to memory of 4860 4128 msedge.exe 110 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 5084 4128 msedge.exe 111 PID 4128 wrote to memory of 4148 4128 msedge.exe 112 PID 4128 wrote to memory of 4148 4128 msedge.exe 112 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113 PID 4128 wrote to memory of 4940 4128 msedge.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\KLauncher.exe"C:\Users\Admin\AppData\Local\Temp\KLauncher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -XX:+UseG1GC -Dfile.encoding=UTF-8 -jar "C:\Users\Admin\AppData\Local\Temp\KLauncher.exe"2⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:4512
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultef333be2hc759h4078hadbbh3b6cc44ab1521⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffb5fd446f8,0x7ffb5fd44708,0x7ffb5fd447182⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,3086992510440891658,14223270328229531990,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,3086992510440891658,14223270328229531990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,3086992510440891658,14223270328229531990,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:4940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4840
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:1052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD530cc69c9589dfb1a6089d69d6e9f3850
SHA162a53f5582f2e4f7caa6606ed12c079fd9a33528
SHA256ab4c5e9fdaeb70ee7da9c58691809fa82b982e7572b1af1a8230abd64ddfc9fa
SHA51298352a4a4c299ce106c74f78247e98ebe131b7e2c6c4dfbe416676be75608abd283b58f064c6d5f19c9627de52a0e418903ac853fe21423b98607cd57ebb5ebb
-
Filesize
152B
MD5f246cc2c0e84109806d24fcf52bd0672
SHA18725d2b2477efe4f66c60e0f2028bf79d8b88e4e
SHA2560c1014ae07c2077dd55d7386cc9cf9e0551be1d67fe05a6006957427ae09fec5
SHA512dcf31357eb39a05213550a879941e2c039ec0ba41e4867d5d630807420f070289552d56d9f16c6d11edcdb0f9448bf51e7d2e460e88aa9c55a5bfe5d8d331640
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD53f1d78d034871aeb6c50b256c67f7e32
SHA13445c96da375667b1e5f680afca108e3a2530cd1
SHA256fcf11e7a5ca96a1f56c3de094aed28f3fb73cdc7ca4295f6160aa11c22d5dd2e
SHA512cb64b5bd34a40fe6024af60773f482406404cae5f41b8ae42b00416351112aacc60164fec1d72857cd4d351e7687b56102adfb8e45cf70252de19a892b21c4b0
-
Filesize
3KB
MD5b67ad202cf104b87ae16111f440f74bf
SHA145a5091cd02a845a46de1306797aae0f7794cc81
SHA25672c5fafe00212c9c611637d60635c976bd4b1409f75b8bc09be23dc86c2cb617
SHA512cd4fc8251d8bcd55a35d998095978f65c5aaee940b3edc8d884d094a460bd5f2248c45b252b5f26493334d9aae09bfd9ac3c55ddfed389a6cb974523be0c8165