Analysis
-
max time kernel
1759s -
max time network
1700s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher-3.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SKlauncher-3.jar
Resource
win10v2004-20240226-en
General
-
Target
SKlauncher-3.jar
-
Size
1.1MB
-
MD5
7454d24ae19035309ab3eea108fbb777
-
SHA1
ce3dbbc97a10cb7d08d4d8af4a245f148efd5b11
-
SHA256
1293a729057dedb90d5271621afbcd14b38be19b2a31570a330e2ebcb3eb1bb3
-
SHA512
1c1ae4941372312739ca53b1473288a699f7161ff48936d9b602eae21bd98474112dca548f2e4f6b4db40a2680caded4560f9fe86c655691e8f096c1d705ec3b
-
SSDEEP
24576:udAL7aa7IXWJ4FCDzQvrmqBqAXxKhd1ODQZ3z0Ix8GbjOaHmeBi:mgFzIvrWphdcDQZ3jx8GnVGeBi
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 412 java.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3852 icacls.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\server\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\symbols\dll\jvm.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\dll\ntdll.pdb java.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\symbols\dll\ntdll.pdb java.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 412 java.exe 412 java.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 412 wrote to memory of 3852 412 java.exe 91 PID 412 wrote to memory of 3852 412 java.exe 91
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.jar1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3720 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:2124
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4216 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:3540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5dcd68a87b7e6edbcfde48150403b22eb
SHA128e4839a29725075772fccc39b44e194eb91e477
SHA256ae3352b6ad6cffaae55f4387f9f5e79365ea17f8d5fb45ef11d21c3300a49a4c
SHA512ac2a6bc0afcd08c56090536a937772edd54f35505c9a5837d9bc8e91c31edb6137cf5191986b3473e9e2f512950b4dbfe4088598bfd1faf47088124c70aeba71