Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
26/03/2023, 03:43
230326-d9xfmsfd52 726/03/2023, 03:41
230326-d88saafd48 126/03/2023, 03:36
230326-d5wzbafd44 726/03/2023, 03:32
230326-d32rsahc9y 726/03/2023, 03:27
230326-dz36fafd37 7Analysis
-
max time kernel
47s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26/03/2023, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher_3.0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SKlauncher_3.0.exe
Resource
win10v2004-20230220-en
General
-
Target
SKlauncher_3.0.exe
-
Size
1.2MB
-
MD5
32c7e3347f8e532e675d154eb07f4ccf
-
SHA1
5ca004745e2cdab497a7d6ef29c7efb25dc4046d
-
SHA256
107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b
-
SHA512
c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2
-
SSDEEP
24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25A1C661-CB98-11ED-88FE-724BB54F6CA2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1108 wrote to memory of 1732 1108 SKlauncher_3.0.exe 27 PID 1108 wrote to memory of 1732 1108 SKlauncher_3.0.exe 27 PID 1108 wrote to memory of 1732 1108 SKlauncher_3.0.exe 27 PID 1108 wrote to memory of 1732 1108 SKlauncher_3.0.exe 27 PID 1732 wrote to memory of 1712 1732 iexplore.exe 29 PID 1732 wrote to memory of 1712 1732 iexplore.exe 29 PID 1732 wrote to memory of 1712 1732 iexplore.exe 29 PID 1732 wrote to memory of 1712 1732 iexplore.exe 29 PID 1732 wrote to memory of 1712 1732 iexplore.exe 29 PID 1732 wrote to memory of 1712 1732 iexplore.exe 29 PID 1732 wrote to memory of 1712 1732 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher_3.0.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher_3.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1712
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577e7c171e73e32229b3443713df635ba
SHA1360c97f6aa5198eb38bd5b507108d08aea62dac6
SHA256e69e999629f5c1359f00c41efa6ae1f79e5faca2c256b4add77bdb5ca98b669e
SHA51215b7458da8af76d875040a68411c4e6cfb65284010fd7589818c94e2a6fdb49da3ec765810b83bce38cdec0a0e35f77367a944e350419d6290e029218c62b4bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf9a275c8bdc0b98bdd8906126455274
SHA1ecfc7ef2cac835873a029fd5f37e87a93f4e76d6
SHA256e031ac2240349039a3d41411b498e8aa1c937e32c59fd2ed6f286d1212f49cc1
SHA51252c8cda6e0dc6eabdef1c56570ca48f176f600aaaaa314787f8c89aa3df8a28a66542336f6226655faac2e04893a7516e4aba4063d2cae2e10000bfe607c3529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf7721496730b32c9dae2db67a5cf562
SHA17e92b5ca68b97eeb0e2dcd3778f4860c88bee59d
SHA2568251fb9206336539f7aa41e100935dc69d8f7c34fe226e8d672292fd802eea30
SHA51295db5f839f947df6f1dd37064960124eb2c4ccc18dbbeecdcffc2553f2eae6ca3b4ad85c443ce8e69091096bae5fcb6fd05905167174a8ad43da0b7085d6cb51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffb85234f8b9b33eebc918940952b7f7
SHA10fc226bfcd946914259406a892077ae47d23e51d
SHA256652dba0f05b065994cb9d2f14317b3884a412e8ceed2605623fb63d111406e93
SHA512ba5aa60bbb51a11f5ba31fc052f41fe1a936e77f593c9e68522f74ec8aa35d2245972dc6d1882d5a822a53c1ad252b47d27beaecdee34d7d6d26524345f51e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531c304c13ba054d5e20c199c9679208e
SHA144e7d2b025df465614131e065327fb1c663b0abd
SHA256132d4ef61270d15359ee68138be207b8dea7cb6a9cc0736314cb2e3af2cd72bc
SHA512f1aa829da3babb5a986139c02a150fe772f02e31690a3ca51f6e0db08f216ff7b22710109f88d5e51f40162771ac1b9977f8a85c1f3f57c0217d116cb96b6fc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c58f16a6fa713ffb49d97fe60b04fba5
SHA1b2b2cdcf6d1ccd5925ae70c11f2182de04309f2d
SHA256ec6bf72b9bb1aae261eac4af82c5718f9a098c4397d7db955f3ec6846fc86abe
SHA51244130eb6d91e628fb28d37c604b9f3b62c75e8e4124bed44e29d7c13b7bc73be784a372e13f071218b1c58b9cc0a65eb00ed5fc17eac870e281f3c07c86816c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba62ad424bd76c0a949f7bb720af17f9
SHA1ac860a0cac4167606a8f16a34ac63942fd850314
SHA2564fef9612905ba1f2bde1501ef19402dee77bb8396c50d298e875b23c1c7ab3a3
SHA512a42651d56687149fa4164e2fc699fe49028e5c54ba49733d1de68a37a4335d6b3bad87212f6d8463f159041cc0c24f16578ac27f2bcde62320c06d055629bda8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c68be54056383d31dbc794b855bd99d0
SHA1ec15f50c043cb6190db03878275dbb7d48059a31
SHA2560dfb4a8cea2930090c3919af6ec6f0553e454dd8db0b3d0812d4f66e4a08ec83
SHA51235187e3efd3c9528e7ef1872d2d3509ab9bc58debb2d0239beca3503a6d7215c4445bf61cbdeca0fb3b88ba84ce3493b165ad1c20ba32a3d84a4c31114c9d4a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c18a62c2e94dd4c8b1e0f503e844999
SHA1043a0e75e6c9f32f61a2753487adb9a4c089adcf
SHA256b12df9e66bbd400157a959f63dad0fb8022e5ee2bd019683cb8313f2dd130f55
SHA512d629d6a13558d15e13b572080299eb4a6e9c3da98ec26538401b879d3d3f336bb3f103952dd30bb32d4c976dd7bd2204446b938e76e03b697a5bf0efdd2640db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3a899218007169cffbe636f2bc18d58
SHA151aa25b5d514de7d9a0f4826fdaa47d4712b2c01
SHA256b4c349fd6f39b6ed661e209c94a56318b039d01b9419dc70fdaeb55c862aa2a8
SHA51277208a79d99985fd7453fde6b74f0efa0255602211e9d5d23243f30b83d44648e5d3a9f4585066f9d6fab37310f035c48b7b53e15ed038aa3b8448bf38df6db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8bb925c8449e5d3be9daf247cb059b4
SHA1132d511902d776a33b73dfb2aa823e2b77183318
SHA256ace9baa139583654ed0fd2882e90f1b63dc0188c0d9145d34ff04664bba0004e
SHA51218a6041b81aa4660dbf79d7e3373c8e301ca48a4098665f360439bd67d74abcc0787236d14d2417ec381559f0e28c03eac859d96b5b63e9e5f915a500b7d2254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5259820f483b519bcaee0b3f20bfbb647
SHA151722c5ec4301821da4c27c2edfffd9857ed2332
SHA25670f15e9705e3f715f3c4e44b399809b66be1e5a614d280b19e4e370751abf454
SHA512e986c42c528a1b66b61ed93ddde4f64cb29a4575477370d5411ee8f569347c87155a20c81cad47f443dc38d75554fb7de6a58a1e77afad1e3715c46515f2a43b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51069b50168cb9d25be32b90184fde1e8
SHA1fb0a3761701258843d9928fbd3eeb3bc17286eee
SHA25662250d7187ebd3accb8145e19d5f5f81bbc68621aa719bb82de62c4593da62cd
SHA5121832169e5fd5fb48a3e3ac5463bb299209840c513278b9daf898a33637a855cc7cde38dca0934b0bedd66e8eb7fd4297d60fa201593a16731aac4e739138dab9
-
Filesize
7KB
MD5a877afff927170149dba2587da3dd159
SHA1ea5e9c650aefc9268b9eb864e6f3dd2b43269b26
SHA256459a270af19f03b654657992b91829bdb04244751c27d7828b43b7545c0d4a0f
SHA512f69ac43484e04596450977dbeb631c3bb4a8fb5b3c0496694e63ab3736755b7d3e1a58fdbda84566dcc8497b09d1774c25e6241057e4cfc7199c96634457aeb8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\favicon-32x32[1].png
Filesize2KB
MD5dfb98b35bec083cddf7e575ccbc12efc
SHA1f77c5e6f37aec582c5977a76691f992e3ebc3a05
SHA256f053cec8f37df661ce13646ff5ecad7050bd50c4afb4f7ad12cd252577207e66
SHA51217d2d675bc677f126fabab826b4fc79a05eece52cf586a97b7d8093dc402d0160f273fbf9d38978f01befc9f85a979208c2355cc0a4c129a2232ffa4554961ef
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff