Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1624s
  • max time network
    1627s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2023, 17:42

General

  • Target

    SKlauncher 3.0.0.exe

  • Size

    1.2MB

  • MD5

    32c7e3347f8e532e675d154eb07f4ccf

  • SHA1

    5ca004745e2cdab497a7d6ef29c7efb25dc4046d

  • SHA256

    107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b

  • SHA512

    c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2

  • SSDEEP

    24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.0.exe
    "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1328 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:972
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:600
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x51c
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:688

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bb4fdb2a31e68de5217c40b62fdcde97

      SHA1

      c04d86ba668bddfdbc4502fe08b365ae000f238f

      SHA256

      942e788e0a6e971047d41b8856b4b57e7aa467ebbe977e588d994662f3895644

      SHA512

      cb2d854754c3763fd9b1fea19cff94821ab7bd12d7f48a9a16295f7233e8fa540c005a20a346a00b9e1783fea1f549da31f98220300331f74accdb6708d6ed6e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d217fe850afb08e566b74b5f865192a0

      SHA1

      4ee5ae037ee8b0e6900e5ac3a45780ae4aedf937

      SHA256

      f8f2b4d6566450a3b1f02a00573b4ab7a54dcc83f2008b35c36a1d2727d6c0e9

      SHA512

      406aa0b2321230fc98a5366e025967f7ef6151dd1beed776416d8fc6d959c99f5481b00b819f7bdf2344444096f53fe89e983e9636db77407e51a9b408017e0d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      39f36502a4aebf7d0c24b6f7c32844ce

      SHA1

      149a1f15feff0cbb33c2e1b4c6286d9f231b21a6

      SHA256

      0e0fdcacd22a753817845117856a38a1638d08b9305f29862647c3b123c1982c

      SHA512

      3731aeac0c3ffe689f759e96d1d27a9bfbd8205f9d7a3e63abcbaec955f89ea69085ee2976e737a2e5e846594a4e53dc8843c862194e92d2ebe0044e1b76a509

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2ccc9accbb62d9696ffb1b7283b2862e

      SHA1

      a8baca653fc209ad24aadd85baf9a727e935ac72

      SHA256

      b6a3b1162dd811193ea74214a67f98cd1a8c8ccee0a876dcbe6dcb3fa10895a7

      SHA512

      d0501365051bfc9b163a7265f57f73992e05c73335adc4a59578c209d88d3f091875e644132f9994c319d13e67f9db2eb485ea9353006945ff1c443f5af23aa5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      835dc07397120230420a55feac62376d

      SHA1

      667bf706978fe08d08e1f22019ec3bf1f0af3330

      SHA256

      c1492ebaf7a42d464e502b527b067bc052394dacbebe29fcb3b51528b76bc276

      SHA512

      ad47f569a25a8dad2360ce6f2e6c13d97ff77cf14f4fa75d321092aab6a1d802c6fb10eb206c07824ef44901d2b317ed718729af85eb905d0a4c0d3a5c2bac21

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3eaf6610321352ac4806aa496cedffbd

      SHA1

      b8fe97ce4873be48f1e46cde8a2048e5c3685fef

      SHA256

      449a0058f95148b568a3e56e9371502dd821bd172c8fd1d8ae7e970b97572ef2

      SHA512

      d1ad3814798d1cef407914d2ec75d91a109e4cd26c2241668074ab38fb8adac273efb0c800ce457025dcd3c3b03ad1a1701ede439a8f2d380059eed56807199b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8e988ca4ad4dc6d4e80d2609a3f1d62c

      SHA1

      0cea7f00fa0a232731ffe7ec1937c71097ce58f5

      SHA256

      75648d290c98ec7247ee86074b8781462ae952057c1a7a89ea08bf29b5e4c383

      SHA512

      f310fb916b0b636e741ea89c84b2b145152c767ff95f9b4e8e848ab83a1cd34a3b6acb81f6a497c4f685a311b511521ad6263e7cb3d4579e29c1df98bc4534ac

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a268deef39d303056a33ce72ce71d91f

      SHA1

      bc16c63d4f85b8fd71b6e9169a72a6589b410b36

      SHA256

      4bf2d18516ab2681eae67b69d768aa7cdb245b1800e9675d16d8581d3bf9d404

      SHA512

      650b22f14e264d471410074a11b3af458489000bda33b09b140ae0b63edd1fb50038bcc6eb054cfc0d3738b11ffc8e87561638fe443da0be09adcf4dcddd0e1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ba87e8cc0c42f72e8c093f4cdd01e832

      SHA1

      292db7ecc40f203968a620cdf07cee8d5b0ca1d2

      SHA256

      21275bce32fd3a94a92aa2cabb2e56baac87abaa04bdbb3084c2812d2f08655d

      SHA512

      1b40061202f0299e0cc741825471c6f6ce9eb2218fe86cb63bf0a877d8158b826303ab74b7ed7378061e8036f2cbb52db1e015521d94b0170ce1970f9ce9c646

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f51b04fb4ee9cb409cba8f7f52d6e604

      SHA1

      30389ba420d43a9040aeec7ad1e0e7d0981065ab

      SHA256

      346195110023f7b8657e6e158cd1a543f67547d2f21bf8b72a9d04c4d1e5c026

      SHA512

      81835f86507021f7ada05c5bf0ff8326e2d088c4b6d86e2775c85dae4a976ecf0cd74395ad73ae08e3e2649774e451bc477029c306e7ed369a4310e2dceaa3df

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6e4209d4bc71fe37630ef5cc8d9735b2

      SHA1

      e23793b6b1becf0d201dc6263d90d87303270d10

      SHA256

      3ae5b5da84c9b8e16c141a30d24a9aa57ae63a766b509be48a96e471f043a294

      SHA512

      0138f8b3285a8aded42e03fa913998f13ce336a164b2780fb805a2da68b32d52c47a8b45a18460d340f9c81ee5ee9f6e119e52f92c9feca03f3ae9944db4a94d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3192c94ef3b450cabef26cdbaf771254

      SHA1

      8b933dec27dd91583a65587e1adba73b5078c90a

      SHA256

      35f1c7a4c3400ee5fb730adc5e6f8127e13fd461c372632e43da51ead967e279

      SHA512

      3a35c76495b0fa84b31192eb49c8c2ca600508acc5fae092d33ecc8463af6566ecc5b3e47996b2476b216314235763ef07ee517303bd7ebf187f3b88ad2e31c3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      156db8abf3f334f03d9590f2e9b5a3e8

      SHA1

      a65def279a6154ec902842df7e350239a223e4d2

      SHA256

      3968de5af922731e692d6ff2fd053ace0ea400cbb42bb306e8725a6ef58e8c01

      SHA512

      236014edff1c4b10f0574034d57d03ceea7da8162fc7c5f2badf625565145ba837bd0d99647b8c2210e04ecd0050a01568ebda6e9f74664f60e96beb2fdc89b8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f0c2d76388d40b4376113f2ef7462b2b

      SHA1

      867794e731a7822114cfe6e8018c384f1811b7f8

      SHA256

      aabdb13bdbc1807676a1bd0d1897953ad382a775735887180d37531ac647dd53

      SHA512

      9714a4e93c611591575c51c74a65ac3915e6c4910b81bffa90c4bc459139e45534f63dccb8bb13fe995d714df99845c3092845265d73533f4ab6f065df7f7e76

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e1f17b9055ff2b32287633a1c5859aee

      SHA1

      5aeb9ec079528fab3d7e1a934d28380fd8e1670e

      SHA256

      bfe07b99ea4f1bb6e708b0b6df0202bef54b3772f71c7424cb0a256b729a38ce

      SHA512

      78ddde96af940b119c451421b7458c9345cc353831d078072d050800999ae2003b4252d52e399b77c1474578751c61875fb99c7e5fc8b17378b7c58c5663aa47

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jpkegi3\imagestore.dat

      Filesize

      7KB

      MD5

      f4c4c065cc2dba6dca6b7597e429c0ba

      SHA1

      8afae17c0f64923a7dce324f7bde0814db14ed4d

      SHA256

      c5f20600f98cccefb6ef01d665eda059ad3417b4b2fa73d9886c98100cb38bc6

      SHA512

      ea8574d19032c73e4a0ae4aea4097860d54ef2dec47eb91f138e0c743729bc599536699aba54bdb9b56606ec219fa73e90a55933b75b2900d2b4ddb2fd8782f4

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JN2GDFP2\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QHKTFKHM\favicon-32x32[1].png

      Filesize

      2KB

      MD5

      df4253088bb850c76f81c91db284d4f7

      SHA1

      46e3e3c42a159f22038d86bf39fbde118c91dcbf

      SHA256

      590d33ce64b321c321644bc8c840c354257371f8c247f776b788a5ce2c9bbc72

      SHA512

      7804f8507d35adc2a3f65a4fb017bc50219fd2ee326693dfc5011cc9e22df61f50533ee7eb597133ac69e502683b7089df89735f03e11807a4724564061b0b22

    • C:\Users\Admin\AppData\Local\Temp\Cab2DA8.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Cab30C6.tmp

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\Local\Temp\Tar3167.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\Admin\AppData\Local\Temp\~DF80230B1F7AECB2B9.TMP

      Filesize

      16KB

      MD5

      06adf7f34bc31395442e546dc00f6ca5

      SHA1

      aa125af52918fd2731b9772d09d4ef404db4ad56

      SHA256

      06e5c20a984b71a21b4dee43aa8b1b8bec1b22bd086b78e6b6b04e763555a486

      SHA512

      9be83580d86535df844e648e59d914a977a272f33b5c14eb1a7b85ebe7a8cc71a96492f569ec4e2c19da1e0c5c9e01f0c9f3fd51926588aaeb577ae7cd3258ee

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2HIV8UPM.txt

      Filesize

      607B

      MD5

      e76568ffaf91ff05c883fb6a0ed0229e

      SHA1

      8e36647eb0571f111ae4ed5077ea05ec8637b526

      SHA256

      b906cda8b8f2c676b703e91360834d793a2baf2be8ff3b429e8770eefce95b25

      SHA512

      2915ab33b4f51b6e3ce9601b8f85c1a1fcf70cc518fd4d82de95afbe9203aaefd7e1f6ca5ad09b6a010d6a4a1bc00e3f097464879b7966dd3991ad7d246f64a8

    • memory/1732-54-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB