Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
204s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08/06/2023, 00:20
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SKlauncher 3.1.exe
Resource
win10v2004-20230221-en
General
-
Target
SKlauncher 3.1.exe
-
Size
1.1MB
-
MD5
021b53abfc25a261077282498e5726a0
-
SHA1
ba7f38a28444504e6e8e1f995cc40ceb70ff6409
-
SHA256
c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620
-
SHA512
484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d
-
SSDEEP
24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{617815C1-0592-11EE-B8DB-D2C9D0B8F522} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000eab838815e75245a03b397a1d9edd6c00000000020000000000106600000001000020000000022d68db12bc9525b708cbef454e1b121745f9bf3a282d72074f9473eec24bb3000000000e8000000002000020000000f8d60bc35f337422ab94c7ab795e67e1637be1998d9a929c1fdb9e588d1dbffe20000000373c366b1770f6fd6a47777b29fb052d87f1054b1f419c35030c67691345e63f400000001393e4a145c46c52a67f53261e26848c839f0186477f1a7f96eb05edba4393beae7bed6005dd9df7eef4b7811dd1739f363433e33bd0748d9ef383be52d7f7d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f61b3e9f99d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "392948651" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1676 iexplore.exe 1676 iexplore.exe 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1428 wrote to memory of 1676 1428 SKlauncher 3.1.exe 28 PID 1428 wrote to memory of 1676 1428 SKlauncher 3.1.exe 28 PID 1428 wrote to memory of 1676 1428 SKlauncher 3.1.exe 28 PID 1428 wrote to memory of 1676 1428 SKlauncher 3.1.exe 28 PID 1676 wrote to memory of 536 1676 iexplore.exe 30 PID 1676 wrote to memory of 536 1676 iexplore.exe 30 PID 1676 wrote to memory of 536 1676 iexplore.exe 30 PID 1676 wrote to memory of 536 1676 iexplore.exe 30 PID 1676 wrote to memory of 536 1676 iexplore.exe 30 PID 1676 wrote to memory of 536 1676 iexplore.exe 30 PID 1676 wrote to memory of 536 1676 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:536
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566bc10f5a9be4e06cacdb0c3350ad1ac
SHA1b05329900f7df5c232257bf25785b6fa59ec2fb8
SHA256a8bb0a60cdcf0cbb9f501b7983223375d7691629a0c77dacc7e7346a103b3984
SHA512b525c34db6a36cca63e5530a13f86193d1ce82567f306a9c6e0ec0bacdf4d458c25641f625f8e431e45e855378baa58aab980a21a3b102cebc5ef29a0f4ddc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cedad6205c29e48fc074e0cd23b6b5c
SHA1f19c91336879a9e559bce3d3832b1962db74c7e7
SHA25642f4e4824bb016817830999c6b7d9c5f9acf9062e75fd97596a94b79df7eef5e
SHA5125b0a2a90863307b53bc0947b3b50ad635eb59b854d568b68f4b05f1d9766480d91f1b661be1366caeba920b312f55033323c95a1832f84d751ef37d6dfc36032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc6c47aca91f252c741612d3030d27bc
SHA1a2e7a31f979817bede97dad93854c4632d023d8f
SHA25639c4d2b8f1c477cdfb6895e84a8028e373a5bd03d6436febd2fc5cdb921513e2
SHA5128e9428487aa8659bf77a11afe1ee9bce05c95615467b160df181db0a057a633ad3127d9f4f0e083bf41fe4333447dc0b0c3444cfa96d5b63e059b6d829a2384d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55898422c8fd6203cf2b24afc811e11f9
SHA159235a3e2dace309831bae685d3c23a9d182addd
SHA2564259bd4ce0536b26d46105fc2fc4bf59cb4b34dd81e8cb98c76cc1ba85d85188
SHA5127918bbe60026bc8c6f7b1cb51307dcf0b8cde8895e13836ad707a7873e74bd577a002a5b8dd5266cc1518977c7aed95aafc11469b38f9a2e3525cc71c3ad460c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ead48eb041c950b5848822eb1e583aa9
SHA1a0f56c89750c34b32cec747bf1b6c69048866f2e
SHA25627e41224bf245732721058536cb63a380d90e059414af969f623661e48039bee
SHA512cd2df99a9438eb2f47b76b5115bab33ff242868e9ac4311819ca7572646384ad54d3d0cecd6072f02070a8b049fabf5bb759105a8f8ea353bca3dcaca2388c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d52d37231653e22ce77dfdbb1977ed6b
SHA1059a5ab6386eb2c46aba28fbc13439a0f4ad2f8e
SHA2566b62ea7b46b36d54a0b8fce33d4d0f92b2408180a8ae891596c3b565197dd366
SHA512f0b7be05cee4ffc25d0599070d69d0d78008b59b594c387581e2111840b20c6f12a44bca86e6af83e0d98ce4a7cf161c5daf2843088e0aa39b0ad923b9cfdd17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a651601167288617905a6464b1577dac
SHA1ab8d690579cbabfc3bdc06214aa36dd1acad7660
SHA25681ef919126dfba77e1b4cb59225ad0c9e91832912e280107896e49bb54e089eb
SHA512de013943d7801ebe74b12c41ab1c50707e99529e84fecefde033fdd8dfaefa8b95fa143af1b42c03b69ea29b2c40b2f15c865ac502e77772f5375fb5ba5d909b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fbceb037de7078b0ded9cdcdc30cd76
SHA1a230ba1885e918a29d4b3a9f04fb81455c4aedd6
SHA2565ac84b8a1f790667745277e70f26f0d7fec1c3739c5ad1fa083bf603db97087c
SHA512278e96fff623c8ca4c50071bb97c6cd518d4ed87fe3471bbf873cf654a979ce492655b98f28c0a5c5bd751105cd2d762a7fd1e991242a2c579b45bfa91ccd661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb73dd6d0271fd69eb619a6964863b67
SHA1a33d2c0fe41c708956272ab40f6db5bdfe106a12
SHA256e4f6198a7c38001d31d85adc601228860bab334be26b69dac960d83a2fc536f1
SHA51279bc25867acc079e01663ea617cc0bab9e16550a4b381e21e80ef0086bad2dcbd284feefd0be34777da1a2668b1a8628fa41d533c10977608d288af731b2e11e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523341e565fe4c8f69ab9ebd880c09270
SHA13341ca99a4e5133e3ec0de54970973ffe35bf429
SHA2569070e2bb0ed7d581d56f40205aac2dc0d46d53564374942b1f500aa44c551536
SHA512e33214f0edd6dca693695caeb2b05f2b567a1eac277cf60173c32382741f0e8e07477a3213bce4e86a67d59a9c9661dc0bd2a16c4ec35146d35fe91d39a767e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7dbbbc0530340cf3d6ec7a3d67868d1
SHA1a82e63adfe92e09731e75c1e99a21544491655ee
SHA25668ac006ce8053365bf0520dc6dbf4ff6106eea5a0c3f045ed6e6464c07619307
SHA512cc42d1b22ab3d4b0422657bb7d9231d53eaa01ff382d7c0a275214e52b39dc63c090ad10f744299c7cdeb024f19ef05563351d2ef01859fb8daddf5ed67fff3d
-
Filesize
7KB
MD5c476d4d0ae31a3ad6b8bbe3c95651354
SHA125d32af36a98ab96f698a944589ae51d74a0a527
SHA25607d3a32b77690538606490f6f55217779e94ba37fb4f96664c1881e41eca1106
SHA5128b015115aa30fd62a21bcf0f1326bc2c679bbbfd56eb3f14cdeeb4a20969f72ba4b1932da7a3d174c36385c0e7ac06ef85b2924e6ce0ab7d7bd68938cf33c08a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ONXID7T\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\favicon-32x32[1].png
Filesize2KB
MD5df4253088bb850c76f81c91db284d4f7
SHA146e3e3c42a159f22038d86bf39fbde118c91dcbf
SHA256590d33ce64b321c321644bc8c840c354257371f8c247f776b788a5ce2c9bbc72
SHA5127804f8507d35adc2a3f65a4fb017bc50219fd2ee326693dfc5011cc9e22df61f50533ee7eb597133ac69e502683b7089df89735f03e11807a4724564061b0b22
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
608B
MD5f9f8c8fb42857739efd1af6e359fcfed
SHA163559b72fff47c0576c0d4a117d9dbb720f221e7
SHA256b041a4234388c98ccc303cfd754f9a34281063bfc9c60da1c84890c8b36d17e1
SHA5125771ffecd5ea4d7d4894ee812800ecbd253403a318f41733f73bb77a558e89c2d47f1aa4940547030e4dbc779339c64e75bc821435be8b17ab146bbed5d7bd12