Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    204s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08/06/2023, 00:20

General

  • Target

    SKlauncher 3.1.exe

  • Size

    1.1MB

  • MD5

    021b53abfc25a261077282498e5726a0

  • SHA1

    ba7f38a28444504e6e8e1f995cc40ceb70ff6409

  • SHA256

    c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620

  • SHA512

    484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d

  • SSDEEP

    24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe
    "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1676 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    66bc10f5a9be4e06cacdb0c3350ad1ac

    SHA1

    b05329900f7df5c232257bf25785b6fa59ec2fb8

    SHA256

    a8bb0a60cdcf0cbb9f501b7983223375d7691629a0c77dacc7e7346a103b3984

    SHA512

    b525c34db6a36cca63e5530a13f86193d1ce82567f306a9c6e0ec0bacdf4d458c25641f625f8e431e45e855378baa58aab980a21a3b102cebc5ef29a0f4ddc3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6cedad6205c29e48fc074e0cd23b6b5c

    SHA1

    f19c91336879a9e559bce3d3832b1962db74c7e7

    SHA256

    42f4e4824bb016817830999c6b7d9c5f9acf9062e75fd97596a94b79df7eef5e

    SHA512

    5b0a2a90863307b53bc0947b3b50ad635eb59b854d568b68f4b05f1d9766480d91f1b661be1366caeba920b312f55033323c95a1832f84d751ef37d6dfc36032

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc6c47aca91f252c741612d3030d27bc

    SHA1

    a2e7a31f979817bede97dad93854c4632d023d8f

    SHA256

    39c4d2b8f1c477cdfb6895e84a8028e373a5bd03d6436febd2fc5cdb921513e2

    SHA512

    8e9428487aa8659bf77a11afe1ee9bce05c95615467b160df181db0a057a633ad3127d9f4f0e083bf41fe4333447dc0b0c3444cfa96d5b63e059b6d829a2384d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5898422c8fd6203cf2b24afc811e11f9

    SHA1

    59235a3e2dace309831bae685d3c23a9d182addd

    SHA256

    4259bd4ce0536b26d46105fc2fc4bf59cb4b34dd81e8cb98c76cc1ba85d85188

    SHA512

    7918bbe60026bc8c6f7b1cb51307dcf0b8cde8895e13836ad707a7873e74bd577a002a5b8dd5266cc1518977c7aed95aafc11469b38f9a2e3525cc71c3ad460c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ead48eb041c950b5848822eb1e583aa9

    SHA1

    a0f56c89750c34b32cec747bf1b6c69048866f2e

    SHA256

    27e41224bf245732721058536cb63a380d90e059414af969f623661e48039bee

    SHA512

    cd2df99a9438eb2f47b76b5115bab33ff242868e9ac4311819ca7572646384ad54d3d0cecd6072f02070a8b049fabf5bb759105a8f8ea353bca3dcaca2388c3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d52d37231653e22ce77dfdbb1977ed6b

    SHA1

    059a5ab6386eb2c46aba28fbc13439a0f4ad2f8e

    SHA256

    6b62ea7b46b36d54a0b8fce33d4d0f92b2408180a8ae891596c3b565197dd366

    SHA512

    f0b7be05cee4ffc25d0599070d69d0d78008b59b594c387581e2111840b20c6f12a44bca86e6af83e0d98ce4a7cf161c5daf2843088e0aa39b0ad923b9cfdd17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a651601167288617905a6464b1577dac

    SHA1

    ab8d690579cbabfc3bdc06214aa36dd1acad7660

    SHA256

    81ef919126dfba77e1b4cb59225ad0c9e91832912e280107896e49bb54e089eb

    SHA512

    de013943d7801ebe74b12c41ab1c50707e99529e84fecefde033fdd8dfaefa8b95fa143af1b42c03b69ea29b2c40b2f15c865ac502e77772f5375fb5ba5d909b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8fbceb037de7078b0ded9cdcdc30cd76

    SHA1

    a230ba1885e918a29d4b3a9f04fb81455c4aedd6

    SHA256

    5ac84b8a1f790667745277e70f26f0d7fec1c3739c5ad1fa083bf603db97087c

    SHA512

    278e96fff623c8ca4c50071bb97c6cd518d4ed87fe3471bbf873cf654a979ce492655b98f28c0a5c5bd751105cd2d762a7fd1e991242a2c579b45bfa91ccd661

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb73dd6d0271fd69eb619a6964863b67

    SHA1

    a33d2c0fe41c708956272ab40f6db5bdfe106a12

    SHA256

    e4f6198a7c38001d31d85adc601228860bab334be26b69dac960d83a2fc536f1

    SHA512

    79bc25867acc079e01663ea617cc0bab9e16550a4b381e21e80ef0086bad2dcbd284feefd0be34777da1a2668b1a8628fa41d533c10977608d288af731b2e11e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    23341e565fe4c8f69ab9ebd880c09270

    SHA1

    3341ca99a4e5133e3ec0de54970973ffe35bf429

    SHA256

    9070e2bb0ed7d581d56f40205aac2dc0d46d53564374942b1f500aa44c551536

    SHA512

    e33214f0edd6dca693695caeb2b05f2b567a1eac277cf60173c32382741f0e8e07477a3213bce4e86a67d59a9c9661dc0bd2a16c4ec35146d35fe91d39a767e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e7dbbbc0530340cf3d6ec7a3d67868d1

    SHA1

    a82e63adfe92e09731e75c1e99a21544491655ee

    SHA256

    68ac006ce8053365bf0520dc6dbf4ff6106eea5a0c3f045ed6e6464c07619307

    SHA512

    cc42d1b22ab3d4b0422657bb7d9231d53eaa01ff382d7c0a275214e52b39dc63c090ad10f744299c7cdeb024f19ef05563351d2ef01859fb8daddf5ed67fff3d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\p734dsx\imagestore.dat

    Filesize

    7KB

    MD5

    c476d4d0ae31a3ad6b8bbe3c95651354

    SHA1

    25d32af36a98ab96f698a944589ae51d74a0a527

    SHA256

    07d3a32b77690538606490f6f55217779e94ba37fb4f96664c1881e41eca1106

    SHA512

    8b015115aa30fd62a21bcf0f1326bc2c679bbbfd56eb3f14cdeeb4a20969f72ba4b1932da7a3d174c36385c0e7ac06ef85b2924e6ce0ab7d7bd68938cf33c08a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ONXID7T\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\favicon-32x32[1].png

    Filesize

    2KB

    MD5

    df4253088bb850c76f81c91db284d4f7

    SHA1

    46e3e3c42a159f22038d86bf39fbde118c91dcbf

    SHA256

    590d33ce64b321c321644bc8c840c354257371f8c247f776b788a5ce2c9bbc72

    SHA512

    7804f8507d35adc2a3f65a4fb017bc50219fd2ee326693dfc5011cc9e22df61f50533ee7eb597133ac69e502683b7089df89735f03e11807a4724564061b0b22

  • C:\Users\Admin\AppData\Local\Temp\Tar4C92.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\U55II2K1.txt

    Filesize

    608B

    MD5

    f9f8c8fb42857739efd1af6e359fcfed

    SHA1

    63559b72fff47c0576c0d4a117d9dbb720f221e7

    SHA256

    b041a4234388c98ccc303cfd754f9a34281063bfc9c60da1c84890c8b36d17e1

    SHA512

    5771ffecd5ea4d7d4894ee812800ecbd253403a318f41733f73bb77a558e89c2d47f1aa4940547030e4dbc779339c64e75bc821435be8b17ab146bbed5d7bd12

  • memory/1428-54-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB