Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
83s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2023, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SKlauncher 3.1.exe
Resource
win10v2004-20230220-en
General
-
Target
SKlauncher 3.1.exe
-
Size
1.1MB
-
MD5
021b53abfc25a261077282498e5726a0
-
SHA1
ba7f38a28444504e6e8e1f995cc40ceb70ff6409
-
SHA256
c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620
-
SHA512
484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d
-
SSDEEP
24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2216 javaw.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3816 chrome.exe Token: SeCreatePagefilePrivilege 3816 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2216 javaw.exe 2216 javaw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3948 wrote to memory of 2216 3948 SKlauncher 3.1.exe 85 PID 3948 wrote to memory of 2216 3948 SKlauncher 3.1.exe 85 PID 3816 wrote to memory of 3056 3816 chrome.exe 90 PID 3816 wrote to memory of 3056 3816 chrome.exe 90 PID 3488 wrote to memory of 2772 3488 chrome.exe 92 PID 3488 wrote to memory of 2772 3488 chrome.exe 92 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3816 wrote to memory of 1048 3816 chrome.exe 94 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97 PID 3488 wrote to memory of 1912 3488 chrome.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c3349758,0x7ff9c3349768,0x7ff9c33497782⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1828,i,10897527076420703230,883168311919096778,131072 /prefetch:22⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1828,i,10897527076420703230,883168311919096778,131072 /prefetch:82⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1828,i,10897527076420703230,883168311919096778,131072 /prefetch:82⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3132 --field-trial-handle=1828,i,10897527076420703230,883168311919096778,131072 /prefetch:12⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=1828,i,10897527076420703230,883168311919096778,131072 /prefetch:12⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1828,i,10897527076420703230,883168311919096778,131072 /prefetch:82⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1828,i,10897527076420703230,883168311919096778,131072 /prefetch:82⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1828,i,10897527076420703230,883168311919096778,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1828,i,10897527076420703230,883168311919096778,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c3349758,0x7ff9c3349768,0x7ff9c33497782⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1924,i,12935732870985260810,9082901455433405186,131072 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1924,i,12935732870985260810,9082901455433405186,131072 /prefetch:22⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD5c87ebceb478cb28425433fe3c9922a0f
SHA13f5ab79c206dde11b8f0283639d00d559c4d447c
SHA25670fe145a98b9711f8baa7062b0b3f28754944562728979e9b17296528e69645e
SHA512758d801052c4608c7f8f2fe6e2c3cc8cf0c62d519f1179891472541189b7a1362fc646289331f6c3c098f779289985847ccc39fde61b423e1efd0679470d1605
-
Filesize
40B
MD5d5aa436f438bef1f8801fe7aea488da4
SHA1fe3fccaeaee75c2addcb31ddb74a609fa9e47873
SHA25653e51ffd114b6690845f9206d0584783c37637db83a91286d25703a725d25200
SHA512f4d08c551c6ff43c7136199806da7d6db8d3aed894d81f60123ac9021cad165d03052ac5f5b6b1feb92f67f590d06e40ba9871daabeacc80c3be392992c4f1ed
-
Filesize
40B
MD5d5aa436f438bef1f8801fe7aea488da4
SHA1fe3fccaeaee75c2addcb31ddb74a609fa9e47873
SHA25653e51ffd114b6690845f9206d0584783c37637db83a91286d25703a725d25200
SHA512f4d08c551c6ff43c7136199806da7d6db8d3aed894d81f60123ac9021cad165d03052ac5f5b6b1feb92f67f590d06e40ba9871daabeacc80c3be392992c4f1ed
-
Filesize
40B
MD5d5aa436f438bef1f8801fe7aea488da4
SHA1fe3fccaeaee75c2addcb31ddb74a609fa9e47873
SHA25653e51ffd114b6690845f9206d0584783c37637db83a91286d25703a725d25200
SHA512f4d08c551c6ff43c7136199806da7d6db8d3aed894d81f60123ac9021cad165d03052ac5f5b6b1feb92f67f590d06e40ba9871daabeacc80c3be392992c4f1ed
-
Filesize
40B
MD5d5aa436f438bef1f8801fe7aea488da4
SHA1fe3fccaeaee75c2addcb31ddb74a609fa9e47873
SHA25653e51ffd114b6690845f9206d0584783c37637db83a91286d25703a725d25200
SHA512f4d08c551c6ff43c7136199806da7d6db8d3aed894d81f60123ac9021cad165d03052ac5f5b6b1feb92f67f590d06e40ba9871daabeacc80c3be392992c4f1ed
-
Filesize
40B
MD5d5aa436f438bef1f8801fe7aea488da4
SHA1fe3fccaeaee75c2addcb31ddb74a609fa9e47873
SHA25653e51ffd114b6690845f9206d0584783c37637db83a91286d25703a725d25200
SHA512f4d08c551c6ff43c7136199806da7d6db8d3aed894d81f60123ac9021cad165d03052ac5f5b6b1feb92f67f590d06e40ba9871daabeacc80c3be392992c4f1ed
-
Filesize
6KB
MD5fdda7a85926f00f5027b744820f973f9
SHA1bf6c323c12cb3fb4ccd6d80fc6499b59e37dcef3
SHA256476ccc9b5cb38a875a8c83387886d1945cc3a7ba63eee2083d60f8c907dd15d0
SHA51230cefa0da757ef45d362ab5c49f17045099bb6488fbebb825a2319bfec01bc3215248e48e4c6e5df0af40d1e7c0401b200adfb464fb58a171f27742d41e373ad
-
Filesize
6KB
MD5dfd008b56ae4efe12d452989624270aa
SHA1eb59dc074702cf08d065b3dfa0e113e311aef642
SHA256e94c5313fbb449c0263a284a9da36ac0a1ba50a0be3c807b2186a318088af110
SHA5126e6ea6fee0f63d2e7d687c6e6f15160be4b920fd3c9c09bfcdc043c92daf4500819d125aaae2a357f3401b0bb9aae150c6246da3d63068429acaff85ec041f86
-
Filesize
15KB
MD5163313bb8fc3f0679005f0a0926da75f
SHA14dd986d1c6ed83a6b46f0fe29ec7bf27d7b86f80
SHA256e50837d52b861c95f7f0c38ea410bf0f330b6353d152f64d7306b4e28f1c8ef4
SHA512192a25d48d2bd98ec0df92eb90cdff1b244697f07e1726656186046c89b76b545a1a8cfddd51b5fb68193b7905574c9c73d962e2cb2d997a13bfb5c5d232beac
-
Filesize
72KB
MD5135008ffd7409929c5ccdf29ba48aa9c
SHA1f6aaf1fc0d7b5a9663603a9c87db8791920ebdbf
SHA2565c235040de378400fd5df147b0270862f9f743a559c9ebe2560808389cd49601
SHA512f1a832462e9aac4859fa8378df5c24465aea33a578a8d240735329c72fe0bbb002fecc9c22f27ea6f58470865394cc080bf72b86acbfca55edbb7cd913daf309
-
Filesize
72KB
MD5135008ffd7409929c5ccdf29ba48aa9c
SHA1f6aaf1fc0d7b5a9663603a9c87db8791920ebdbf
SHA2565c235040de378400fd5df147b0270862f9f743a559c9ebe2560808389cd49601
SHA512f1a832462e9aac4859fa8378df5c24465aea33a578a8d240735329c72fe0bbb002fecc9c22f27ea6f58470865394cc080bf72b86acbfca55edbb7cd913daf309
-
Filesize
73KB
MD5715ddd172eefe0a80e6fdfeb76e5b359
SHA1a70eb4e8adeceddb2ee63b0bae7ec88139ba896d
SHA256ede786b4c850b07545d7021da3191bee2ee3a433298035b46e0790c47bffe764
SHA51222797bcfa718bb78d7a7df91c201ace70dc11b1eb1ca5bc8a0488c45e9bef204987dec3a01b89c9677b1043d55dd5029d547a0970b10e5b81ee0713af9cbb056
-
Filesize
72KB
MD5bb41017a405f65110e79993bfc64f03e
SHA1091732f3e6ac12863e6e23f305857aa211b6ca06
SHA256222bd728ad20d82c881196fbe93c038a945186e8e2832e1fa2d73d2b5fcc3fc2
SHA512df444535a95295a434af5cfb133b0a0885081ea9290e0a388f8edbc66d4e890e5d7ab2b53f5170315e7710ef9e99ec3cf3bdc3c7822e9d0f6088eb44edaf0f08
-
Filesize
72KB
MD5bb41017a405f65110e79993bfc64f03e
SHA1091732f3e6ac12863e6e23f305857aa211b6ca06
SHA256222bd728ad20d82c881196fbe93c038a945186e8e2832e1fa2d73d2b5fcc3fc2
SHA512df444535a95295a434af5cfb133b0a0885081ea9290e0a388f8edbc66d4e890e5d7ab2b53f5170315e7710ef9e99ec3cf3bdc3c7822e9d0f6088eb44edaf0f08
-
Filesize
73KB
MD5715ddd172eefe0a80e6fdfeb76e5b359
SHA1a70eb4e8adeceddb2ee63b0bae7ec88139ba896d
SHA256ede786b4c850b07545d7021da3191bee2ee3a433298035b46e0790c47bffe764
SHA51222797bcfa718bb78d7a7df91c201ace70dc11b1eb1ca5bc8a0488c45e9bef204987dec3a01b89c9677b1043d55dd5029d547a0970b10e5b81ee0713af9cbb056
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
21KB
MD54ca3290a99adadde557930cd481d7539
SHA126034442a76131dd3d37c8f28b6e9bebc7c1fe7c
SHA256dd130c68dc36bcedbe51a6b8ec3b3358a460d45952f6280e12331f48850b6b3b
SHA5129341c60f92dd3f89f82555055924bdae6fcce1e4cd13a7dde5129ebdce04bae377292237a2ed6c3e7623b242e82b01c7ed1717af4d7db8ca473e9fd7b7b190d5