Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
560s -
max time network
563s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2023, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.1.exe
Resource
win10v2004-20230621-en
General
-
Target
SKlauncher 3.1.exe
-
Size
1.1MB
-
MD5
021b53abfc25a261077282498e5726a0
-
SHA1
ba7f38a28444504e6e8e1f995cc40ceb70ff6409
-
SHA256
c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620
-
SHA512
484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d
-
SSDEEP
24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4744 javaw.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4744 javaw.exe 4744 javaw.exe 4744 javaw.exe 4744 javaw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4676 wrote to memory of 4744 4676 SKlauncher 3.1.exe 84 PID 4676 wrote to memory of 4744 4676 SKlauncher 3.1.exe 84 PID 4744 wrote to memory of 452 4744 javaw.exe 87 PID 4744 wrote to memory of 452 4744 javaw.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.1.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SYSTEM32\reg.exereg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Themes\Personalize" /v AppsUseLightTheme3⤵PID:452
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD54ca3290a99adadde557930cd481d7539
SHA126034442a76131dd3d37c8f28b6e9bebc7c1fe7c
SHA256dd130c68dc36bcedbe51a6b8ec3b3358a460d45952f6280e12331f48850b6b3b
SHA5129341c60f92dd3f89f82555055924bdae6fcce1e4cd13a7dde5129ebdce04bae377292237a2ed6c3e7623b242e82b01c7ed1717af4d7db8ca473e9fd7b7b190d5
-
Filesize
14.3MB
MD5c33dd2554eb978e0495c735192bfb30e
SHA1cccce06a708bb636f782ccc68ab2926104703b01
SHA2563b64f26a1e41904f53046285f3483be8e2d25beaa046b0436c618248f52b14e1
SHA512b8ea01b5af0896ca73d1b90283f9fa8e28cf45d38838c9fd7c3636819ac61525e1c880677e19feb2568147a7b97c8b9d17ded2636b759c25b11bb5625b1ffdca