Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
205s -
platform
windows7_x64 -
resource
win7-20230712-es -
resource tags
arch:x64arch:x86image:win7-20230712-eslocale:es-esos:windows7-x64systemwindows -
submitted
17/07/2023, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher-3.1.exe
Resource
win7-20230712-es
Behavioral task
behavioral2
Sample
SKlauncher-3.1.exe
Resource
win10v2004-20230703-es
General
-
Target
SKlauncher-3.1.exe
-
Size
1.1MB
-
MD5
021b53abfc25a261077282498e5726a0
-
SHA1
ba7f38a28444504e6e8e1f995cc40ceb70ff6409
-
SHA256
c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620
-
SHA512
484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d
-
SSDEEP
24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000dfff1b3a562844db5bcdd926cd827940000000002000000000010660000000100002000000002312c59444e9f3906b05b00db36e0b14f8dd85481b9c3dd777d5c8fc1fb14a9000000000e8000000002000020000000151dc3d541bb38598373e796436b0fe76c4d21aed8b8c7c02b6b485862737704200000007a97743b8ba83190b288b46787eb408300bb7c8ec601754e3a2b57b0e926cf4040000000e206ad467ba6d93f7f79b044305e157a594edd800b5f8bde9c85f0ca187e0324291cd405509fb5d47891f956b8b8d6a34d31a37d235771e207b6d3ca128c5ffe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cc859cebb8d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C41B9651-24DE-11EE-A7B6-4A79A2B508FE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2600 iexplore.exe 2600 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2600 2364 SKlauncher-3.1.exe 28 PID 2364 wrote to memory of 2600 2364 SKlauncher-3.1.exe 28 PID 2364 wrote to memory of 2600 2364 SKlauncher-3.1.exe 28 PID 2364 wrote to memory of 2600 2364 SKlauncher-3.1.exe 28 PID 2600 wrote to memory of 2632 2600 iexplore.exe 29 PID 2600 wrote to memory of 2632 2600 iexplore.exe 29 PID 2600 wrote to memory of 2632 2600 iexplore.exe 29 PID 2600 wrote to memory of 2632 2600 iexplore.exe 29 PID 2600 wrote to memory of 2632 2600 iexplore.exe 29 PID 2600 wrote to memory of 2632 2600 iexplore.exe 29 PID 2600 wrote to memory of 2632 2600 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c896862a905e4c2733d1cae9e572b6f1
SHA1ff943b52268ed34f6cc13b61dab3b3a6a83a6af7
SHA2568d5c25e4e55f5263dac46af1bd5850bad780846f54dfa163bed121332d9bf3bc
SHA512023919ad6b3eec2d29c001c834a1b96634289cf771016d95de8140250879a5b553330732589ca76e8926f4b23c7fff42b537e47beece6ea2436928558d6bd2b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531a40ca5a5f26b61e8fa838c81c1d9a3
SHA1fef91a83802d51eb62df5de670797f1e30b77f81
SHA256e6d5036860ed62c477132774889f70165fdbd80e27e823acd412659b068318a9
SHA51289d5457725a1c8ec66e17b1151892783758da48ae42c7a6cec49b5a7be036ad2d12c0c30f4895cdeb6c9aaf031b11db093eb4479f21fe3ac7ca4c2c594309dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5486bcea69d8fbfb21a5f560032053645
SHA1be8d0de4375eef20d924149f64879416f1339fe6
SHA256e7975b47b5573c33666d0220261bbf8ee2ad0d78b6613324e3f2ab527409c4d6
SHA51265224cd9582d60026fe78ec5edc09b9f8898a876d35c36d7ea7e66c5d157791b447b2eebba53e6109e350369e21a52eea26002169a25c916099ad6f3cf275363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fb6a3cd6ef9382c69bbd81f3c37e3f6
SHA1ec235f23df64e56cc0caa8d734ff2717e1f285a0
SHA25651ebe004f8c03fe82f53d06a7602f9e53725a28cd7001d761826858ac0a5d963
SHA512807a05e93fefcbd4877d8bb4f429dc46ba0c59d98fbca235b248bea3f9ac6d09ac2365ca78308c8e565772412e38a9b95ae1515901bb8919690863032a08013f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3885fd07051bf9288f939a4bfd6baeb
SHA12197b751e3fe7dabc825333dac1462da2153208d
SHA25660993190e48e0c87758276170017d4daec5b38d4b0017a080659aa94f6e0ae71
SHA5122d23f0e8e1a3c97e725cb1cc6a9116a9061928b3eb30e05a5ecbe7a7fad857024322269acd24bd45a2633ae1297c7491bc3b746707e3ecec44b24694ec701ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505c43704536b098730bdb81bbf8c71ec
SHA1dd8f167762ec9b0ffce6f09af099393c72c12dcc
SHA25649963fa418724bc3357cd4ffa3836555b4a3d9366cfdf4927784f1cc9b3c1c85
SHA5126b6f6259682470d1846c8b14d84b3f775bc305d6e0dd2058ed2af86ceab4413e1824abdac6df5ddbb6764f0aa1accdb7ffa67565a19da8cc0be765b88863908d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2f61dcf61c95018f01b328e8785bf06
SHA1b80f98470d4e0b98f3c78c1e828d3aefcee840c0
SHA2561aef81e601ba819bd81e8fa61a7e39091e1e905faf722117149b508aefed975e
SHA5127b81e1de9332cc216c3e8ac662302d2f371c46c1264cd6573edb32c8f342cbba957e0092df3a0a4742edcfa1a7d0b7c3521f4b9d9d19b97f62189e8140852213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f448f3bc07cbf6b8079e565dd2cd1ca7
SHA12b6657533573f059f345f2f8a81504d1fea8a377
SHA25628e16bfd679f8994a63480395dde57c4ab8ef9daea324f7f47a56a5a5610e7f9
SHA512683d373e3d1f126674268ce336a19b555a953631bfb1b6441f6d931edc2b527fcfd7160898b057c71ea44968213e38c3295d1017ae6ff1e2dc11f8ee722d1bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d890a0380d46d930ff8f5fea341748d9
SHA15ace2ac1b18c9c5b25fc7238d968f3a323ffd43f
SHA256bfae1a952914357be1ff98b01bd7034a30f854aae2d78c7b93224f0b1ed96192
SHA5121578b264373205969b1e012b59f68b156ef424b3716dc8864a126ff598d40c731aee2f35adbcbb5ab81a08855984e2e83db42504cb2ce5e0503f42894e0ea974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8fe15b3b15f58ed399d59abc98d7871
SHA170bb47b891ceeaad4e69a52a9e61a2abde4c24e8
SHA256474254c17fefe3858c353c883469a9ae0c78282df8bd4c0bb47d208fd8c600f2
SHA512e5978ac23bc1fc0daee9f7457e09832b53ef21267a23182b0cfab09adf0f6d95cf3987f6b1b11018dd06b2282746baa31bc946c1b49757c8f0b0c5f491b32c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562c0fd2a67497e0c6e5e612f11fe81ac
SHA164009769cc6d0e3cee15e7a4c48bd7f7ed7fba29
SHA256404d2e02c714636fc471019c1770521824a0e04e85e394631a9bd33c65fab0de
SHA512817d2c320e7c3b0db58bef1a6403a73190f34e74fbcfac9adb780b9677f203b51075c0666e4345921bbd1e6e7f431247dd7c9248841be6fe5e3e3fa222e89468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53924bac971912577ccd80e05806f105b
SHA1398c6945ee573e2535839f3b4676aca60e30d673
SHA2561b39d9ce4ccfc8ccd8588d8076124781fc37c5b7d91c254b47704709242ab9f5
SHA51267db75db8bd110dd30c5c2f65b0eeb85fcc8b67fc2540643357f149e9ecf45dca2eff774f8dd0847e499d1455e4453839f5a6d1ba11f35d04c9dca2dff8dbe44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d4ee91cf91407d9addd97c9326f442d
SHA15e49a14f1cc64e23fada433d61571b3c1170d70f
SHA256e24a765ec472a3ba2afe73968ff49cfd9874ec0decfc60d03e9391d19e71a4d4
SHA5120849b819d6d20ee66686669d37ddc0a3c647fe838f587e9232a8fb9e9fb69ba6431053989089106907066513e440b62d1a2bea25a44d96656f9937754511342b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f1eabf54ec6647b52c24c86ffd5b6b3
SHA1cfcf8c6554d76f3fc4399eb56f1719ed492deffa
SHA256ab97221d7094e982ffe0797a2d54e14adbc894ff8d5617a93cfc2e02bc97193a
SHA512df75ebb8b689c82b80404375159d478b40564c373bc9b14b0ea424a8641070bbdbd29a95ab436f9d7abaeeddfaa88e1b2efd3946c0ad62c327c6e489bedb15b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3839b9bec5127eef8929ad09a28d3dc
SHA112a71c5ca1b5e98a006b02b8c9aadd928afe6878
SHA256c92f74dbb31e8ccbb654267b60eb96efe9e5a051da62709a9df7cf78c6a62dc8
SHA512e01dbad0637a73e3374496a7fff732015a73c37a09be4808cb9ddfc19312f0e7bce1c6475d284f4043e1727c2627c855f12c4f7934ab1c42d06d2c337096c9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ca6f4c3ca7e12504f83f0f0b1151398
SHA141b52664c554e119bbbf6cc191a549a02e5138a6
SHA256853f691af7e21a4ebc5b9236ca6515547f473ecb22904118069e30bb0e91e357
SHA512f5aec437e0245889a4d88a4f82eeb7d7a6e5a704bd4dc2f994831175ef1bd73f53bc42f909d018d3e54769ffc120a86e2f7005fa4f1ddd2b0f2ec83e0ffbef44
-
Filesize
7KB
MD51085906bad22b88566f11143740e1bab
SHA1402a6d31dc63e0543cb9658e124023ef3d0b760c
SHA256f844113f2a8b8bda03cce6dffce5881a5e85416ce4d3c672851bcf31111ba862
SHA51221ce61f5c56a57a92bd83b28a758b5db4a84b56f67cd5263f0d3f5bc4348b067ce684f82032b9b5bc25da0974630961afc838cc1deceb9afb5748a5ae8d8a3d4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6QM70SJ\favicon-32x32[1].png
Filesize2KB
MD5df4253088bb850c76f81c91db284d4f7
SHA146e3e3c42a159f22038d86bf39fbde118c91dcbf
SHA256590d33ce64b321c321644bc8c840c354257371f8c247f776b788a5ce2c9bbc72
SHA5127804f8507d35adc2a3f65a4fb017bc50219fd2ee326693dfc5011cc9e22df61f50533ee7eb597133ac69e502683b7089df89735f03e11807a4724564061b0b22
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
16KB
MD50f156d5baa3d75ae71b27e38c06d10ed
SHA1e4728f6188a0ff60fc449c4aa8e23687309c543b
SHA2569954bfa6b84da340a3d5098830c44f5e9d966c5e4f5836e7d3d4e62a52e94c11
SHA512385c4f492e2c307a771535e0b0da1c386f7f83fc101921c8011cb9d603dd8dc65222c566d7ee45aca71b8ba009804b8fce24ec667babd002d574aefe107e89e0