Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

16/08/2023, 00:42

230816-a2swpsga6w 7

16/08/2023, 00:38

230816-azamcaeb58 7

Analysis

  • max time kernel
    149s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    16/08/2023, 00:38

General

  • Target

    SKlauncher-3.1.exe

  • Size

    1.1MB

  • MD5

    021b53abfc25a261077282498e5726a0

  • SHA1

    ba7f38a28444504e6e8e1f995cc40ceb70ff6409

  • SHA256

    c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620

  • SHA512

    484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d

  • SSDEEP

    24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.exe
    "C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
      "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:416
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2024

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\flatlaf.temp\flatlaf-windows-x86_64-4782017421000.dll

      Filesize

      21KB

      MD5

      4ca3290a99adadde557930cd481d7539

      SHA1

      26034442a76131dd3d37c8f28b6e9bebc7c1fe7c

      SHA256

      dd130c68dc36bcedbe51a6b8ec3b3358a460d45952f6280e12331f48850b6b3b

      SHA512

      9341c60f92dd3f89f82555055924bdae6fcce1e4cd13a7dde5129ebdce04bae377292237a2ed6c3e7623b242e82b01c7ed1717af4d7db8ca473e9fd7b7b190d5

    • memory/416-195-0x0000000002E70000-0x0000000003E70000-memory.dmp

      Filesize

      16.0MB

    • memory/416-202-0x0000000002E70000-0x0000000003E70000-memory.dmp

      Filesize

      16.0MB

    • memory/416-149-0x00000000012E0000-0x00000000012E1000-memory.dmp

      Filesize

      4KB

    • memory/416-138-0x0000000002E70000-0x0000000003E70000-memory.dmp

      Filesize

      16.0MB

    • memory/416-158-0x0000000002E70000-0x0000000003E70000-memory.dmp

      Filesize

      16.0MB

    • memory/416-159-0x00000000012E0000-0x00000000012E1000-memory.dmp

      Filesize

      4KB

    • memory/416-176-0x0000000002E70000-0x0000000003E70000-memory.dmp

      Filesize

      16.0MB

    • memory/416-180-0x00000000012E0000-0x00000000012E1000-memory.dmp

      Filesize

      4KB

    • memory/416-189-0x00000000012E0000-0x00000000012E1000-memory.dmp

      Filesize

      4KB

    • memory/416-203-0x0000000003160000-0x0000000003170000-memory.dmp

      Filesize

      64KB

    • memory/416-145-0x00000000012E0000-0x00000000012E1000-memory.dmp

      Filesize

      4KB

    • memory/416-201-0x0000000003100000-0x0000000003110000-memory.dmp

      Filesize

      64KB

    • memory/416-212-0x0000000002E70000-0x0000000003E70000-memory.dmp

      Filesize

      16.0MB

    • memory/416-204-0x0000000003130000-0x0000000003140000-memory.dmp

      Filesize

      64KB

    • memory/416-206-0x0000000003150000-0x0000000003160000-memory.dmp

      Filesize

      64KB

    • memory/416-205-0x0000000003140000-0x0000000003150000-memory.dmp

      Filesize

      64KB

    • memory/416-208-0x0000000003190000-0x00000000031A0000-memory.dmp

      Filesize

      64KB

    • memory/416-207-0x0000000003180000-0x0000000003190000-memory.dmp

      Filesize

      64KB

    • memory/416-209-0x00000000031A0000-0x00000000031B0000-memory.dmp

      Filesize

      64KB

    • memory/416-210-0x00000000031B0000-0x00000000031C0000-memory.dmp

      Filesize

      64KB

    • memory/416-211-0x0000000002E70000-0x0000000003E70000-memory.dmp

      Filesize

      16.0MB

    • memory/4904-133-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB