Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
482s -
max time network
469s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2023, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher-3.1.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
SKlauncher-3.1.exe
Resource
win10v2004-20231025-en
General
-
Target
SKlauncher-3.1.exe
-
Size
1.1MB
-
MD5
021b53abfc25a261077282498e5726a0
-
SHA1
ba7f38a28444504e6e8e1f995cc40ceb70ff6409
-
SHA256
c3db9475c3ab6b53d8f6d711f587e5218c9b8d332229a208277bc0b27a24b620
-
SHA512
484bb65ecb1ccd3e5472a27737fd2fa4471240aeefcf4bfdeaf4e49636cec9b3e43a5c2feb7134074c92af01f52a456b8074aca8269480e210cfa3b51acae81d
-
SSDEEP
24576:7h1tjL2uma7hLQKaikK21SHCJ3ny+SGiPsGSa7tLC+/e0cUEcnr:sghMKai1viny6iPH5hF/e0m2r
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2768 javaw.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2836 icacls.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2768 javaw.exe 2768 javaw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3232 wrote to memory of 2768 3232 SKlauncher-3.1.exe 85 PID 3232 wrote to memory of 2768 3232 SKlauncher-3.1.exe 85 PID 2768 wrote to memory of 2836 2768 javaw.exe 87 PID 2768 wrote to memory of 2836 2768 javaw.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Xms32m -Xmx256m -jar "C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:2836
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5a4df57a26de50529fc982083ce44ae1e
SHA171b21481870635a46b38b97dfedcad34f86c2480
SHA256643776112f0f8dc064634ddc52cb810bcd1bcb4c09bc14cdcfb65f18a2aac903
SHA512516de575fea024b35fb2beb83ceb025dc69c55103bc179e4f16c96c89365b1c0d7b8f7296d9922ca3a47a09f03e7755d56673efad8aac8cbff2b9da3cee14806
-
Filesize
21KB
MD54ca3290a99adadde557930cd481d7539
SHA126034442a76131dd3d37c8f28b6e9bebc7c1fe7c
SHA256dd130c68dc36bcedbe51a6b8ec3b3358a460d45952f6280e12331f48850b6b3b
SHA5129341c60f92dd3f89f82555055924bdae6fcce1e4cd13a7dde5129ebdce04bae377292237a2ed6c3e7623b242e82b01c7ed1717af4d7db8ca473e9fd7b7b190d5