Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1215s
  • max time network
    1220s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    18/11/2023, 16:47

General

  • Target

    SKlauncher-3.1.2.5.exe

  • Size

    1.6MB

  • MD5

    a3eaae6bb7e01e8059f1276ccb7f6c62

  • SHA1

    801b7bb06be83f057fcf7d84c119e0ccb6310386

  • SHA256

    6c974aa57734ff98a88b403058ebbc281a7deb311886c4e1697e59a192afc542

  • SHA512

    57a21164ca396e36c55d39e553647567399fb9e10b7f08d93c691df714aea1b1959b8c230761445b8e39ce81eb8c65a4d34b968d73f7e649e903d5245320d5f8

  • SSDEEP

    49152:HIBc3nWdsIp8gClzw4Kz/q4BkkKlWThSorx:oB/Eq44TBTKEUor

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 12 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.2.5.exe
    "C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.2.5.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4356
    • \??\c:\PROGRA~1\java\jre-1.8\bin\java.exe
      "c:\PROGRA~1\java\jre-1.8\bin\java.exe" -version
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:2024
    • \??\c:\PROGRA~1\java\jdk-1.8\jre\bin\java.exe
      "c:\PROGRA~1\java\jdk-1.8\jre\bin\java.exe" -version
      2⤵
        PID:2444
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:988
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 988 -s 3652
        2⤵
          PID:2668
      • C:\Windows\system32\werfault.exe
        werfault.exe /hc /shared Global\1a382467240549bc9da13039b98024cf /t 1540 /p 988 2668
        1⤵
          PID:4296
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4888
        • C:\Windows\system32\werfault.exe
          werfault.exe /hc /shared Global\f22f475f435f49edbb02a186f628be2e /t 4280 /p 4888
          1⤵
            PID:3824
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:5060
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:2492
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:2636
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:3276

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

              Filesize

              46B

              MD5

              dbc1b3a351aa4c789b2c9b00b576af53

              SHA1

              8521f07203fb3d491b6f19a3140cf797cb40b47f

              SHA256

              5d9b738ce6de29a0aa3ff440c9248803199416a083c6b253848b39b29567956b

              SHA512

              ce7791c1384c0d561c212be4e08549137a0fec07a4cb50f08ba329d1eced4ae40b66f27db20a4d73940bbf4332fde1b25122b9a1014b4ea431444af41ae41742

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PP0GIZJY\microsoft.windows[1].xml

              Filesize

              97B

              MD5

              0dfaf78473f3abc4592af5efa3697131

              SHA1

              e726b34092196e52e4bced2e1a91fde0a4bdc5c8

              SHA256

              fbdc8ff459fcadbdd38ffc007ac8f401a87d0fef760732ecbed7404f2894ded8

              SHA512

              f36c3a0ff9673c555c0509cbfd8767d6a7dc0f2e6e64500b4499eca969e021ee2a8ad2b5bcc9a1391b22d4fa5b4a3e62f4b80ce89006c803374d562853f27c5b

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_Explorer

              Filesize

              36KB

              MD5

              ab0262f72142aab53d5402e6d0cb5d24

              SHA1

              eaf95bb31ae1d4c0010f50e789bdc8b8e3116116

              SHA256

              20a108577209b2499cfdba77645477dd0d9771a77d42a53c6315156761efcfbb

              SHA512

              bf9580f3e5d1102cf758503e18a2cf98c799c4a252eedf9344f7c5626da3a1cf141353f01601a3b549234cc3f2978ad31f928068395b56f9f0885c07dbe81da1

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\https___java_com_

              Filesize

              36KB

              MD5

              8aaad0f4eb7d3c65f81c6e6b496ba889

              SHA1

              231237a501b9433c292991e4ec200b25c1589050

              SHA256

              813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

              SHA512

              1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PP0GIZJY\microsoft.windows[1].xml

              Filesize

              97B

              MD5

              0dfaf78473f3abc4592af5efa3697131

              SHA1

              e726b34092196e52e4bced2e1a91fde0a4bdc5c8

              SHA256

              fbdc8ff459fcadbdd38ffc007ac8f401a87d0fef760732ecbed7404f2894ded8

              SHA512

              f36c3a0ff9673c555c0509cbfd8767d6a7dc0f2e6e64500b4499eca969e021ee2a8ad2b5bcc9a1391b22d4fa5b4a3e62f4b80ce89006c803374d562853f27c5b

            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PP0GIZJY\microsoft.windows[1].xml

              Filesize

              97B

              MD5

              0dfaf78473f3abc4592af5efa3697131

              SHA1

              e726b34092196e52e4bced2e1a91fde0a4bdc5c8

              SHA256

              fbdc8ff459fcadbdd38ffc007ac8f401a87d0fef760732ecbed7404f2894ded8

              SHA512

              f36c3a0ff9673c555c0509cbfd8767d6a7dc0f2e6e64500b4499eca969e021ee2a8ad2b5bcc9a1391b22d4fa5b4a3e62f4b80ce89006c803374d562853f27c5b

            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PP0GIZJY\microsoft.windows[1].xml

              Filesize

              97B

              MD5

              0dfaf78473f3abc4592af5efa3697131

              SHA1

              e726b34092196e52e4bced2e1a91fde0a4bdc5c8

              SHA256

              fbdc8ff459fcadbdd38ffc007ac8f401a87d0fef760732ecbed7404f2894ded8

              SHA512

              f36c3a0ff9673c555c0509cbfd8767d6a7dc0f2e6e64500b4499eca969e021ee2a8ad2b5bcc9a1391b22d4fa5b4a3e62f4b80ce89006c803374d562853f27c5b

            • C:\Users\Admin\AppData\Local\Temp\flatlaf.temp\flatlaf-windows-x86_64-5018723898000.dll

              Filesize

              22KB

              MD5

              dcd68a87b7e6edbcfde48150403b22eb

              SHA1

              28e4839a29725075772fccc39b44e194eb91e477

              SHA256

              ae3352b6ad6cffaae55f4387f9f5e79365ea17f8d5fb45ef11d21c3300a49a4c

              SHA512

              ac2a6bc0afcd08c56090536a937772edd54f35505c9a5837d9bc8e91c31edb6137cf5191986b3473e9e2f512950b4dbfe4088598bfd1faf47088124c70aeba71

            • memory/988-149-0x0000023DFE520000-0x0000023DFE540000-memory.dmp

              Filesize

              128KB

            • memory/988-152-0x0000023DFE540000-0x0000023DFE560000-memory.dmp

              Filesize

              128KB

            • memory/988-142-0x0000023DFE190000-0x0000023DFE1B0000-memory.dmp

              Filesize

              128KB

            • memory/2444-28-0x000002470ADC0000-0x000002470ADC1000-memory.dmp

              Filesize

              4KB

            • memory/2444-20-0x000002470C700000-0x000002470D700000-memory.dmp

              Filesize

              16.0MB

            • memory/2556-184-0x0000026D21C70000-0x0000026D22C70000-memory.dmp

              Filesize

              16.0MB

            • memory/2556-9-0x0000026D21C70000-0x0000026D22C70000-memory.dmp

              Filesize

              16.0MB

            • memory/2556-15-0x0000026D204A0000-0x0000026D204A1000-memory.dmp

              Filesize

              4KB

            • memory/4356-162-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-224-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-124-0x0000000002140000-0x0000000002141000-memory.dmp

              Filesize

              4KB

            • memory/4356-116-0x0000000002140000-0x0000000002141000-memory.dmp

              Filesize

              4KB

            • memory/4356-102-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-100-0x0000000002140000-0x0000000002141000-memory.dmp

              Filesize

              4KB

            • memory/4356-91-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-164-0x0000000002140000-0x0000000002141000-memory.dmp

              Filesize

              4KB

            • memory/4356-168-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-183-0x0000000002140000-0x0000000002141000-memory.dmp

              Filesize

              4KB

            • memory/4356-84-0x0000000002140000-0x0000000002141000-memory.dmp

              Filesize

              4KB

            • memory/4356-189-0x0000000002140000-0x0000000002141000-memory.dmp

              Filesize

              4KB

            • memory/4356-191-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-211-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-217-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-119-0x0000000002140000-0x0000000002141000-memory.dmp

              Filesize

              4KB

            • memory/4356-229-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-235-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-242-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-245-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-269-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-82-0x0000000002140000-0x0000000002141000-memory.dmp

              Filesize

              4KB

            • memory/4356-302-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-305-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-81-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-61-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB

            • memory/4356-48-0x0000000002140000-0x0000000002141000-memory.dmp

              Filesize

              4KB

            • memory/4356-43-0x0000000002140000-0x0000000002141000-memory.dmp

              Filesize

              4KB

            • memory/4356-39-0x00000000024F0000-0x00000000034F0000-memory.dmp

              Filesize

              16.0MB