Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

22/11/2023, 01:08

231122-bhe16she43 8

22/11/2023, 00:55

231122-baa29ahd77 7

22/11/2023, 00:52

231122-a8le7sac31 3

22/11/2023, 00:44

231122-a3kaysac2z 7

22/11/2023, 00:22

231122-an7spshd24 8

Analysis

  • max time kernel
    148s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2023, 01:08

General

  • Target

    SKlauncher-3.1.2.5.exe

  • Size

    1.6MB

  • MD5

    a3eaae6bb7e01e8059f1276ccb7f6c62

  • SHA1

    801b7bb06be83f057fcf7d84c119e0ccb6310386

  • SHA256

    6c974aa57734ff98a88b403058ebbc281a7deb311886c4e1697e59a192afc542

  • SHA512

    57a21164ca396e36c55d39e553647567399fb9e10b7f08d93c691df714aea1b1959b8c230761445b8e39ce81eb8c65a4d34b968d73f7e649e903d5245320d5f8

  • SSDEEP

    49152:HIBc3nWdsIp8gClzw4Kz/q4BkkKlWThSorx:oB/Eq44TBTKEUor

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.2.5.exe
    "C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.2.5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:552
    • \??\c:\PROGRA~1\java\jre-1.8\bin\java.exe
      "c:\PROGRA~1\java\jre-1.8\bin\java.exe" -version
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Windows\system32\icacls.exe
        C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
        3⤵
        • Modifies file permissions
        PID:4072
    • \??\c:\PROGRA~1\java\jdk-1.8\jre\bin\java.exe
      "c:\PROGRA~1\java\jdk-1.8\jre\bin\java.exe" -version
      2⤵
        PID:2112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

      Filesize

      46B

      MD5

      f2aed1121599680e85789b1f69a1c8d0

      SHA1

      a718e948ea9fc3947e1bad1f16d8b9ec04af72a4

      SHA256

      45428ac6d9ce3bf8bef1f3c7099e0b087e48b21e4de28f252cedbebdf815ac90

      SHA512

      f519a08fe6fbf74c838dfd6b402e620cdbfa31e7128cf5338943339c20b73fd9decccb8a52685665c23d6ee895ef4e625e0750df29cf5a4fb625d5b5a619fd8a

    • C:\Users\Admin\AppData\Local\Temp\flatlaf.temp\flatlaf-windows-x86_64-5146579649000.dll

      Filesize

      22KB

      MD5

      dcd68a87b7e6edbcfde48150403b22eb

      SHA1

      28e4839a29725075772fccc39b44e194eb91e477

      SHA256

      ae3352b6ad6cffaae55f4387f9f5e79365ea17f8d5fb45ef11d21c3300a49a4c

      SHA512

      ac2a6bc0afcd08c56090536a937772edd54f35505c9a5837d9bc8e91c31edb6137cf5191986b3473e9e2f512950b4dbfe4088598bfd1faf47088124c70aeba71

    • memory/552-41-0x0000000002BB0000-0x0000000003BB0000-memory.dmp

      Filesize

      16.0MB

    • memory/552-66-0x0000000002BB0000-0x0000000003BB0000-memory.dmp

      Filesize

      16.0MB

    • memory/552-176-0x0000000002BB0000-0x0000000003BB0000-memory.dmp

      Filesize

      16.0MB

    • memory/552-130-0x0000000000D70000-0x0000000000D71000-memory.dmp

      Filesize

      4KB

    • memory/552-43-0x0000000000D70000-0x0000000000D71000-memory.dmp

      Filesize

      4KB

    • memory/552-44-0x0000000000D70000-0x0000000000D71000-memory.dmp

      Filesize

      4KB

    • memory/552-49-0x0000000000D70000-0x0000000000D71000-memory.dmp

      Filesize

      4KB

    • memory/552-50-0x0000000000D70000-0x0000000000D71000-memory.dmp

      Filesize

      4KB

    • memory/552-115-0x0000000002BB0000-0x0000000003BB0000-memory.dmp

      Filesize

      16.0MB

    • memory/552-103-0x0000000002BB0000-0x0000000003BB0000-memory.dmp

      Filesize

      16.0MB

    • memory/552-69-0x0000000002BB0000-0x0000000003BB0000-memory.dmp

      Filesize

      16.0MB

    • memory/552-87-0x0000000000D70000-0x0000000000D71000-memory.dmp

      Filesize

      4KB

    • memory/552-88-0x0000000000D70000-0x0000000000D71000-memory.dmp

      Filesize

      4KB

    • memory/552-91-0x0000000002BB0000-0x0000000003BB0000-memory.dmp

      Filesize

      16.0MB

    • memory/552-102-0x0000000000D70000-0x0000000000D71000-memory.dmp

      Filesize

      4KB

    • memory/2112-21-0x000002E8124F0000-0x000002E8134F0000-memory.dmp

      Filesize

      16.0MB

    • memory/2112-29-0x000002E810AE0000-0x000002E810AE1000-memory.dmp

      Filesize

      4KB

    • memory/4972-15-0x0000020FB9300000-0x0000020FB9301000-memory.dmp

      Filesize

      4KB

    • memory/4972-7-0x0000020FB9320000-0x0000020FBA320000-memory.dmp

      Filesize

      16.0MB