Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/11/2023, 01:08
231122-bhe16she43 822/11/2023, 00:55
231122-baa29ahd77 722/11/2023, 00:52
231122-a8le7sac31 322/11/2023, 00:44
231122-a3kaysac2z 722/11/2023, 00:22
231122-an7spshd24 8Analysis
-
max time kernel
148s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2023, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher-3.1.2.5.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
SKlauncher-3.1.2.5.exe
Resource
win10v2004-20231020-en
General
-
Target
SKlauncher-3.1.2.5.exe
-
Size
1.6MB
-
MD5
a3eaae6bb7e01e8059f1276ccb7f6c62
-
SHA1
801b7bb06be83f057fcf7d84c119e0ccb6310386
-
SHA256
6c974aa57734ff98a88b403058ebbc281a7deb311886c4e1697e59a192afc542
-
SHA512
57a21164ca396e36c55d39e553647567399fb9e10b7f08d93c691df714aea1b1959b8c230761445b8e39ce81eb8c65a4d34b968d73f7e649e903d5245320d5f8
-
SSDEEP
49152:HIBc3nWdsIp8gClzw4Kz/q4BkkKlWThSorx:oB/Eq44TBTKEUor
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 552 SKlauncher-3.1.2.5.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4072 icacls.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 552 SKlauncher-3.1.2.5.exe 552 SKlauncher-3.1.2.5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 552 wrote to memory of 4972 552 SKlauncher-3.1.2.5.exe 83 PID 552 wrote to memory of 4972 552 SKlauncher-3.1.2.5.exe 83 PID 4972 wrote to memory of 4072 4972 java.exe 87 PID 4972 wrote to memory of 4072 4972 java.exe 87 PID 552 wrote to memory of 2112 552 SKlauncher-3.1.2.5.exe 89 PID 552 wrote to memory of 2112 552 SKlauncher-3.1.2.5.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.2.5.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.2.5.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:552 -
\??\c:\PROGRA~1\java\jre-1.8\bin\java.exe"c:\PROGRA~1\java\jre-1.8\bin\java.exe" -version2⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:4072
-
-
-
\??\c:\PROGRA~1\java\jdk-1.8\jre\bin\java.exe"c:\PROGRA~1\java\jdk-1.8\jre\bin\java.exe" -version2⤵PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5f2aed1121599680e85789b1f69a1c8d0
SHA1a718e948ea9fc3947e1bad1f16d8b9ec04af72a4
SHA25645428ac6d9ce3bf8bef1f3c7099e0b087e48b21e4de28f252cedbebdf815ac90
SHA512f519a08fe6fbf74c838dfd6b402e620cdbfa31e7128cf5338943339c20b73fd9decccb8a52685665c23d6ee895ef4e625e0750df29cf5a4fb625d5b5a619fd8a
-
Filesize
22KB
MD5dcd68a87b7e6edbcfde48150403b22eb
SHA128e4839a29725075772fccc39b44e194eb91e477
SHA256ae3352b6ad6cffaae55f4387f9f5e79365ea17f8d5fb45ef11d21c3300a49a4c
SHA512ac2a6bc0afcd08c56090536a937772edd54f35505c9a5837d9bc8e91c31edb6137cf5191986b3473e9e2f512950b4dbfe4088598bfd1faf47088124c70aeba71