Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
05/04/2024, 03:14
240405-drr37sag7s 7Analysis
-
max time kernel
189s -
max time network
196s -
platform
windows10-1703_x64 -
resource
win10-20240404-es -
resource tags
arch:x64arch:x86image:win10-20240404-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
05/04/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher-3.2.exe
Resource
win10-20240404-es
Behavioral task
behavioral2
Sample
SKlauncher-3.2.exe
Resource
win10v2004-20240226-es
General
-
Target
SKlauncher-3.2.exe
-
Size
1.6MB
-
MD5
b63468dd118dfbca5ef7967ba344e0e3
-
SHA1
2ba4f0df5f3bd284bf2a89aba320e4440d8b8355
-
SHA256
05ae2f0dd61ef10019b94c200e8df192b767bb4cc24a7e7b329ab43cc9c74caf
-
SHA512
007ecb7445dc0c01a802b5a2c91313aae59f9dc96e27455dd85e7a92a4e649d683fbc2ada5f48925d9ab3b4fdaea20aa89eeb442fde079902aecb5ca3454a548
-
SSDEEP
49152:HIBc3n9dRvwVlzhFAQ/ggUTPQjYEiim7V:oBaO/FAqMQjYEXm
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2412 SKlauncher-3.2.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3952 icacls.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification \??\c:\program files\java\jre-1.8\bin\dll\jvm.pdb SKlauncher-3.2.exe File opened for modification \??\c:\program files\java\jre-1.8\bin\symbols\dll\jvm.pdb SKlauncher-3.2.exe File opened for modification \??\c:\program files\java\jre-1.8\bin\server\ntdll.pdb SKlauncher-3.2.exe File opened for modification \??\c:\program files\java\jre-1.8\bin\server\symbols\dll\ntdll.pdb SKlauncher-3.2.exe File opened for modification \??\c:\program files\java\jre-1.8\bin\ntdll.pdb SKlauncher-3.2.exe File opened for modification \??\c:\program files\java\jre-1.8\bin\dll\ntdll.pdb SKlauncher-3.2.exe File opened for modification \??\c:\program files\java\jre-1.8\bin\jvm.pdb SKlauncher-3.2.exe File opened for modification \??\c:\program files\java\jre-1.8\bin\server\dll\jvm.pdb SKlauncher-3.2.exe File opened for modification \??\c:\program files\java\jre-1.8\bin\server\symbols\dll\jvm.pdb SKlauncher-3.2.exe File opened for modification \??\c:\program files\java\jre-1.8\bin\server\dll\ntdll.pdb SKlauncher-3.2.exe File opened for modification \??\c:\program files\java\jre-1.8\bin\symbols\dll\ntdll.pdb SKlauncher-3.2.exe File opened for modification \??\c:\program files\java\jre-1.8\bin\server\jvm.pdb SKlauncher-3.2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2412 SKlauncher-3.2.exe 2412 SKlauncher-3.2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2412 wrote to memory of 3596 2412 SKlauncher-3.2.exe 72 PID 2412 wrote to memory of 3596 2412 SKlauncher-3.2.exe 72 PID 3596 wrote to memory of 3952 3596 java.exe 74 PID 3596 wrote to memory of 3952 3596 java.exe 74 PID 2412 wrote to memory of 3224 2412 SKlauncher-3.2.exe 76 PID 2412 wrote to memory of 3224 2412 SKlauncher-3.2.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.2.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.2.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
\??\c:\PROGRA~1\java\jre-1.8\bin\java.exe"c:\PROGRA~1\java\jre-1.8\bin\java.exe" -version2⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3952
-
-
-
\??\c:\PROGRA~1\java\jdk-1.8\jre\bin\java.exe"c:\PROGRA~1\java\jdk-1.8\jre\bin\java.exe" -version2⤵PID:3224
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5a8da705062312d0e2716c55d7428def7
SHA1611c43ffd06d4446d0077cd2737891c54990db0c
SHA256cd1510f2260d466b1e921f89a6ba8626e8e196e6bfbd473e3928e32ed38748fd
SHA512bb21768ad2743dd9c9a7cb9082e7896e3eeb557159d45202c98463a53f66bc17ba699e85a055649a4669c5c42414d10764551ac1026291a9b5cf0539998db583
-
Filesize
22KB
MD5dcd68a87b7e6edbcfde48150403b22eb
SHA128e4839a29725075772fccc39b44e194eb91e477
SHA256ae3352b6ad6cffaae55f4387f9f5e79365ea17f8d5fb45ef11d21c3300a49a4c
SHA512ac2a6bc0afcd08c56090536a937772edd54f35505c9a5837d9bc8e91c31edb6137cf5191986b3473e9e2f512950b4dbfe4088598bfd1faf47088124c70aeba71