Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24/08/2023, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe
Resource
win10v2004-20230703-en
General
-
Target
c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe
-
Size
814KB
-
MD5
e704be8121d4d4b6f193b97f1ac1e8b0
-
SHA1
846d1f346d6d8aa87f0e5b499662fe16b1f9580c
-
SHA256
c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6
-
SHA512
1a6119c1ad6b0ab837b6db0db5ea6e73e25f6382bdd3c01a30776bf9692b6dfe89974475ebb15a3b8659c47ec2686cd43604122030a61d547b2d79d5c57bf700
-
SSDEEP
24576:U7i7ypA8y0MBhdxGqT/xcLaT5FTHAPYtnPP:U7iv8y/BTrAPYB3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2532 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2624 Logo1_.exe 1088 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SUMIPNTG\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE Logo1_.exe File created C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe Logo1_.exe File created C:\Program Files\Java\jre7\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe File created C:\Windows\Logo1_.exe c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2624 Logo1_.exe 2624 Logo1_.exe 2624 Logo1_.exe 2624 Logo1_.exe 2624 Logo1_.exe 2624 Logo1_.exe 2624 Logo1_.exe 2624 Logo1_.exe 2624 Logo1_.exe 2624 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2532 2120 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 28 PID 2120 wrote to memory of 2532 2120 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 28 PID 2120 wrote to memory of 2532 2120 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 28 PID 2120 wrote to memory of 2532 2120 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 28 PID 2120 wrote to memory of 2624 2120 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 30 PID 2120 wrote to memory of 2624 2120 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 30 PID 2120 wrote to memory of 2624 2120 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 30 PID 2120 wrote to memory of 2624 2120 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 30 PID 2624 wrote to memory of 1792 2624 Logo1_.exe 32 PID 2624 wrote to memory of 1792 2624 Logo1_.exe 32 PID 2624 wrote to memory of 1792 2624 Logo1_.exe 32 PID 2624 wrote to memory of 1792 2624 Logo1_.exe 32 PID 1792 wrote to memory of 2460 1792 net.exe 33 PID 1792 wrote to memory of 2460 1792 net.exe 33 PID 1792 wrote to memory of 2460 1792 net.exe 33 PID 1792 wrote to memory of 2460 1792 net.exe 33 PID 2532 wrote to memory of 1088 2532 cmd.exe 34 PID 2532 wrote to memory of 1088 2532 cmd.exe 34 PID 2532 wrote to memory of 1088 2532 cmd.exe 34 PID 2532 wrote to memory of 1088 2532 cmd.exe 34 PID 2624 wrote to memory of 1204 2624 Logo1_.exe 19 PID 2624 wrote to memory of 1204 2624 Logo1_.exe 19
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe"C:\Users\Admin\AppData\Local\Temp\c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a83FF.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe"C:\Users\Admin\AppData\Local\Temp\c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe"4⤵
- Executes dropped EXE
PID:1088
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2460
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5533ce215a7c274602dc456ca375cef93
SHA176c502d7c45eca3fd96f6b04eb850e751bc785dd
SHA256d70c9f73bbeed5cbc0df4a4d14bae68789f84d8092281337d2919322b288ce9c
SHA51209d9dee36c48567921de4b7c31c4a822d5f9ed5e0b1cb0330031b320f40b5ba9b15e89dc37d52561094642c0ff16c14d32e81ed5b1dac06150fefbbd6f3365bf
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD548a638d6c61525bd039053a9939b01be
SHA1a9c0add76e0e81c38d6c7185f96be641a4d6cdc3
SHA256b021be82700e2eee0edbdbe17dd202afaf6c7b5f3b1e31b924026da6396ae8e9
SHA512b350031f372b94c54231cb7338b0ccea5d10b57ce5e2134e64bf3154b891316d09ad50aa1efb0d2aa72d5297cad2c380e71ed9384f107d383adf02c8bf9c06b3
-
Filesize
722B
MD548a638d6c61525bd039053a9939b01be
SHA1a9c0add76e0e81c38d6c7185f96be641a4d6cdc3
SHA256b021be82700e2eee0edbdbe17dd202afaf6c7b5f3b1e31b924026da6396ae8e9
SHA512b350031f372b94c54231cb7338b0ccea5d10b57ce5e2134e64bf3154b891316d09ad50aa1efb0d2aa72d5297cad2c380e71ed9384f107d383adf02c8bf9c06b3
-
C:\Users\Admin\AppData\Local\Temp\c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe
Filesize787KB
MD54e91dc4cf618e0c55ca99d0847d4bd6f
SHA1e2f350efab6f81ac8a6c49a2aa1bc31469e6f7c2
SHA256723f5567caa0da7a7e92b0cb3c89284f3a1c4f5103eeeacdb4bdaf3bc070a85e
SHA512a3dcd98a1247920d0f27576e4cecdb545655ded0fe1af47ca38789bd81fc6ee46333230fa0086b338698da72038ca09f279a6074be6f1a76dba2269915096f2d
-
C:\Users\Admin\AppData\Local\Temp\c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe.exe
Filesize787KB
MD54e91dc4cf618e0c55ca99d0847d4bd6f
SHA1e2f350efab6f81ac8a6c49a2aa1bc31469e6f7c2
SHA256723f5567caa0da7a7e92b0cb3c89284f3a1c4f5103eeeacdb4bdaf3bc070a85e
SHA512a3dcd98a1247920d0f27576e4cecdb545655ded0fe1af47ca38789bd81fc6ee46333230fa0086b338698da72038ca09f279a6074be6f1a76dba2269915096f2d
-
Filesize
26KB
MD5925efa8e6ec043b04fdaf9e6c9f95b9f
SHA14bb883e016bdeecc3f21b562df6364944b777ae3
SHA2566513ef9968b68f982fb83460b5919e55470f514db71c3831c2ea5c7b3a2721db
SHA512bf4978b5b10932de14d0c64566768708331f89a815f153323173506aecc296236a22d387b5caceba100c72b44e6b870e879f7350f1abce413bb92d54e70b133e
-
Filesize
26KB
MD5925efa8e6ec043b04fdaf9e6c9f95b9f
SHA14bb883e016bdeecc3f21b562df6364944b777ae3
SHA2566513ef9968b68f982fb83460b5919e55470f514db71c3831c2ea5c7b3a2721db
SHA512bf4978b5b10932de14d0c64566768708331f89a815f153323173506aecc296236a22d387b5caceba100c72b44e6b870e879f7350f1abce413bb92d54e70b133e
-
Filesize
26KB
MD5925efa8e6ec043b04fdaf9e6c9f95b9f
SHA14bb883e016bdeecc3f21b562df6364944b777ae3
SHA2566513ef9968b68f982fb83460b5919e55470f514db71c3831c2ea5c7b3a2721db
SHA512bf4978b5b10932de14d0c64566768708331f89a815f153323173506aecc296236a22d387b5caceba100c72b44e6b870e879f7350f1abce413bb92d54e70b133e
-
Filesize
26KB
MD5925efa8e6ec043b04fdaf9e6c9f95b9f
SHA14bb883e016bdeecc3f21b562df6364944b777ae3
SHA2566513ef9968b68f982fb83460b5919e55470f514db71c3831c2ea5c7b3a2721db
SHA512bf4978b5b10932de14d0c64566768708331f89a815f153323173506aecc296236a22d387b5caceba100c72b44e6b870e879f7350f1abce413bb92d54e70b133e
-
Filesize
9B
MD59fb0d747aab9819a1c8fa05b0d77a547
SHA1e2c0c3a76a6c8c6c5c5455fca3dc7441bf904c55
SHA256da6002d50ace5aa5b493d8ccce59e708decbbd8097b1614910388e1e59f95b96
SHA512cdb7b033dc42633b5addc0a358a744586059a0fe54f3b030bedcc7d1eb0e75b5c68e768c3c964c6046afb6767589db33c39bc83d4c8c6fa4f3b74ad4922c834c
-
\Users\Admin\AppData\Local\Temp\c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe
Filesize787KB
MD54e91dc4cf618e0c55ca99d0847d4bd6f
SHA1e2f350efab6f81ac8a6c49a2aa1bc31469e6f7c2
SHA256723f5567caa0da7a7e92b0cb3c89284f3a1c4f5103eeeacdb4bdaf3bc070a85e
SHA512a3dcd98a1247920d0f27576e4cecdb545655ded0fe1af47ca38789bd81fc6ee46333230fa0086b338698da72038ca09f279a6074be6f1a76dba2269915096f2d