Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe
Resource
win10v2004-20230703-en
General
-
Target
08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe
-
Size
170KB
-
MD5
e88564b4b8b90025c4a5030c335e9e1d
-
SHA1
0ec482e5e1ca40c6e67e5791f5330c1fa06d719b
-
SHA256
08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37
-
SHA512
67e6d34ca75fe0e13bb6cff2f773add5b621f086ec61b41a8729026092c5c61c84ca2b8e0c60b76c1ef1138955f409dab7544a7597a982b587b71a7292f752fa
-
SSDEEP
3072:DftffjmNwfRoFANgYolUuvJj6YTpxmw8n2jbR0M+dtY4B1PrYsCdS2K:TVfjmNgGFANgYrQJjfTyT2jvChB1zc5K
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2404 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2424 Logo1_.exe 1640 08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe -
Loads dropped DLL 1 IoCs
pid Process 2404 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\STS2\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\Bibliography\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe File created C:\Windows\Logo1_.exe 08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2404 2208 08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe 28 PID 2208 wrote to memory of 2404 2208 08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe 28 PID 2208 wrote to memory of 2404 2208 08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe 28 PID 2208 wrote to memory of 2404 2208 08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe 28 PID 2208 wrote to memory of 2424 2208 08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe 30 PID 2208 wrote to memory of 2424 2208 08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe 30 PID 2208 wrote to memory of 2424 2208 08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe 30 PID 2208 wrote to memory of 2424 2208 08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe 30 PID 2424 wrote to memory of 2644 2424 Logo1_.exe 31 PID 2424 wrote to memory of 2644 2424 Logo1_.exe 31 PID 2424 wrote to memory of 2644 2424 Logo1_.exe 31 PID 2424 wrote to memory of 2644 2424 Logo1_.exe 31 PID 2404 wrote to memory of 1640 2404 cmd.exe 33 PID 2404 wrote to memory of 1640 2404 cmd.exe 33 PID 2404 wrote to memory of 1640 2404 cmd.exe 33 PID 2404 wrote to memory of 1640 2404 cmd.exe 33 PID 2644 wrote to memory of 620 2644 net.exe 34 PID 2644 wrote to memory of 620 2644 net.exe 34 PID 2644 wrote to memory of 620 2644 net.exe 34 PID 2644 wrote to memory of 620 2644 net.exe 34 PID 2424 wrote to memory of 1280 2424 Logo1_.exe 21 PID 2424 wrote to memory of 1280 2424 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe"C:\Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a8575.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe"C:\Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe"4⤵
- Executes dropped EXE
PID:1640
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:620
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD59b0bc8b1993876f0e2827074f00b2bbc
SHA15ad84492247a9e78bd49b81391cdf66395828c11
SHA256f2abf093d8a85efe8804e03df77ef3f7b7393240449e24ecd2b7ff5a371e64a1
SHA512780b1a15d3caf3ef07b63dc1def60ad024a85695c3a8fa99a2c57c13f005e3273ec9708ac9ae1094ed6efdcbb2eb92414292d081bc58ba7ab55ba6d81304b89a
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD50e2a7b58ad448a619d0d0ac62c74ff88
SHA1e5b2e912e182d14791246fcada9a246f818a4bb0
SHA256ed56861ddda5dde09fad50c9709595833dc8bac0a6bbf375dc44efdc051667c0
SHA512f065b3d7e2e02d675629a5b302db34584349022eb6a8ba9a800bee78143451d32e8d4a33e2a2fd3a68f6564154322c0d144ca37ff9b7c59ad470b87177c43a6d
-
Filesize
722B
MD50e2a7b58ad448a619d0d0ac62c74ff88
SHA1e5b2e912e182d14791246fcada9a246f818a4bb0
SHA256ed56861ddda5dde09fad50c9709595833dc8bac0a6bbf375dc44efdc051667c0
SHA512f065b3d7e2e02d675629a5b302db34584349022eb6a8ba9a800bee78143451d32e8d4a33e2a2fd3a68f6564154322c0d144ca37ff9b7c59ad470b87177c43a6d
-
C:\Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe
Filesize144KB
MD58730e7c3de224d3521593dfec6b4af8e
SHA113d95b1ee77d16135a5bcfc9021128657757dbd5
SHA256e2e08144cf62bac6a7325125abbe3e64452fa2455a5210f5ed9c362f95e4009e
SHA5128f4345da0cc35ed1f04372e216efb0fe2edcdef7d353bb586f3ae8ff92de25bb18e4a03e08465328a3103b649c3b03855835e5eae6b726f983408989cde02cf4
-
C:\Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe.exe
Filesize144KB
MD58730e7c3de224d3521593dfec6b4af8e
SHA113d95b1ee77d16135a5bcfc9021128657757dbd5
SHA256e2e08144cf62bac6a7325125abbe3e64452fa2455a5210f5ed9c362f95e4009e
SHA5128f4345da0cc35ed1f04372e216efb0fe2edcdef7d353bb586f3ae8ff92de25bb18e4a03e08465328a3103b649c3b03855835e5eae6b726f983408989cde02cf4
-
Filesize
26KB
MD58ffc219ecd87d53276239ce7e62a7bb9
SHA15181c0e6bab0852e9f8139df9771ff6f5db64d20
SHA256c5f1c38f3615c99b0bec3e310b9806480a66fa230db4eb216875e20465f4ebe0
SHA5127cc6c938404420ce4175723b1339292ceeabc42728304e720350588c605b84277e64b5e009eea5b0ae56f6cd50534a334b49d2b45b467b598e45699275e6481f
-
Filesize
26KB
MD58ffc219ecd87d53276239ce7e62a7bb9
SHA15181c0e6bab0852e9f8139df9771ff6f5db64d20
SHA256c5f1c38f3615c99b0bec3e310b9806480a66fa230db4eb216875e20465f4ebe0
SHA5127cc6c938404420ce4175723b1339292ceeabc42728304e720350588c605b84277e64b5e009eea5b0ae56f6cd50534a334b49d2b45b467b598e45699275e6481f
-
Filesize
26KB
MD58ffc219ecd87d53276239ce7e62a7bb9
SHA15181c0e6bab0852e9f8139df9771ff6f5db64d20
SHA256c5f1c38f3615c99b0bec3e310b9806480a66fa230db4eb216875e20465f4ebe0
SHA5127cc6c938404420ce4175723b1339292ceeabc42728304e720350588c605b84277e64b5e009eea5b0ae56f6cd50534a334b49d2b45b467b598e45699275e6481f
-
Filesize
26KB
MD58ffc219ecd87d53276239ce7e62a7bb9
SHA15181c0e6bab0852e9f8139df9771ff6f5db64d20
SHA256c5f1c38f3615c99b0bec3e310b9806480a66fa230db4eb216875e20465f4ebe0
SHA5127cc6c938404420ce4175723b1339292ceeabc42728304e720350588c605b84277e64b5e009eea5b0ae56f6cd50534a334b49d2b45b467b598e45699275e6481f
-
Filesize
9B
MD5c0232c2f01c543d260713210da47a57b
SHA163f2c13c2c5c83091133c2802e69993d52e3ec65
SHA256278e1b8fd3f40d95faaecf548098b8d9ee4b32e98a8878559c8c8dfcd5cd1197
SHA5122ccfd67393a63f03f588296bb798d7a7d4ec2ea5d6ac486cb7bdf8a5a66b1df944d8b548f317e58bfe17dea2ae54e536ffe77bc11a43c931f3d10e299ab3fca0
-
\Users\Admin\AppData\Local\Temp\08fe09f46ad8f6a47621d2371fa997a217e9d0ba941361ccb7bb647a45ec4f37.exe
Filesize144KB
MD58730e7c3de224d3521593dfec6b4af8e
SHA113d95b1ee77d16135a5bcfc9021128657757dbd5
SHA256e2e08144cf62bac6a7325125abbe3e64452fa2455a5210f5ed9c362f95e4009e
SHA5128f4345da0cc35ed1f04372e216efb0fe2edcdef7d353bb586f3ae8ff92de25bb18e4a03e08465328a3103b649c3b03855835e5eae6b726f983408989cde02cf4