Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe
Resource
win10v2004-20230703-en
General
-
Target
64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe
-
Size
707KB
-
MD5
b824283f13c3297d0540999934f2c0f4
-
SHA1
e066816c5669489508ba8e165a17b697ba369ece
-
SHA256
64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786
-
SHA512
0ef6a95e8ed099405f7bf52f36b19889f696a8d894076b092575cdcb98b56253aa0cf3bde6e77dca1b2281a1d54b67105a15ec956a645a7edc8f3f3e7750f50a
-
SSDEEP
12288:FQ7+1SSnUKJwwgOBReMmc/VDznbvEownBuANaso1p7dZnuKYk0XLR:+7qSSnXRRwn4ANass5ZnurLR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2276 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2428 Logo1_.exe 2812 64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe -
Loads dropped DLL 1 IoCs
pid Process 2276 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Library\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe File created C:\Windows\Logo1_.exe 64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2428 Logo1_.exe 2428 Logo1_.exe 2428 Logo1_.exe 2428 Logo1_.exe 2428 Logo1_.exe 2428 Logo1_.exe 2428 Logo1_.exe 2428 Logo1_.exe 2428 Logo1_.exe 2428 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2276 2364 64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe 28 PID 2364 wrote to memory of 2276 2364 64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe 28 PID 2364 wrote to memory of 2276 2364 64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe 28 PID 2364 wrote to memory of 2276 2364 64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe 28 PID 2364 wrote to memory of 2428 2364 64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe 30 PID 2364 wrote to memory of 2428 2364 64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe 30 PID 2364 wrote to memory of 2428 2364 64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe 30 PID 2364 wrote to memory of 2428 2364 64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe 30 PID 2428 wrote to memory of 2384 2428 Logo1_.exe 31 PID 2428 wrote to memory of 2384 2428 Logo1_.exe 31 PID 2428 wrote to memory of 2384 2428 Logo1_.exe 31 PID 2428 wrote to memory of 2384 2428 Logo1_.exe 31 PID 2384 wrote to memory of 2896 2384 net.exe 33 PID 2384 wrote to memory of 2896 2384 net.exe 33 PID 2384 wrote to memory of 2896 2384 net.exe 33 PID 2384 wrote to memory of 2896 2384 net.exe 33 PID 2428 wrote to memory of 1280 2428 Logo1_.exe 10 PID 2428 wrote to memory of 1280 2428 Logo1_.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe"C:\Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a78C8.bat3⤵
- Deletes itself
- Loads dropped DLL
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe"C:\Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe"4⤵
- Executes dropped EXE
PID:2812
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2896
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5ce3ab54a1686671e1aa06ba0f186d4a6
SHA1751203632351b005366309b86eb6c49fc4427cee
SHA256b5f7b6a45f9e459d340e27aa043cad6305a188674c545a51c237d46470d3744e
SHA51278986f2c05066685ab33c7188c0bff6528d9eb0ab84adaedf2dc45aeb617f853be1a5294494cebbe7e0b8ce2b69c9923d650fb0797d5d3b0c45c068df2e9a60c
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5c955be67c1b2ba24f9a6d144fb6c38f5
SHA15fa7776012d95c33006908c59839c656a8c48572
SHA25690c8146d4b9d797e264194666d9f7d18dbee8aec94c7ba8dfb67f9be3630992c
SHA512d0907bf0f4511b8af8d25704f07148c5de2c213e8c1df5a9d78f6d95d57c8644a966573a60a27df917221f661df82e8a3ebcc815312836956188b11a35f694ee
-
Filesize
722B
MD5c955be67c1b2ba24f9a6d144fb6c38f5
SHA15fa7776012d95c33006908c59839c656a8c48572
SHA25690c8146d4b9d797e264194666d9f7d18dbee8aec94c7ba8dfb67f9be3630992c
SHA512d0907bf0f4511b8af8d25704f07148c5de2c213e8c1df5a9d78f6d95d57c8644a966573a60a27df917221f661df82e8a3ebcc815312836956188b11a35f694ee
-
C:\Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe
Filesize681KB
MD5788896b8239adef16e61f4a25ef16705
SHA147e3a8bdca551bacd4c1cad147c1080a7f45e799
SHA2562be6fff4f0aca183206af72e9e1fb968f0bcad89bd9fa6f4780f68f04d80b609
SHA5123f660a2a1c09cd15e8297fe35e4bfec3308213eec3c8f9626e09ec1c8f1d5b2a21a7c9bebd465a2e593667819a003ade836b375a2c520c40ddea61160192ff2c
-
C:\Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe.exe
Filesize681KB
MD5788896b8239adef16e61f4a25ef16705
SHA147e3a8bdca551bacd4c1cad147c1080a7f45e799
SHA2562be6fff4f0aca183206af72e9e1fb968f0bcad89bd9fa6f4780f68f04d80b609
SHA5123f660a2a1c09cd15e8297fe35e4bfec3308213eec3c8f9626e09ec1c8f1d5b2a21a7c9bebd465a2e593667819a003ade836b375a2c520c40ddea61160192ff2c
-
Filesize
26KB
MD58fe367821d93d8adceae7279c322e47d
SHA1973e03b35086d7450aa872d95ec307429460b8cb
SHA2560100e6f69544ca0befe8a154ef093401a92b6fec6a192414a8b8216ab905924a
SHA51255ea574ec91cf9a24f0dcab54097918adb93f053ae21045f4dd62c3b618207a3fecc22755266f163866d2191e59caf896fcb933fd4dd0646233a662a70c9c442
-
Filesize
26KB
MD58fe367821d93d8adceae7279c322e47d
SHA1973e03b35086d7450aa872d95ec307429460b8cb
SHA2560100e6f69544ca0befe8a154ef093401a92b6fec6a192414a8b8216ab905924a
SHA51255ea574ec91cf9a24f0dcab54097918adb93f053ae21045f4dd62c3b618207a3fecc22755266f163866d2191e59caf896fcb933fd4dd0646233a662a70c9c442
-
Filesize
26KB
MD58fe367821d93d8adceae7279c322e47d
SHA1973e03b35086d7450aa872d95ec307429460b8cb
SHA2560100e6f69544ca0befe8a154ef093401a92b6fec6a192414a8b8216ab905924a
SHA51255ea574ec91cf9a24f0dcab54097918adb93f053ae21045f4dd62c3b618207a3fecc22755266f163866d2191e59caf896fcb933fd4dd0646233a662a70c9c442
-
Filesize
26KB
MD58fe367821d93d8adceae7279c322e47d
SHA1973e03b35086d7450aa872d95ec307429460b8cb
SHA2560100e6f69544ca0befe8a154ef093401a92b6fec6a192414a8b8216ab905924a
SHA51255ea574ec91cf9a24f0dcab54097918adb93f053ae21045f4dd62c3b618207a3fecc22755266f163866d2191e59caf896fcb933fd4dd0646233a662a70c9c442
-
Filesize
9B
MD5ec7139d5bb99bcebaf0b91c58a9ec5aa
SHA170404362dd74e309722fd282c3492ec95674123c
SHA256eb17ae1b1de9e95e0d159893048f2de5c1c158467e768cc0ddbaa517c45e0582
SHA512b0114d8f74b17836819b750cff2b590b652e04bb2dc0e9dc8bffac7ed66bd9ded03cd35abc7fc0fcd0127a994c283dcd162e97e6dd76f5a903ff59e4951dfc48
-
\Users\Admin\AppData\Local\Temp\64fdee75d70c4ed9a77eb83a73ce58c108fcd296bc744a4a6a64be2416fe3786.exe
Filesize681KB
MD5788896b8239adef16e61f4a25ef16705
SHA147e3a8bdca551bacd4c1cad147c1080a7f45e799
SHA2562be6fff4f0aca183206af72e9e1fb968f0bcad89bd9fa6f4780f68f04d80b609
SHA5123f660a2a1c09cd15e8297fe35e4bfec3308213eec3c8f9626e09ec1c8f1d5b2a21a7c9bebd465a2e593667819a003ade836b375a2c520c40ddea61160192ff2c