Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
6s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe
Resource
win10v2004-20230703-en
General
-
Target
055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe
-
Size
97KB
-
MD5
11c5b899bc2eec52ed990a8013e7ef10
-
SHA1
f6eac0a0cba5ef91708c038a3fb091fc8f34e55b
-
SHA256
055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95
-
SHA512
d866efb6c17da9c2a588ed5add29593ebc5a9bf4ecd69d8c3bb33d4a4a2864dc1f81842117558544098fd26e8d86c73b44205f8038bff438c05768b72605e64b
-
SSDEEP
3072:KDftffjmN+CTlvbhgdgTIMV/Vo7Bsxrkx:qVfjmNL1gd7y0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5012 Logo1_.exe 776 055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe -
Enumerates connected drives 3 TTPs 20 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe File created C:\Windows\Logo1_.exe 055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe 5012 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1808 wrote to memory of 5040 1808 055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe 82 PID 1808 wrote to memory of 5040 1808 055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe 82 PID 1808 wrote to memory of 5040 1808 055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe 82 PID 1808 wrote to memory of 5012 1808 055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe 83 PID 1808 wrote to memory of 5012 1808 055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe 83 PID 1808 wrote to memory of 5012 1808 055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe 83 PID 5012 wrote to memory of 4372 5012 Logo1_.exe 85 PID 5012 wrote to memory of 4372 5012 Logo1_.exe 85 PID 5012 wrote to memory of 4372 5012 Logo1_.exe 85 PID 4372 wrote to memory of 3756 4372 net.exe 87 PID 4372 wrote to memory of 3756 4372 net.exe 87 PID 4372 wrote to memory of 3756 4372 net.exe 87 PID 5040 wrote to memory of 776 5040 cmd.exe 88 PID 5040 wrote to memory of 776 5040 cmd.exe 88 PID 5012 wrote to memory of 3164 5012 Logo1_.exe 54 PID 5012 wrote to memory of 3164 5012 Logo1_.exe 54
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe"C:\Users\Admin\AppData\Local\Temp\055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7D3E.bat3⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe"C:\Users\Admin\AppData\Local\Temp\055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe"4⤵
- Executes dropped EXE
PID:776
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3756
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD554a10dc3b1434b6beca2ddeafc4b8984
SHA15a4f72bccf8ce14e5a3056c064839de1f6b0e2e9
SHA256305f3c63e96819666de5122f6e1cdec1e4dad2c8b82dd50bc3d7b47047a0886d
SHA512ef84e00611bcd7e75ec73e8663c768a3a76d4ba2cd34f69889c8745fe0672299c94496999e3bc891b8e94586b2e68cb1e7ee00736b9ea03a884f99c396b9eb3a
-
C:\Users\Admin\AppData\Local\Temp\055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe
Filesize71KB
MD512db3a3d8e38797243fbf460a465cdcc
SHA18764ae88d483d4580e7edadd145f6e0cacb61d95
SHA2565eb76f8d21129085c18cfef50c790b95df7d4f371f6bcf2705449e3f972d2bea
SHA512eec9bd6e0216a895efd4264590f15743e144bb4132b94d662c379a6ae679180df164547caa508f533a7aacbd4c244b7b3b2425717a7a1ebe8564bddf569558a0
-
C:\Users\Admin\AppData\Local\Temp\055099ebbe7a6a6fceba9cbcbee15df02b7bbd7dd0ea987140fce7df353dff95.exe.exe
Filesize71KB
MD512db3a3d8e38797243fbf460a465cdcc
SHA18764ae88d483d4580e7edadd145f6e0cacb61d95
SHA2565eb76f8d21129085c18cfef50c790b95df7d4f371f6bcf2705449e3f972d2bea
SHA512eec9bd6e0216a895efd4264590f15743e144bb4132b94d662c379a6ae679180df164547caa508f533a7aacbd4c244b7b3b2425717a7a1ebe8564bddf569558a0
-
Filesize
26KB
MD5ba368f8c05d08e18b8f6665dfa445a38
SHA1aef67dd8cf4cc4c263aa83ffd71e57399ea8c080
SHA256eebabcf5f40532ff91cbf026fa8c5e3618c8f3089b754749541c4ca2cfefcfe2
SHA5122dd56b8be5b530cb408149bac9e5a029dce0b476c5651423691c99f813d35972997471eefbfc39a37891b71367f25c04350bcd3e25183eeda9c9c78e37aa21bd
-
Filesize
26KB
MD5ba368f8c05d08e18b8f6665dfa445a38
SHA1aef67dd8cf4cc4c263aa83ffd71e57399ea8c080
SHA256eebabcf5f40532ff91cbf026fa8c5e3618c8f3089b754749541c4ca2cfefcfe2
SHA5122dd56b8be5b530cb408149bac9e5a029dce0b476c5651423691c99f813d35972997471eefbfc39a37891b71367f25c04350bcd3e25183eeda9c9c78e37aa21bd
-
Filesize
26KB
MD5ba368f8c05d08e18b8f6665dfa445a38
SHA1aef67dd8cf4cc4c263aa83ffd71e57399ea8c080
SHA256eebabcf5f40532ff91cbf026fa8c5e3618c8f3089b754749541c4ca2cfefcfe2
SHA5122dd56b8be5b530cb408149bac9e5a029dce0b476c5651423691c99f813d35972997471eefbfc39a37891b71367f25c04350bcd3e25183eeda9c9c78e37aa21bd