Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/09/2023, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe
Resource
win10v2004-20230831-en
General
-
Target
1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe
-
Size
49KB
-
MD5
e6d48b3718b0763d1ee4796b1eebc39a
-
SHA1
62c36b75c3bfa51dd681e2a1a3c34d2de291661a
-
SHA256
1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce
-
SHA512
9401e9f1e8a519b8a64fca71aee80c78a0e9188b357f50595177e658a234592c2c42badbc93a7f06300c1e09d2710cc06293793f1007f250b87827aa03994a7d
-
SSDEEP
768:pZnXjf16GVRu1yK9fMnJG2V9dHS8mnV9P8CGZ2F1dfKDG71Uf2hj:pZnXjN3SHuJV9NiV99df51UfW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2212 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1092 Logo1_.exe 2760 1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe -
Loads dropped DLL 1 IoCs
pid Process 2212 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Games\Minesweeper\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe File created C:\Windows\Logo1_.exe 1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1092 Logo1_.exe 1092 Logo1_.exe 1092 Logo1_.exe 1092 Logo1_.exe 1092 Logo1_.exe 1092 Logo1_.exe 1092 Logo1_.exe 1092 Logo1_.exe 1092 Logo1_.exe 1092 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2212 2972 1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe 28 PID 2972 wrote to memory of 2212 2972 1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe 28 PID 2972 wrote to memory of 2212 2972 1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe 28 PID 2972 wrote to memory of 2212 2972 1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe 28 PID 2972 wrote to memory of 1092 2972 1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe 30 PID 2972 wrote to memory of 1092 2972 1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe 30 PID 2972 wrote to memory of 1092 2972 1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe 30 PID 2972 wrote to memory of 1092 2972 1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe 30 PID 1092 wrote to memory of 2260 1092 Logo1_.exe 31 PID 1092 wrote to memory of 2260 1092 Logo1_.exe 31 PID 1092 wrote to memory of 2260 1092 Logo1_.exe 31 PID 1092 wrote to memory of 2260 1092 Logo1_.exe 31 PID 2212 wrote to memory of 2760 2212 cmd.exe 33 PID 2212 wrote to memory of 2760 2212 cmd.exe 33 PID 2212 wrote to memory of 2760 2212 cmd.exe 33 PID 2212 wrote to memory of 2760 2212 cmd.exe 33 PID 2260 wrote to memory of 2880 2260 net.exe 34 PID 2260 wrote to memory of 2880 2260 net.exe 34 PID 2260 wrote to memory of 2880 2260 net.exe 34 PID 2260 wrote to memory of 2880 2260 net.exe 34 PID 1092 wrote to memory of 1260 1092 Logo1_.exe 15 PID 1092 wrote to memory of 1260 1092 Logo1_.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe"C:\Users\Admin\AppData\Local\Temp\1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a40B8.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe"C:\Users\Admin\AppData\Local\Temp\1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe"4⤵
- Executes dropped EXE
PID:2760
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2880
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5e689c29da266201da624380c99210d7a
SHA1f2e582dab9e0b507c05a90b7d7b353253d1479cb
SHA25614563ed51a3a2161def033a46ba7c60499b6386484ed514c26f78b73e237a627
SHA51248975ab15b16c7035157649a41f212b01a91a57348bd8cdd412769839210ca308f91ea77ab6e804e903e174b72820e4280eecd14709493df0ea2e9da5efa030d
-
Filesize
474KB
MD54fd672068b4fa9ace0605d7554d11dfa
SHA18058f5be0c2800dc82e67ab31f303990c561e98e
SHA256264a00d6c978f93cd74998628bc8b6ce7904d428b21a8d81c4d26f3dffe0173f
SHA512f6543c1e11ff263c00597a204a111aa7192610baaeabb488dd533fea4da4c5901e8852985681bb3172a4b2d4a8454931beae47186e8bbf633d11b0dcbc6080da
-
Filesize
722B
MD5cbb7b2c684ffdf93dff0912afb449710
SHA1c4e0a32c0cefdf166cef87d6f7248251a5c21604
SHA25693fb65de6ddc9198c265996e7dc6737dd4f31a0d1d9121540a134d632baca1a2
SHA5121af0cb21a62d09155f60b56348247ce1d9b8fc4335fb891576b3ba6d949c784ca91bf26806b2ef42193c372b1b669a0c0866a68eabca3b97ebb7290e2ac93b19
-
Filesize
722B
MD5cbb7b2c684ffdf93dff0912afb449710
SHA1c4e0a32c0cefdf166cef87d6f7248251a5c21604
SHA25693fb65de6ddc9198c265996e7dc6737dd4f31a0d1d9121540a134d632baca1a2
SHA5121af0cb21a62d09155f60b56348247ce1d9b8fc4335fb891576b3ba6d949c784ca91bf26806b2ef42193c372b1b669a0c0866a68eabca3b97ebb7290e2ac93b19
-
C:\Users\Admin\AppData\Local\Temp\1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe
Filesize20KB
MD594a009b84ac602600536c23977f12a1f
SHA19bfd949a6c0f54e975668b317932c31165c9bc66
SHA2565a9fb4fe5135e2c78e27b05fa1a2be2c4da0838b34f4949f3b9458345b89f8d9
SHA51227b087f2b7773f9c11c205a7b97d60ea169b1490b7e9a5098cbeb397e8338209843598db31c9037a3db7fe66720d5197f31d5a92e2b91c9013aed77ceda72b8d
-
C:\Users\Admin\AppData\Local\Temp\1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe.exe
Filesize20KB
MD594a009b84ac602600536c23977f12a1f
SHA19bfd949a6c0f54e975668b317932c31165c9bc66
SHA2565a9fb4fe5135e2c78e27b05fa1a2be2c4da0838b34f4949f3b9458345b89f8d9
SHA51227b087f2b7773f9c11c205a7b97d60ea169b1490b7e9a5098cbeb397e8338209843598db31c9037a3db7fe66720d5197f31d5a92e2b91c9013aed77ceda72b8d
-
Filesize
29KB
MD591cc870a2e033845ccd705e5615229e3
SHA1ee50320fa6fb77dbd099443c67b5223dfc26817f
SHA2568cef20d8fbb35b4552ab0cd4cab0de1f186befbba4fa0d6f70e5505fda9a4341
SHA512c14e6dfb3c3a24ddda42710787077765f7dca3a2c9d94c898481ffdbaaa1e90469cdba75ff26f23206d48d125d685b67530c0a89456942f091651a8862f20b5b
-
Filesize
29KB
MD591cc870a2e033845ccd705e5615229e3
SHA1ee50320fa6fb77dbd099443c67b5223dfc26817f
SHA2568cef20d8fbb35b4552ab0cd4cab0de1f186befbba4fa0d6f70e5505fda9a4341
SHA512c14e6dfb3c3a24ddda42710787077765f7dca3a2c9d94c898481ffdbaaa1e90469cdba75ff26f23206d48d125d685b67530c0a89456942f091651a8862f20b5b
-
Filesize
29KB
MD591cc870a2e033845ccd705e5615229e3
SHA1ee50320fa6fb77dbd099443c67b5223dfc26817f
SHA2568cef20d8fbb35b4552ab0cd4cab0de1f186befbba4fa0d6f70e5505fda9a4341
SHA512c14e6dfb3c3a24ddda42710787077765f7dca3a2c9d94c898481ffdbaaa1e90469cdba75ff26f23206d48d125d685b67530c0a89456942f091651a8862f20b5b
-
Filesize
29KB
MD591cc870a2e033845ccd705e5615229e3
SHA1ee50320fa6fb77dbd099443c67b5223dfc26817f
SHA2568cef20d8fbb35b4552ab0cd4cab0de1f186befbba4fa0d6f70e5505fda9a4341
SHA512c14e6dfb3c3a24ddda42710787077765f7dca3a2c9d94c898481ffdbaaa1e90469cdba75ff26f23206d48d125d685b67530c0a89456942f091651a8862f20b5b
-
Filesize
8B
MD56bdc569e34ba772e6a02bf98e5269208
SHA1d6e9053ccd9906f78c9f4dd12414246f31622d49
SHA256a2f6c9ea9fb63e52c84ba26b60450f841bafcf7378af3f8310c32c86701dc148
SHA512d25858c63ebf7077fbf1a96c3fbb6577cab1ebd3d133f6982672e6c721bebee655028a8f35292c1c3fc1d3d1a166256da32a54e3981c453fa0b30df3b2278ee0
-
\Users\Admin\AppData\Local\Temp\1607e6a2ad3269fd646f029a23a188605554bbdeccc0ea5a5718d70752a3d3ce.exe
Filesize20KB
MD594a009b84ac602600536c23977f12a1f
SHA19bfd949a6c0f54e975668b317932c31165c9bc66
SHA2565a9fb4fe5135e2c78e27b05fa1a2be2c4da0838b34f4949f3b9458345b89f8d9
SHA51227b087f2b7773f9c11c205a7b97d60ea169b1490b7e9a5098cbeb397e8338209843598db31c9037a3db7fe66720d5197f31d5a92e2b91c9013aed77ceda72b8d