Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18/09/2023, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe
Resource
win10v2004-20230915-en
General
-
Target
701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe
-
Size
67KB
-
MD5
915387b5f809ba6f511c5f202fd40bc7
-
SHA1
6fc8566909f539126af3545fff4dd3c1e2be0c25
-
SHA256
701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07
-
SHA512
5dffea73a8462f9a85b1927af71f4b7319484b2167aa2bb7b2998d267d23260e6935abe524121985c30c52e8e89583fc64b489214011783b90dc1a8bbf2340d2
-
SSDEEP
1536:zX2fgLdQAQfcfymN8S78pHnO1YYJSofrK8/ca5Ufa:6ftffjmN8oAHnOWYJSofrKINn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2604 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2144 Logo1_.exe 1212 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe -
Loads dropped DLL 1 IoCs
pid Process 2604 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Portal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe File created C:\Windows\Logo1_.exe 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe 2144 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2604 2260 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 28 PID 2260 wrote to memory of 2604 2260 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 28 PID 2260 wrote to memory of 2604 2260 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 28 PID 2260 wrote to memory of 2604 2260 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 28 PID 2260 wrote to memory of 2144 2260 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 29 PID 2260 wrote to memory of 2144 2260 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 29 PID 2260 wrote to memory of 2144 2260 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 29 PID 2260 wrote to memory of 2144 2260 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 29 PID 2144 wrote to memory of 2800 2144 Logo1_.exe 31 PID 2144 wrote to memory of 2800 2144 Logo1_.exe 31 PID 2144 wrote to memory of 2800 2144 Logo1_.exe 31 PID 2144 wrote to memory of 2800 2144 Logo1_.exe 31 PID 2800 wrote to memory of 1224 2800 net.exe 33 PID 2604 wrote to memory of 1212 2604 cmd.exe 34 PID 2604 wrote to memory of 1212 2604 cmd.exe 34 PID 2604 wrote to memory of 1212 2604 cmd.exe 34 PID 2604 wrote to memory of 1212 2604 cmd.exe 34 PID 2800 wrote to memory of 1224 2800 net.exe 33 PID 2800 wrote to memory of 1224 2800 net.exe 33 PID 2800 wrote to memory of 1224 2800 net.exe 33 PID 2144 wrote to memory of 1260 2144 Logo1_.exe 14 PID 2144 wrote to memory of 1260 2144 Logo1_.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe"C:\Users\Admin\AppData\Local\Temp\701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4672.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe"C:\Users\Admin\AppData\Local\Temp\701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe"4⤵
- Executes dropped EXE
PID:1212
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1224
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5266949157df19e1aacd5c1a3ef5b6dac
SHA1e7c9c2f6e009765c05af6aa5ada567ae1c60cff4
SHA2560729d603041bada5b6b4d5b2339bd6a89dcad4423b1f97d8d1cf5fdf3ecffdd0
SHA5120288c661c96ad23ec4a7b1d1ec1f8871c77f8439e5133234ff51e24cf9d24cf2bdeb899cea0c50bc6d71bd609667b05149875778c0dfd2005032df167634fd02
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD533fd96140c71278429f531727a67012f
SHA1b635a9a7a2d0004ac35c9ea051e353e72677473d
SHA2568b6984231c399dc57d4b273b9959930b1d522489e96940e10267ab73950f4661
SHA5129baf98430b249bea68bd175eef4a701e2f3a43c2b9452df950f1898b84b386e07d48452f9b934cb49f37d62774c8cfc5999c915de2869557046b133a4fe4113d
-
Filesize
722B
MD533fd96140c71278429f531727a67012f
SHA1b635a9a7a2d0004ac35c9ea051e353e72677473d
SHA2568b6984231c399dc57d4b273b9959930b1d522489e96940e10267ab73950f4661
SHA5129baf98430b249bea68bd175eef4a701e2f3a43c2b9452df950f1898b84b386e07d48452f9b934cb49f37d62774c8cfc5999c915de2869557046b133a4fe4113d
-
C:\Users\Admin\AppData\Local\Temp\701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe
Filesize40KB
MD5c8fa6511985c904cc8db0b33254d87e8
SHA11e139da3db29efe23f6df60dbcfff5e1fc9845bb
SHA2562ad24c419a4fc36f680f599be1221a5a4a214886ea1b21f56a30c0cac885ae7d
SHA5125c384bbfcf447ad4ec8fc0ca5c2df8cc66a9603aa841697152a775346b3a7891b66bf8a777a960d055c67b032d914145813e77d6e925f6b004afcb3799f95434
-
C:\Users\Admin\AppData\Local\Temp\701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe.exe
Filesize40KB
MD5c8fa6511985c904cc8db0b33254d87e8
SHA11e139da3db29efe23f6df60dbcfff5e1fc9845bb
SHA2562ad24c419a4fc36f680f599be1221a5a4a214886ea1b21f56a30c0cac885ae7d
SHA5125c384bbfcf447ad4ec8fc0ca5c2df8cc66a9603aa841697152a775346b3a7891b66bf8a777a960d055c67b032d914145813e77d6e925f6b004afcb3799f95434
-
Filesize
26KB
MD5c3165d40a734c60853b7ce8536f86b1f
SHA141c122c44d36d2e6004b2a513e97c8f8351f75c2
SHA256424cc4d8c565f8c8f4061ca15be00408194a8ab2abc5b5d49eb1bf175aa566cd
SHA5126b077839e54043bcbb2edbc54a620d058a8264b0e373183a0696bfb81bc045ad1218c17bc35da2fdff9cb635597a8096c9a614c7a36308b268438fb4e324c698
-
Filesize
26KB
MD5c3165d40a734c60853b7ce8536f86b1f
SHA141c122c44d36d2e6004b2a513e97c8f8351f75c2
SHA256424cc4d8c565f8c8f4061ca15be00408194a8ab2abc5b5d49eb1bf175aa566cd
SHA5126b077839e54043bcbb2edbc54a620d058a8264b0e373183a0696bfb81bc045ad1218c17bc35da2fdff9cb635597a8096c9a614c7a36308b268438fb4e324c698
-
Filesize
26KB
MD5c3165d40a734c60853b7ce8536f86b1f
SHA141c122c44d36d2e6004b2a513e97c8f8351f75c2
SHA256424cc4d8c565f8c8f4061ca15be00408194a8ab2abc5b5d49eb1bf175aa566cd
SHA5126b077839e54043bcbb2edbc54a620d058a8264b0e373183a0696bfb81bc045ad1218c17bc35da2fdff9cb635597a8096c9a614c7a36308b268438fb4e324c698
-
Filesize
26KB
MD5c3165d40a734c60853b7ce8536f86b1f
SHA141c122c44d36d2e6004b2a513e97c8f8351f75c2
SHA256424cc4d8c565f8c8f4061ca15be00408194a8ab2abc5b5d49eb1bf175aa566cd
SHA5126b077839e54043bcbb2edbc54a620d058a8264b0e373183a0696bfb81bc045ad1218c17bc35da2fdff9cb635597a8096c9a614c7a36308b268438fb4e324c698
-
Filesize
9B
MD59871758f1c8c7fb518b6793d4aa66294
SHA12808f61dd22a0bf12c85bbc65326e0bfe2f7f627
SHA2561f836ee8dbd13a9f1fa0f2de0976570138232addb74f0a354ed9b499191dc80d
SHA512a261ec877b3ccc43db77712359d10c360a50f420fed5cf6a65fd6894d2cd5055f5b72f85edb823a1da22121955aaaa6da34550da9f825c12982602c579a6bb3d
-
\Users\Admin\AppData\Local\Temp\701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe
Filesize40KB
MD5c8fa6511985c904cc8db0b33254d87e8
SHA11e139da3db29efe23f6df60dbcfff5e1fc9845bb
SHA2562ad24c419a4fc36f680f599be1221a5a4a214886ea1b21f56a30c0cac885ae7d
SHA5125c384bbfcf447ad4ec8fc0ca5c2df8cc66a9603aa841697152a775346b3a7891b66bf8a777a960d055c67b032d914145813e77d6e925f6b004afcb3799f95434