Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe
Resource
win10v2004-20230915-en
General
-
Target
701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe
-
Size
67KB
-
MD5
915387b5f809ba6f511c5f202fd40bc7
-
SHA1
6fc8566909f539126af3545fff4dd3c1e2be0c25
-
SHA256
701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07
-
SHA512
5dffea73a8462f9a85b1927af71f4b7319484b2167aa2bb7b2998d267d23260e6935abe524121985c30c52e8e89583fc64b489214011783b90dc1a8bbf2340d2
-
SSDEEP
1536:zX2fgLdQAQfcfymN8S78pHnO1YYJSofrK8/ca5Ufa:6ftffjmN8oAHnOWYJSofrKINn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2252 Logo1_.exe 1596 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\Google\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lt-LT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\uz-Latn-UZ\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\MLModels\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lt-LT\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_2020.1906.55.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\unpack200.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_2019.125.2243.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-Toolkit\Images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Lumia.MagicEdit\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\core\locale\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe File created C:\Windows\Logo1_.exe 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe 2252 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4328 wrote to memory of 764 4328 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 86 PID 4328 wrote to memory of 764 4328 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 86 PID 4328 wrote to memory of 764 4328 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 86 PID 4328 wrote to memory of 2252 4328 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 87 PID 4328 wrote to memory of 2252 4328 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 87 PID 4328 wrote to memory of 2252 4328 701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe 87 PID 2252 wrote to memory of 640 2252 Logo1_.exe 89 PID 2252 wrote to memory of 640 2252 Logo1_.exe 89 PID 2252 wrote to memory of 640 2252 Logo1_.exe 89 PID 640 wrote to memory of 1120 640 net.exe 91 PID 640 wrote to memory of 1120 640 net.exe 91 PID 640 wrote to memory of 1120 640 net.exe 91 PID 764 wrote to memory of 1596 764 cmd.exe 93 PID 764 wrote to memory of 1596 764 cmd.exe 93 PID 2252 wrote to memory of 3112 2252 Logo1_.exe 45 PID 2252 wrote to memory of 3112 2252 Logo1_.exe 45
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe"C:\Users\Admin\AppData\Local\Temp\701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a80D8.bat3⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe"C:\Users\Admin\AppData\Local\Temp\701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe"4⤵
- Executes dropped EXE
PID:1596
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1120
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5266949157df19e1aacd5c1a3ef5b6dac
SHA1e7c9c2f6e009765c05af6aa5ada567ae1c60cff4
SHA2560729d603041bada5b6b4d5b2339bd6a89dcad4423b1f97d8d1cf5fdf3ecffdd0
SHA5120288c661c96ad23ec4a7b1d1ec1f8871c77f8439e5133234ff51e24cf9d24cf2bdeb899cea0c50bc6d71bd609667b05149875778c0dfd2005032df167634fd02
-
Filesize
484KB
MD55be58227a9a27d91f4098f606492d903
SHA1034df2edc95ad4dbf5c0ea36dce1a1ed6be553aa
SHA2564764914558013eab10bcdd6773a5293fcbe6c29d95ad1ef4a16bf39a8ecae28b
SHA512fd512e5a23760572632a1d8fe1df043d2ac18644f2a13b15e9a16ff4cbcfa5ff03e56dac163df32af06783f167693db1fd7cc576757565361bf62e7c441b9581
-
Filesize
722B
MD59bfe8782027050382984b2caf066a0c2
SHA1d317e0493bcdeedc867862b05f5543cba6c204a2
SHA2565b935f999839db1b7aa578bd033f0fbc030a3a796b7a1ad7d86d2ced599b1352
SHA512486292ef3dfdbad54106d7128c065e42cf0538f1970286971936249dcf56c7958368c1787dd60b8beecca516f2dac4a5eb133338c94c3ddea21454d78743c76c
-
C:\Users\Admin\AppData\Local\Temp\701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe
Filesize40KB
MD5c8fa6511985c904cc8db0b33254d87e8
SHA11e139da3db29efe23f6df60dbcfff5e1fc9845bb
SHA2562ad24c419a4fc36f680f599be1221a5a4a214886ea1b21f56a30c0cac885ae7d
SHA5125c384bbfcf447ad4ec8fc0ca5c2df8cc66a9603aa841697152a775346b3a7891b66bf8a777a960d055c67b032d914145813e77d6e925f6b004afcb3799f95434
-
C:\Users\Admin\AppData\Local\Temp\701ea1aa973f5b08316ffa06c2a816b3868b03f4c098d7354e025534df32ff07.exe.exe
Filesize40KB
MD5c8fa6511985c904cc8db0b33254d87e8
SHA11e139da3db29efe23f6df60dbcfff5e1fc9845bb
SHA2562ad24c419a4fc36f680f599be1221a5a4a214886ea1b21f56a30c0cac885ae7d
SHA5125c384bbfcf447ad4ec8fc0ca5c2df8cc66a9603aa841697152a775346b3a7891b66bf8a777a960d055c67b032d914145813e77d6e925f6b004afcb3799f95434
-
Filesize
26KB
MD5c3165d40a734c60853b7ce8536f86b1f
SHA141c122c44d36d2e6004b2a513e97c8f8351f75c2
SHA256424cc4d8c565f8c8f4061ca15be00408194a8ab2abc5b5d49eb1bf175aa566cd
SHA5126b077839e54043bcbb2edbc54a620d058a8264b0e373183a0696bfb81bc045ad1218c17bc35da2fdff9cb635597a8096c9a614c7a36308b268438fb4e324c698
-
Filesize
26KB
MD5c3165d40a734c60853b7ce8536f86b1f
SHA141c122c44d36d2e6004b2a513e97c8f8351f75c2
SHA256424cc4d8c565f8c8f4061ca15be00408194a8ab2abc5b5d49eb1bf175aa566cd
SHA5126b077839e54043bcbb2edbc54a620d058a8264b0e373183a0696bfb81bc045ad1218c17bc35da2fdff9cb635597a8096c9a614c7a36308b268438fb4e324c698
-
Filesize
26KB
MD5c3165d40a734c60853b7ce8536f86b1f
SHA141c122c44d36d2e6004b2a513e97c8f8351f75c2
SHA256424cc4d8c565f8c8f4061ca15be00408194a8ab2abc5b5d49eb1bf175aa566cd
SHA5126b077839e54043bcbb2edbc54a620d058a8264b0e373183a0696bfb81bc045ad1218c17bc35da2fdff9cb635597a8096c9a614c7a36308b268438fb4e324c698
-
Filesize
9B
MD59871758f1c8c7fb518b6793d4aa66294
SHA12808f61dd22a0bf12c85bbc65326e0bfe2f7f627
SHA2561f836ee8dbd13a9f1fa0f2de0976570138232addb74f0a354ed9b499191dc80d
SHA512a261ec877b3ccc43db77712359d10c360a50f420fed5cf6a65fd6894d2cd5055f5b72f85edb823a1da22121955aaaa6da34550da9f825c12982602c579a6bb3d