Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/09/2023, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe
Resource
win10v2004-20230915-en
General
-
Target
c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe
-
Size
520KB
-
MD5
3b4fa16b085177077129ee22d946fa7a
-
SHA1
007a18f9d487149ec5316cdddf647c009a1848a2
-
SHA256
c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f
-
SHA512
43afc7734c26cb06f6200749b34f59c6c96d38fd0b4f653db490bd272a3c48e5ba9556761cca31ab57daa0751f508773465dfa4b744c9a1a6fde99e7cf5c9538
-
SSDEEP
12288:C7+ONcKAEJ6RLtx4c8PF39A55nJTuxGfqseVF+J92QpCgGy9RTPq6xy3NhYhYUnB:C7rNcKAEJ6Rpx4c8PF39A55nJMGfqse0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2824 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2044 Logo1_.exe 2892 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe -
Loads dropped DLL 2 IoCs
pid Process 2824 cmd.exe 2824 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Basic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{2268EC07-9322-45E7-83EC-CF4D81A62D67}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Basic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe File created C:\Windows\Logo1_.exe c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe 2044 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2824 2132 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 28 PID 2132 wrote to memory of 2824 2132 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 28 PID 2132 wrote to memory of 2824 2132 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 28 PID 2132 wrote to memory of 2824 2132 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 28 PID 2132 wrote to memory of 2044 2132 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 30 PID 2132 wrote to memory of 2044 2132 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 30 PID 2132 wrote to memory of 2044 2132 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 30 PID 2132 wrote to memory of 2044 2132 c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe 30 PID 2044 wrote to memory of 2708 2044 Logo1_.exe 31 PID 2044 wrote to memory of 2708 2044 Logo1_.exe 31 PID 2044 wrote to memory of 2708 2044 Logo1_.exe 31 PID 2044 wrote to memory of 2708 2044 Logo1_.exe 31 PID 2824 wrote to memory of 2892 2824 cmd.exe 33 PID 2824 wrote to memory of 2892 2824 cmd.exe 33 PID 2824 wrote to memory of 2892 2824 cmd.exe 33 PID 2824 wrote to memory of 2892 2824 cmd.exe 33 PID 2708 wrote to memory of 2620 2708 net.exe 34 PID 2708 wrote to memory of 2620 2708 net.exe 34 PID 2708 wrote to memory of 2620 2708 net.exe 34 PID 2708 wrote to memory of 2620 2708 net.exe 34 PID 2044 wrote to memory of 1272 2044 Logo1_.exe 15 PID 2044 wrote to memory of 1272 2044 Logo1_.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe"C:\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a35D0.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe"C:\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe"4⤵
- Executes dropped EXE
PID:2892
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2620
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5ba24806644570741313b60a09c27cba4
SHA16ba98bc1253d61cd0afbabf608f325dd4dcf2c92
SHA25643c20e101fcd473b95cec7572e809aba2ec299255fe07092af4274e6333f15f9
SHA5121c3fde6176fadb0dc8c530957eca2f346498988d709c06647c0243aafa8f7b65652d729991a9b8d803901825c54387407957de9f6e2e560832888abf2efb80cf
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD599ab09323585a427f5f38dc5faf78f24
SHA11502bff9a4af37eb84a56402f73d869bdeed6e6b
SHA25625fd57a83d21f25d944341e500b649c4bce4fd933763b5b1a102f6844a878ca6
SHA512a5599a3b8ab8778067c9790af0af47d9d4f5128faf70d61c0d69d2356b3cafc2c778dbc46d6d09490fa03b8ecb8f3e4833233277aa1a5fe90364c8cd765ed35b
-
Filesize
722B
MD599ab09323585a427f5f38dc5faf78f24
SHA11502bff9a4af37eb84a56402f73d869bdeed6e6b
SHA25625fd57a83d21f25d944341e500b649c4bce4fd933763b5b1a102f6844a878ca6
SHA512a5599a3b8ab8778067c9790af0af47d9d4f5128faf70d61c0d69d2356b3cafc2c778dbc46d6d09490fa03b8ecb8f3e4833233277aa1a5fe90364c8cd765ed35b
-
C:\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe
Filesize494KB
MD523820da01dedb3c8ba968cef45e80587
SHA168a4c2d2443f6dbbcb547c6da3eae63a45015f64
SHA256290be7cb3c5407af314885ce1adfcf4c4c22284ebbc55a5e0b261bd60f613fa8
SHA5128c826a9099c74fdc03ce76994bca9cbc911295f0723a2cb1f1104e8886bd37626594e2d318a128bd34545ddafc336211917f210f0a3abb19bb63b69b6c9528fa
-
C:\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe.exe
Filesize494KB
MD523820da01dedb3c8ba968cef45e80587
SHA168a4c2d2443f6dbbcb547c6da3eae63a45015f64
SHA256290be7cb3c5407af314885ce1adfcf4c4c22284ebbc55a5e0b261bd60f613fa8
SHA5128c826a9099c74fdc03ce76994bca9cbc911295f0723a2cb1f1104e8886bd37626594e2d318a128bd34545ddafc336211917f210f0a3abb19bb63b69b6c9528fa
-
Filesize
26KB
MD51b31452e45df5fba0beb2d59bf0928ba
SHA11dd2c6fcd39ef7a34542e140184267edbd32b9c2
SHA256f6a58e3558b09e60f9df209b4f8e707fdba599dce13651fb6beb07c3d70058bd
SHA5122811492a404084570405f4b2d728501b6e508f98926f6e6fb042260dfd5f5420344e8dfb33449dd887d18f14faea65c1d2793f0377b6e96bfe89ec4e28f5ab12
-
Filesize
26KB
MD51b31452e45df5fba0beb2d59bf0928ba
SHA11dd2c6fcd39ef7a34542e140184267edbd32b9c2
SHA256f6a58e3558b09e60f9df209b4f8e707fdba599dce13651fb6beb07c3d70058bd
SHA5122811492a404084570405f4b2d728501b6e508f98926f6e6fb042260dfd5f5420344e8dfb33449dd887d18f14faea65c1d2793f0377b6e96bfe89ec4e28f5ab12
-
Filesize
26KB
MD51b31452e45df5fba0beb2d59bf0928ba
SHA11dd2c6fcd39ef7a34542e140184267edbd32b9c2
SHA256f6a58e3558b09e60f9df209b4f8e707fdba599dce13651fb6beb07c3d70058bd
SHA5122811492a404084570405f4b2d728501b6e508f98926f6e6fb042260dfd5f5420344e8dfb33449dd887d18f14faea65c1d2793f0377b6e96bfe89ec4e28f5ab12
-
Filesize
26KB
MD51b31452e45df5fba0beb2d59bf0928ba
SHA11dd2c6fcd39ef7a34542e140184267edbd32b9c2
SHA256f6a58e3558b09e60f9df209b4f8e707fdba599dce13651fb6beb07c3d70058bd
SHA5122811492a404084570405f4b2d728501b6e508f98926f6e6fb042260dfd5f5420344e8dfb33449dd887d18f14faea65c1d2793f0377b6e96bfe89ec4e28f5ab12
-
Filesize
9B
MD5dff4f6f0cc6b8b3bb8efb4a275a8f779
SHA1e87d0f214e09712ed6d4d73e571edb2c1b140327
SHA25634eaeafe313f318504cabbbdf6a150f2928ed89c13a836126478f56c6904cd20
SHA5121a534267509c4dd7c0421a5460ea7b3d58e05ba1343c2f45ca6ca537ff5259f1fae31c68928acba3492875ba270242f41c43ed5d705d31cf9af5a56ca4edd0e0
-
\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe
Filesize494KB
MD523820da01dedb3c8ba968cef45e80587
SHA168a4c2d2443f6dbbcb547c6da3eae63a45015f64
SHA256290be7cb3c5407af314885ce1adfcf4c4c22284ebbc55a5e0b261bd60f613fa8
SHA5128c826a9099c74fdc03ce76994bca9cbc911295f0723a2cb1f1104e8886bd37626594e2d318a128bd34545ddafc336211917f210f0a3abb19bb63b69b6c9528fa
-
\Users\Admin\AppData\Local\Temp\c0d8f297150cac9de63a961e8fdf8c2410d1d412ceadb47082d9ea66c33c489f.exe
Filesize494KB
MD523820da01dedb3c8ba968cef45e80587
SHA168a4c2d2443f6dbbcb547c6da3eae63a45015f64
SHA256290be7cb3c5407af314885ce1adfcf4c4c22284ebbc55a5e0b261bd60f613fa8
SHA5128c826a9099c74fdc03ce76994bca9cbc911295f0723a2cb1f1104e8886bd37626594e2d318a128bd34545ddafc336211917f210f0a3abb19bb63b69b6c9528fa