Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2023, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe
Resource
win10v2004-20230915-en
General
-
Target
07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe
-
Size
563KB
-
MD5
9e91b82e1f2bdc4a1877d1e694abe6be
-
SHA1
1bc5d4671c3df97abd2cb1a530f1c1cc8ae917a1
-
SHA256
07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c
-
SHA512
9031bf31ad62288ef934bcaff5d2568aadeff66488d484a88a2f5a86f1e9b4e8aa2ce1581e0dc79ca955e47511e1a844b6c4f1ab8c24f11ccf3b0bfb2b566347
-
SSDEEP
12288:t7+eLE8rKj25X0mcslMKTKK4KKDyK5FZ1EEEEmEEE1EEEEEEEEEEElKK1KKK1KKQ:t7ZLEK42Gm52KTKK4KKDyK5FZ1EEEEm7
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4236 Logo1_.exe 3608 07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PlaceCard\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\klist.exe Logo1_.exe File created C:\Program Files\Java\jre1.8.0_66\lib\applet\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\WindowsCamera.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\bin\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hr-HR\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pt-BR\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe 4236 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1616 wrote to memory of 1272 1616 07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe 85 PID 1616 wrote to memory of 1272 1616 07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe 85 PID 1616 wrote to memory of 1272 1616 07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe 85 PID 1616 wrote to memory of 4236 1616 07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe 86 PID 1616 wrote to memory of 4236 1616 07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe 86 PID 1616 wrote to memory of 4236 1616 07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe 86 PID 4236 wrote to memory of 4284 4236 Logo1_.exe 87 PID 4236 wrote to memory of 4284 4236 Logo1_.exe 87 PID 4236 wrote to memory of 4284 4236 Logo1_.exe 87 PID 4284 wrote to memory of 4304 4284 net.exe 89 PID 4284 wrote to memory of 4304 4284 net.exe 89 PID 4284 wrote to memory of 4304 4284 net.exe 89 PID 1272 wrote to memory of 3608 1272 cmd.exe 92 PID 1272 wrote to memory of 3608 1272 cmd.exe 92 PID 1272 wrote to memory of 3608 1272 cmd.exe 92 PID 4236 wrote to memory of 3164 4236 Logo1_.exe 40 PID 4236 wrote to memory of 3164 4236 Logo1_.exe 40
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe"C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBB22.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe"C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe"4⤵
- Executes dropped EXE
PID:3608
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4304
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5c2a6027905a06bbdca9ac06c9feb8f56
SHA179bb865a8241f2a6309bdf793cd5765154281bac
SHA2566c1921f4afc7425a52caf45c47e767e265f2c3b3566bab15e04e60f399ba1da3
SHA51299acbb6f288d058c4e426da68d1f0f707bc3bb2e485676e0fcedc867050e0bf6f7f0d43b92ea750e81439973b711cb346944435dd02a9a0be3c79277adfe002f
-
Filesize
484KB
MD5bb8a24fa050d7197bfab673f384c94ab
SHA15c45e23448d74ff732ae69c1e5d4b5e24a6eceaa
SHA2568116106c040c167e23bb375caf62bead62cfabf132994442024cb1d2e2b5f6c9
SHA512162cb0554c98bb03feabd9df6b9cd60b68f2c64a46535dfd78f77d396880a7ee422febb7ebe8c130bbeb31fd7b8a32ebf61c98ed43efeaf4e238f1dc81832a2a
-
Filesize
722B
MD5370fe85621a782e2c800ab9756fe56d5
SHA1080577aacb7b7d4370098e4132479a5e97aca1e3
SHA2568c7a85f8dde6ee9be03093dfbf965e9083131fdd5bb95a413c6150077d2cb412
SHA512e1ea5115435c530cd6806bdc7b99c0630ef1740d8507a048ef90ed8af788068d045bae443966d92090bcffdede07ec26f7fb333aefe0d0c0df0a5b778dd29b90
-
C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe
Filesize537KB
MD560e4522cdf1107402a0affd976fa6941
SHA195f2388dbc21e917da1299392997856b8eb62d7e
SHA25601ba4ede639a49496908218e268241ffa7b18042a1147f6a6ec0887c44f02111
SHA512dd5ec88eea863ad946bb4543d0b15edfc21a586f990f8397991cbbee297daaaf60e0dd0a572fd8c5bcbaf7752495da5a84fad152cd0646ce3b67a66718052248
-
C:\Users\Admin\AppData\Local\Temp\07c6f632effd6d9cf10f4c91f4e4cb219f797aabf3a0314685cd1d69c7d72d8c.exe.exe
Filesize537KB
MD560e4522cdf1107402a0affd976fa6941
SHA195f2388dbc21e917da1299392997856b8eb62d7e
SHA25601ba4ede639a49496908218e268241ffa7b18042a1147f6a6ec0887c44f02111
SHA512dd5ec88eea863ad946bb4543d0b15edfc21a586f990f8397991cbbee297daaaf60e0dd0a572fd8c5bcbaf7752495da5a84fad152cd0646ce3b67a66718052248
-
Filesize
26KB
MD521d3596d967b90ccc15b47a05eba7a58
SHA1b6c542bcff0331dce02ebd9de067247f6e37dcf9
SHA256c4061b0919b053f76bd6a55f4564a60d9c77ec9e508c9953f61f1b62f73e6f5c
SHA512cd7922f6139fc8b3738a4f9fa245e58576c168d948ef3f8d616576803a2c58c4b846f75e461b410c67b3f3d032904a4d6025d482b40e5476cefddf2350d612ee
-
Filesize
26KB
MD521d3596d967b90ccc15b47a05eba7a58
SHA1b6c542bcff0331dce02ebd9de067247f6e37dcf9
SHA256c4061b0919b053f76bd6a55f4564a60d9c77ec9e508c9953f61f1b62f73e6f5c
SHA512cd7922f6139fc8b3738a4f9fa245e58576c168d948ef3f8d616576803a2c58c4b846f75e461b410c67b3f3d032904a4d6025d482b40e5476cefddf2350d612ee
-
Filesize
26KB
MD521d3596d967b90ccc15b47a05eba7a58
SHA1b6c542bcff0331dce02ebd9de067247f6e37dcf9
SHA256c4061b0919b053f76bd6a55f4564a60d9c77ec9e508c9953f61f1b62f73e6f5c
SHA512cd7922f6139fc8b3738a4f9fa245e58576c168d948ef3f8d616576803a2c58c4b846f75e461b410c67b3f3d032904a4d6025d482b40e5476cefddf2350d612ee
-
Filesize
9B
MD5d1f4b3361b3ceba910fe1ab7ce1ab032
SHA16c1264e161c0ae8e2bf57dfcbf331b502b7ccf86
SHA2561a8ca2a08b158ef349e80a839becb06d0e9b2ae3c4633d3a376a13260d71b45f
SHA512c1269ac742982043f8e5f6610bbba71efd56841e32ee6eca478f6a474a1f0b9783f461377945a8ea88aff6c394c570948cb5d65289d0b8a55f80daf68c5e4498