Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/10/2023, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe
Resource
win10v2004-20230915-en
General
-
Target
7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe
-
Size
271KB
-
MD5
b6e828aec697d7ffbc4fa1d68a73f33d
-
SHA1
a65ca1478e2c4850186cde56e3c915732c78fb89
-
SHA256
7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de
-
SHA512
9f306a969a053e87973fe0c20d39ae831f082239c35e8017b25d1c5c33aaa06053c875dde4c5b80c23fb58ab6ff303165c05fbb18875fb980649529e86f066f0
-
SSDEEP
6144:ooTVfjmNm6iC5/7Z7mEGiin0u9HJAxdrt10xdUy95WkLmzdWsQELvLf884rxJp1D:tp7+JlGp0Bk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2716 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2424 Logo1_.exe 2648 7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe Logo1_.exe File created C:\Program Files (x86)\Windows Mail\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Updater.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\STARTUP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe File created C:\Windows\Logo1_.exe 7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe 2424 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2716 2468 7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe 28 PID 2468 wrote to memory of 2716 2468 7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe 28 PID 2468 wrote to memory of 2716 2468 7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe 28 PID 2468 wrote to memory of 2716 2468 7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe 28 PID 2468 wrote to memory of 2424 2468 7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe 29 PID 2468 wrote to memory of 2424 2468 7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe 29 PID 2468 wrote to memory of 2424 2468 7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe 29 PID 2468 wrote to memory of 2424 2468 7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe 29 PID 2424 wrote to memory of 2728 2424 Logo1_.exe 31 PID 2424 wrote to memory of 2728 2424 Logo1_.exe 31 PID 2424 wrote to memory of 2728 2424 Logo1_.exe 31 PID 2424 wrote to memory of 2728 2424 Logo1_.exe 31 PID 2716 wrote to memory of 2648 2716 cmd.exe 33 PID 2716 wrote to memory of 2648 2716 cmd.exe 33 PID 2716 wrote to memory of 2648 2716 cmd.exe 33 PID 2716 wrote to memory of 2648 2716 cmd.exe 33 PID 2728 wrote to memory of 2824 2728 net.exe 34 PID 2728 wrote to memory of 2824 2728 net.exe 34 PID 2728 wrote to memory of 2824 2728 net.exe 34 PID 2728 wrote to memory of 2824 2728 net.exe 34 PID 2424 wrote to memory of 1260 2424 Logo1_.exe 20 PID 2424 wrote to memory of 1260 2424 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe"C:\Users\Admin\AppData\Local\Temp\7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a3F80.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe"C:\Users\Admin\AppData\Local\Temp\7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe"4⤵
- Executes dropped EXE
PID:2648
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2824
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD53a650fb76f82e4e986c15852a526ad13
SHA16067f3a315b357050a4cba64166928340f8886da
SHA256b18f8d5f50682bee0204fe5a3d22c5e7d8ba9f931e4826b9013417e282438b5e
SHA51211e45ef55c05cb8bcf5501e91fafdbabe102f81cf9cbacf433813749956272fa64c0b30931f02bf7f23657dcbeb203c7a1d506cd31959e133abd1cd6e7f8ae3c
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5cf4caad9dfe72605fc364ffa84627ec8
SHA1246dcd2efb327c2f981bdcda07fd4528d9819165
SHA25648d068bd2a750669e8d70ab4e9961c05983929cc72d5092ddc62682566702833
SHA51256db09d9762e38225c0bbda900d02ee4b7d01e7e48e97fd49598e0eefa4f04d0c009ff8b87026f6fc0ecefba8c0ee09b61effea9562bdb37ba86d01b46c04aef
-
Filesize
722B
MD5cf4caad9dfe72605fc364ffa84627ec8
SHA1246dcd2efb327c2f981bdcda07fd4528d9819165
SHA25648d068bd2a750669e8d70ab4e9961c05983929cc72d5092ddc62682566702833
SHA51256db09d9762e38225c0bbda900d02ee4b7d01e7e48e97fd49598e0eefa4f04d0c009ff8b87026f6fc0ecefba8c0ee09b61effea9562bdb37ba86d01b46c04aef
-
C:\Users\Admin\AppData\Local\Temp\7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe
Filesize245KB
MD5f1e27bbd3a183c3c4021a792e651bb53
SHA19d7e96b9089584308a23773d4db2404b897c39fa
SHA25665fb354d75fe5d709a58c2f4e2e7e88f01ef8fc5aff80191479def0630783336
SHA512e7bc26c54b0dd190513b787e3d05ac4102e60997468f37c3db3e14e9fe338556635363ec5123a95aeb2513e184330a581b6ab4255d340b745c41e153b0e87203
-
C:\Users\Admin\AppData\Local\Temp\7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe.exe
Filesize245KB
MD5f1e27bbd3a183c3c4021a792e651bb53
SHA19d7e96b9089584308a23773d4db2404b897c39fa
SHA25665fb354d75fe5d709a58c2f4e2e7e88f01ef8fc5aff80191479def0630783336
SHA512e7bc26c54b0dd190513b787e3d05ac4102e60997468f37c3db3e14e9fe338556635363ec5123a95aeb2513e184330a581b6ab4255d340b745c41e153b0e87203
-
Filesize
26KB
MD56765f9667efb8f6ef7fd32740a5ef051
SHA14db6919d04c94b0a9b008680b01d9982cdd2db3e
SHA256d9c70ffdfe8f4aef0dd327753de4eeea270845b211018aeba4222cae6a4a5740
SHA512bf1d1beec626bf3550541d1fdd844e11e57a1994c753fe6f3a709e407d73ca269b69b5e84ac4ff6e685874c876fbf481eaa422759b6333d85cbaf9a2bf6f6a78
-
Filesize
26KB
MD56765f9667efb8f6ef7fd32740a5ef051
SHA14db6919d04c94b0a9b008680b01d9982cdd2db3e
SHA256d9c70ffdfe8f4aef0dd327753de4eeea270845b211018aeba4222cae6a4a5740
SHA512bf1d1beec626bf3550541d1fdd844e11e57a1994c753fe6f3a709e407d73ca269b69b5e84ac4ff6e685874c876fbf481eaa422759b6333d85cbaf9a2bf6f6a78
-
Filesize
26KB
MD56765f9667efb8f6ef7fd32740a5ef051
SHA14db6919d04c94b0a9b008680b01d9982cdd2db3e
SHA256d9c70ffdfe8f4aef0dd327753de4eeea270845b211018aeba4222cae6a4a5740
SHA512bf1d1beec626bf3550541d1fdd844e11e57a1994c753fe6f3a709e407d73ca269b69b5e84ac4ff6e685874c876fbf481eaa422759b6333d85cbaf9a2bf6f6a78
-
Filesize
26KB
MD56765f9667efb8f6ef7fd32740a5ef051
SHA14db6919d04c94b0a9b008680b01d9982cdd2db3e
SHA256d9c70ffdfe8f4aef0dd327753de4eeea270845b211018aeba4222cae6a4a5740
SHA512bf1d1beec626bf3550541d1fdd844e11e57a1994c753fe6f3a709e407d73ca269b69b5e84ac4ff6e685874c876fbf481eaa422759b6333d85cbaf9a2bf6f6a78
-
Filesize
9B
MD5d1f4b3361b3ceba910fe1ab7ce1ab032
SHA16c1264e161c0ae8e2bf57dfcbf331b502b7ccf86
SHA2561a8ca2a08b158ef349e80a839becb06d0e9b2ae3c4633d3a376a13260d71b45f
SHA512c1269ac742982043f8e5f6610bbba71efd56841e32ee6eca478f6a474a1f0b9783f461377945a8ea88aff6c394c570948cb5d65289d0b8a55f80daf68c5e4498
-
\Users\Admin\AppData\Local\Temp\7b23b057ed16cae46fa40336fc75dce7002a5578c0d22f6b50d4409eac38e9de.exe
Filesize245KB
MD5f1e27bbd3a183c3c4021a792e651bb53
SHA19d7e96b9089584308a23773d4db2404b897c39fa
SHA25665fb354d75fe5d709a58c2f4e2e7e88f01ef8fc5aff80191479def0630783336
SHA512e7bc26c54b0dd190513b787e3d05ac4102e60997468f37c3db3e14e9fe338556635363ec5123a95aeb2513e184330a581b6ab4255d340b745c41e153b0e87203