Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
214s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe
Resource
win10v2004-20230915-en
General
-
Target
038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe
-
Size
239KB
-
MD5
31bddc60c9daeebd1efd4170d02a02a8
-
SHA1
c68ffa75a7700406caa50131e785f622d354403c
-
SHA256
038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045
-
SHA512
fd40f3c18dc0a6493dae65c34626e4516d1fc012fd89840ffef7732ca590ce7c762233d59a128ebaaa00fb1490165b04a82429ec988f0ecd958d9691b32fe09f
-
SSDEEP
3072:+bftffjmNbqcVz5fzsTl4dsOc6v2vTzwU+Pho86meq+FaSoB2+vSHrX:aVfjmNecT93PiY+Fa7BdvGX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2260 Logo1_.exe 2468 038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe -
Loads dropped DLL 1 IoCs
pid Process 2752 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7z.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\az\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VC\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe 2260 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2752 2700 038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe 28 PID 2700 wrote to memory of 2752 2700 038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe 28 PID 2700 wrote to memory of 2752 2700 038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe 28 PID 2700 wrote to memory of 2752 2700 038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe 28 PID 2700 wrote to memory of 2260 2700 038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe 30 PID 2700 wrote to memory of 2260 2700 038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe 30 PID 2700 wrote to memory of 2260 2700 038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe 30 PID 2700 wrote to memory of 2260 2700 038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe 30 PID 2260 wrote to memory of 2640 2260 Logo1_.exe 31 PID 2260 wrote to memory of 2640 2260 Logo1_.exe 31 PID 2260 wrote to memory of 2640 2260 Logo1_.exe 31 PID 2260 wrote to memory of 2640 2260 Logo1_.exe 31 PID 2752 wrote to memory of 2468 2752 cmd.exe 33 PID 2752 wrote to memory of 2468 2752 cmd.exe 33 PID 2752 wrote to memory of 2468 2752 cmd.exe 33 PID 2752 wrote to memory of 2468 2752 cmd.exe 33 PID 2640 wrote to memory of 2196 2640 net.exe 34 PID 2640 wrote to memory of 2196 2640 net.exe 34 PID 2640 wrote to memory of 2196 2640 net.exe 34 PID 2640 wrote to memory of 2196 2640 net.exe 34 PID 2260 wrote to memory of 1288 2260 Logo1_.exe 10 PID 2260 wrote to memory of 1288 2260 Logo1_.exe 10
Processes
-
C:\Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe"C:\Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aC6E7.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe"C:\Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe"3⤵
- Executes dropped EXE
PID:2468
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2196
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD51c1a5bee45c70768bcd86beafa815132
SHA1579be1a01e5f689eb22dd1fd4748d4598293847f
SHA2564228377d6761fecdd75a9fb91add920e71d9626de3dabe31ae72bb5b39e2fbe9
SHA512371e72711c0b16f946eb88ee4c69c51a44e10b29d74954da13894daf1a6ae6fec88a0682984bcf6b9b3b76243b143bd6d0dee382f31be3b799e11d52569f470e
-
Filesize
722B
MD56e65f8ce14736dded34192ad15474dfe
SHA1de690e7ecded353330022302bfa8919851a110e2
SHA2565ed9cbd16c22fafceffabd724ecff3982cbf4975dddcfc2b015630051b559d2a
SHA5120f28ff687caf0c7ec01341923451e5c66ddb6b3ff1b1b6565fcfcb65ef4ae1690590ca4e0032b3cf901e9b7763b0650404cd7f4c25c948783739a7fd943006c4
-
Filesize
722B
MD56e65f8ce14736dded34192ad15474dfe
SHA1de690e7ecded353330022302bfa8919851a110e2
SHA2565ed9cbd16c22fafceffabd724ecff3982cbf4975dddcfc2b015630051b559d2a
SHA5120f28ff687caf0c7ec01341923451e5c66ddb6b3ff1b1b6565fcfcb65ef4ae1690590ca4e0032b3cf901e9b7763b0650404cd7f4c25c948783739a7fd943006c4
-
C:\Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe
Filesize213KB
MD520d89d1781cde87db3a8b59da816efcc
SHA14f6670c4dcd8d978b21d1db91e081e609f5abcd0
SHA2564653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983
SHA5127b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e
-
C:\Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe.exe
Filesize213KB
MD520d89d1781cde87db3a8b59da816efcc
SHA14f6670c4dcd8d978b21d1db91e081e609f5abcd0
SHA2564653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983
SHA5127b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e
-
Filesize
26KB
MD5f7b0ab0aff6aad4bf0ccf0f3b127a9fd
SHA14a66a7d02be22cd152d1b1815e7c9a7bca03c909
SHA25655b1084df5b436dbe01998c2eccceb74f9ef6dad3cbcade949e47d4b340a0365
SHA512214b61c2e57148d152c7be4dc462d0ba617192b3dc6999b8edc0105ab897d286688f8b4ff1d4e0637a40f25f31d75bf83a75d12a392b6ef68d37d3cc8d0f0a92
-
Filesize
26KB
MD5f7b0ab0aff6aad4bf0ccf0f3b127a9fd
SHA14a66a7d02be22cd152d1b1815e7c9a7bca03c909
SHA25655b1084df5b436dbe01998c2eccceb74f9ef6dad3cbcade949e47d4b340a0365
SHA512214b61c2e57148d152c7be4dc462d0ba617192b3dc6999b8edc0105ab897d286688f8b4ff1d4e0637a40f25f31d75bf83a75d12a392b6ef68d37d3cc8d0f0a92
-
Filesize
26KB
MD5f7b0ab0aff6aad4bf0ccf0f3b127a9fd
SHA14a66a7d02be22cd152d1b1815e7c9a7bca03c909
SHA25655b1084df5b436dbe01998c2eccceb74f9ef6dad3cbcade949e47d4b340a0365
SHA512214b61c2e57148d152c7be4dc462d0ba617192b3dc6999b8edc0105ab897d286688f8b4ff1d4e0637a40f25f31d75bf83a75d12a392b6ef68d37d3cc8d0f0a92
-
Filesize
26KB
MD5f7b0ab0aff6aad4bf0ccf0f3b127a9fd
SHA14a66a7d02be22cd152d1b1815e7c9a7bca03c909
SHA25655b1084df5b436dbe01998c2eccceb74f9ef6dad3cbcade949e47d4b340a0365
SHA512214b61c2e57148d152c7be4dc462d0ba617192b3dc6999b8edc0105ab897d286688f8b4ff1d4e0637a40f25f31d75bf83a75d12a392b6ef68d37d3cc8d0f0a92
-
Filesize
10B
MD5dbf19ca54500e964528b156763234c1d
SHA105376f86423aec8badf0adbc47887234ac83ef5a
SHA256bfa0ad2e861e2369dc239edf8f62fbe1c4507d877ec2f76e46e48f1e68fdd5ae
SHA512fb8ce1253ad6d3c1b7d970614dbc2d21574576336a490b54a8dc705a3d8637c0669747ba821fb2f4da14d7447dc24607aca988b0cd3bd9fc4d9d5988b4b631d0
-
\Users\Admin\AppData\Local\Temp\038b96de10f5663905674f2c6f7b1166abe1eeebefcf19e7b11bb1f0d9e55045.exe
Filesize213KB
MD520d89d1781cde87db3a8b59da816efcc
SHA14f6670c4dcd8d978b21d1db91e081e609f5abcd0
SHA2564653df6eb852f717ac03d5ecdfdd5e1e2c1ac70b012049f1188e0e7d5b5f8983
SHA5127b03a2e2c5f94a3e6164e160e3346cf0e8247471c48858dad9747dc17c8bccd20caaf2ea9f15d7e6be3e633a01536caefdeff6b384c4448c861f1e5a5ff6cf0e