Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe
Resource
win10v2004-20230915-en
General
-
Target
e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe
-
Size
1.5MB
-
MD5
fc9ac7d9d1b4ba2cf65acc29f52a3ca9
-
SHA1
494d8b742e866ba2cd01f491c2fd4ce95c8d0af3
-
SHA256
e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c
-
SHA512
e50641d371593574a3c141f95c68cdbdfe55fc9963d7b57b74cc4463ab429d23c7a7b9b70cd574365f46b3cd2d4e508d0f1aaa560224ec1fc8661a9988f2bf17
-
SSDEEP
12288:a7+Wi/npiDfEI1RMsiRKMXTQ6RgvaPSgLYmm++0uAeL5TlOuj2Zj+ALGr4oUM0+o:a7wpiD3oK6VAaPpYmm0cOujgu4mkV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4636 Logo1_.exe 4940 e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\dictation\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\misc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PlaceCard\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\WinMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VideoFrameExtractor\UserControls\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\nb-NO\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\jsaddins\en-us\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\FileAssociation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\notetagsUI\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Mutable\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Uninstall Information\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-150_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fr-CA\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sv-SE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\jsaddins\locallaunch\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.513.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_2019.430.2026.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\RetailDemo\strings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe File created C:\Windows\Logo1_.exe e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe 4636 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2336 wrote to memory of 4276 2336 e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe 83 PID 2336 wrote to memory of 4276 2336 e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe 83 PID 2336 wrote to memory of 4276 2336 e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe 83 PID 2336 wrote to memory of 4636 2336 e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe 84 PID 2336 wrote to memory of 4636 2336 e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe 84 PID 2336 wrote to memory of 4636 2336 e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe 84 PID 4636 wrote to memory of 3304 4636 Logo1_.exe 86 PID 4636 wrote to memory of 3304 4636 Logo1_.exe 86 PID 4636 wrote to memory of 3304 4636 Logo1_.exe 86 PID 4276 wrote to memory of 4940 4276 cmd.exe 88 PID 4276 wrote to memory of 4940 4276 cmd.exe 88 PID 3304 wrote to memory of 3852 3304 net.exe 90 PID 3304 wrote to memory of 3852 3304 net.exe 90 PID 3304 wrote to memory of 3852 3304 net.exe 90 PID 4636 wrote to memory of 3172 4636 Logo1_.exe 40 PID 4636 wrote to memory of 3172 4636 Logo1_.exe 40
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe"C:\Users\Admin\AppData\Local\Temp\e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aD3EA.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe"C:\Users\Admin\AppData\Local\Temp\e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe"4⤵
- Executes dropped EXE
PID:4940
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3852
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5f9befaf4b2a3fea22216860449f7e862
SHA12906ce4e65cab286fdbb706c4380eab2083f3825
SHA2561f117544245400d7cd378da287f788766d7db882279f1786c43e82324f8dee65
SHA51275ad6493cc9c0de631036418546e71715d222735a7603ae48ee6c662e3b7299116df7e4a5bae016af21da1d675131456479fcdd1feb0af40724ed6c2f89583d8
-
Filesize
722B
MD58a2c6a960955db14432fa59cb8d8010f
SHA14e001788e330a2e6b7400fb308f83d572c0d3feb
SHA2567a46eb64023eb8b3e2fc0cddbf60ac1408eb3488ee40e6b244df6bb5323777aa
SHA5129f95eee1ef14b46ec6276a0afd81040b5c258d711c944b5e401ef7f43b64ae84ee09733f5d27989058c827aee463147ff3120a918b7b4611cf6b1ae57745108a
-
C:\Users\Admin\AppData\Local\Temp\e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe
Filesize1.5MB
MD57b0f4337ff56720c1107c1589908f1d2
SHA1736ebfa25e4ff2974048b069d436e9d8fd83f840
SHA25621c9d4ee5c002748070f6e411a2883851546f66962896f9943eb57d84562f85c
SHA51233cb47c00b9624b754987b547ccbae6b70dacd8660682250401960d0e2591c55d02da973b6351e9dacd83a3bc234449c63761d352e7ae70e26acace278897604
-
C:\Users\Admin\AppData\Local\Temp\e1fa2e936f6e94c2ddb7808c4a3f9f8e4cb9233a8760943cf5beed28690e904c.exe.exe
Filesize1.5MB
MD57b0f4337ff56720c1107c1589908f1d2
SHA1736ebfa25e4ff2974048b069d436e9d8fd83f840
SHA25621c9d4ee5c002748070f6e411a2883851546f66962896f9943eb57d84562f85c
SHA51233cb47c00b9624b754987b547ccbae6b70dacd8660682250401960d0e2591c55d02da973b6351e9dacd83a3bc234449c63761d352e7ae70e26acace278897604
-
Filesize
26KB
MD5bf432bacde0b936f7fd20c466ec0bfc9
SHA1aff70b2cb9c409e3b63e7fc33f132441edad86db
SHA2565d2e80c8e42ad3cf43ca754fb4597753ec8d80fc7d027e11f43536dd2f88d39e
SHA512c134428f8da55038acf63eaae12357060574e2f062befc57c6a69c6833ab10a4eb08c6f36cd6433de1538f2b5b09ef8bb74acb8235856a5aac024914165c1a1a
-
Filesize
26KB
MD5bf432bacde0b936f7fd20c466ec0bfc9
SHA1aff70b2cb9c409e3b63e7fc33f132441edad86db
SHA2565d2e80c8e42ad3cf43ca754fb4597753ec8d80fc7d027e11f43536dd2f88d39e
SHA512c134428f8da55038acf63eaae12357060574e2f062befc57c6a69c6833ab10a4eb08c6f36cd6433de1538f2b5b09ef8bb74acb8235856a5aac024914165c1a1a
-
Filesize
26KB
MD5bf432bacde0b936f7fd20c466ec0bfc9
SHA1aff70b2cb9c409e3b63e7fc33f132441edad86db
SHA2565d2e80c8e42ad3cf43ca754fb4597753ec8d80fc7d027e11f43536dd2f88d39e
SHA512c134428f8da55038acf63eaae12357060574e2f062befc57c6a69c6833ab10a4eb08c6f36cd6433de1538f2b5b09ef8bb74acb8235856a5aac024914165c1a1a
-
Filesize
9B
MD5872506f1dadcc0cedd1e9dee11f54da4
SHA1d1e87145ed1d918f10ae4e93ccdbb994bc906ed5
SHA256a0049e98811438481e150df54f7b555026746c943cb03106677bf75b4e412104
SHA5126cf3aeeed18e66a16ed653a5c33133ec8d5fb58cf42aab9e712cf473233e506d4f14692dff04b7c20847718e5c344ec2651e57d2ae7a034610b07679b786344c
-
Filesize
10B
MD5743754b59d55d26c081d8f839a3662c8
SHA18e88e3bda53f58b9122f6f9c9a5f23f80e7be6c7
SHA256bbb0f1aae4572c821fac1d6b7890df67d9f4a7576af30e70925192dded063e8b
SHA5121e8d9e5e1651bd2aaef969713d949cc4ddab58c53d0be31392d660aedeb621a0f968196e4938d2ba75e40ebdb7557cee23bf5587877268cb087fdd09a8abba1b