Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe
Resource
win10v2004-20230915-en
General
-
Target
d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe
-
Size
616KB
-
MD5
33316e00fb5ab463eb918a564593ea04
-
SHA1
5b6b9b8c7e46506c72ae04dcaf8248e1043d37af
-
SHA256
d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e
-
SHA512
ea81748e14e947b810a2edfa31eb46157939008fd0d48e0ef4167064f3280e136123c8dffe2de72c19da37fb60d628d61e6ac40376124429e37f4c11135b9be9
-
SSDEEP
12288:iYSDUdaBzi3L0HlqA8qsU+4gN+Pk77CJd8sYk6QxVDpNI1nqvmi:ipDUdaBzib0FqEsU+4hPk7eok7NNIJa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3016 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1760 Logo1_.exe 2804 d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe -
Loads dropped DLL 2 IoCs
pid Process 3016 cmd.exe 3016 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SUMIPNTG\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proofing.en-us\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe File created C:\Windows\Logo1_.exe d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1760 Logo1_.exe 1760 Logo1_.exe 1760 Logo1_.exe 1760 Logo1_.exe 1760 Logo1_.exe 1760 Logo1_.exe 1760 Logo1_.exe 1760 Logo1_.exe 1760 Logo1_.exe 1760 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1292 wrote to memory of 3016 1292 d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe 28 PID 1292 wrote to memory of 3016 1292 d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe 28 PID 1292 wrote to memory of 3016 1292 d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe 28 PID 1292 wrote to memory of 3016 1292 d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe 28 PID 1292 wrote to memory of 1760 1292 d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe 29 PID 1292 wrote to memory of 1760 1292 d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe 29 PID 1292 wrote to memory of 1760 1292 d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe 29 PID 1292 wrote to memory of 1760 1292 d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe 29 PID 1760 wrote to memory of 3064 1760 Logo1_.exe 31 PID 1760 wrote to memory of 3064 1760 Logo1_.exe 31 PID 1760 wrote to memory of 3064 1760 Logo1_.exe 31 PID 1760 wrote to memory of 3064 1760 Logo1_.exe 31 PID 3016 wrote to memory of 2804 3016 cmd.exe 33 PID 3016 wrote to memory of 2804 3016 cmd.exe 33 PID 3016 wrote to memory of 2804 3016 cmd.exe 33 PID 3016 wrote to memory of 2804 3016 cmd.exe 33 PID 3064 wrote to memory of 2636 3064 net.exe 34 PID 3064 wrote to memory of 2636 3064 net.exe 34 PID 3064 wrote to memory of 2636 3064 net.exe 34 PID 3064 wrote to memory of 2636 3064 net.exe 34 PID 1760 wrote to memory of 1212 1760 Logo1_.exe 15 PID 1760 wrote to memory of 1212 1760 Logo1_.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe"C:\Users\Admin\AppData\Local\Temp\d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a6049.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe"C:\Users\Admin\AppData\Local\Temp\d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe"4⤵
- Executes dropped EXE
PID:2804
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2636
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5def6b4a799d54df471c8ac70875e73cc
SHA1676c08b78297559ea49cb9e38a1adb3c6340ac84
SHA2568cf4ea305f449ecafcc10f0cd7f77ef0d820e2eed4ed304e58417ce99fc263e5
SHA512577fb44896dc8aeaf631ea258926e08b1ec82c957763a057de3587aa9fc92b882a69aa40e598e4603ba51663ed1316fdc60dd190f3b28fda33afa12e1d97a5a3
-
Filesize
722B
MD57ab5696f5645722bf19fc6f15ebb5834
SHA1c7b5bf40f51bb861479bd5fa7ed7128f88ddbded
SHA2569453fb8f95715087cfc07ef326d6b23482700ba75205fdaa3abf59c3fb59d012
SHA512d7178882db2ab5db231a2bd662e334b79da810c200f89dcef8491a3362f546a1299820dd56323b443fdd6f1a8097eb002c1af3f24cedcba5146f1a8cebb1cccb
-
Filesize
722B
MD57ab5696f5645722bf19fc6f15ebb5834
SHA1c7b5bf40f51bb861479bd5fa7ed7128f88ddbded
SHA2569453fb8f95715087cfc07ef326d6b23482700ba75205fdaa3abf59c3fb59d012
SHA512d7178882db2ab5db231a2bd662e334b79da810c200f89dcef8491a3362f546a1299820dd56323b443fdd6f1a8097eb002c1af3f24cedcba5146f1a8cebb1cccb
-
C:\Users\Admin\AppData\Local\Temp\d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe
Filesize589KB
MD5a9ba1088767ecea1b98bbf307c6f3c33
SHA1a0a147388dfc3d9301509bc1f1c5dbcb82b28353
SHA256ef99faa28644a1eab37ad7878dea6a3fe4ee631fefee16b037cf60f200f64122
SHA512266c3faa9c19213cb74405db0c7efb47113269d570372bf34c63ce1c3e32371a69051c09dbf6f1b4007db3535106c7af6f64077ad13d840a8a0536c1e893a0dd
-
C:\Users\Admin\AppData\Local\Temp\d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe.exe
Filesize589KB
MD5a9ba1088767ecea1b98bbf307c6f3c33
SHA1a0a147388dfc3d9301509bc1f1c5dbcb82b28353
SHA256ef99faa28644a1eab37ad7878dea6a3fe4ee631fefee16b037cf60f200f64122
SHA512266c3faa9c19213cb74405db0c7efb47113269d570372bf34c63ce1c3e32371a69051c09dbf6f1b4007db3535106c7af6f64077ad13d840a8a0536c1e893a0dd
-
Filesize
26KB
MD5412b061bccb96f8f7123a5277f964801
SHA1acd07c2e3ef5ca97d6ee3e8970e8d5202d7b7e86
SHA256c176fda2bbbae853b6526fa4c5a39565bfdcf2d5cc3fdebef6fee8af451b45ca
SHA512b60ef2d4408acee1681749b5caaf91af83448edf1eb12753af1598ca0b3b02d531222faa510e254fda8e63313caff05d57a152e55db4321e8df17fccae147d42
-
Filesize
26KB
MD5412b061bccb96f8f7123a5277f964801
SHA1acd07c2e3ef5ca97d6ee3e8970e8d5202d7b7e86
SHA256c176fda2bbbae853b6526fa4c5a39565bfdcf2d5cc3fdebef6fee8af451b45ca
SHA512b60ef2d4408acee1681749b5caaf91af83448edf1eb12753af1598ca0b3b02d531222faa510e254fda8e63313caff05d57a152e55db4321e8df17fccae147d42
-
Filesize
26KB
MD5412b061bccb96f8f7123a5277f964801
SHA1acd07c2e3ef5ca97d6ee3e8970e8d5202d7b7e86
SHA256c176fda2bbbae853b6526fa4c5a39565bfdcf2d5cc3fdebef6fee8af451b45ca
SHA512b60ef2d4408acee1681749b5caaf91af83448edf1eb12753af1598ca0b3b02d531222faa510e254fda8e63313caff05d57a152e55db4321e8df17fccae147d42
-
Filesize
26KB
MD5412b061bccb96f8f7123a5277f964801
SHA1acd07c2e3ef5ca97d6ee3e8970e8d5202d7b7e86
SHA256c176fda2bbbae853b6526fa4c5a39565bfdcf2d5cc3fdebef6fee8af451b45ca
SHA512b60ef2d4408acee1681749b5caaf91af83448edf1eb12753af1598ca0b3b02d531222faa510e254fda8e63313caff05d57a152e55db4321e8df17fccae147d42
-
Filesize
10B
MD5a592e6708558f3dc0ad1608608da69c5
SHA169a1224ba3b2f2ab2f2ce8b8287809f3282d20d0
SHA25624c83924da516d8acac4cdc96680306f1e34a8a54696bf5bf24106eeb562195a
SHA51238724fff525de3d5b413bb962c2f81369068403f761f69d00f25cd03b5d8cb83603cd6d23c87faf458f157acf585ca4db031fe6640704a4158cb5ead56ce79f1
-
\Users\Admin\AppData\Local\Temp\d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe
Filesize589KB
MD5a9ba1088767ecea1b98bbf307c6f3c33
SHA1a0a147388dfc3d9301509bc1f1c5dbcb82b28353
SHA256ef99faa28644a1eab37ad7878dea6a3fe4ee631fefee16b037cf60f200f64122
SHA512266c3faa9c19213cb74405db0c7efb47113269d570372bf34c63ce1c3e32371a69051c09dbf6f1b4007db3535106c7af6f64077ad13d840a8a0536c1e893a0dd
-
\Users\Admin\AppData\Local\Temp\d053259ce03aa9c27d47fe776edd5502d90196fcc3823230ceda31257685c82e.exe
Filesize589KB
MD5a9ba1088767ecea1b98bbf307c6f3c33
SHA1a0a147388dfc3d9301509bc1f1c5dbcb82b28353
SHA256ef99faa28644a1eab37ad7878dea6a3fe4ee631fefee16b037cf60f200f64122
SHA512266c3faa9c19213cb74405db0c7efb47113269d570372bf34c63ce1c3e32371a69051c09dbf6f1b4007db3535106c7af6f64077ad13d840a8a0536c1e893a0dd