Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 01:17
Static task
static1
Behavioral task
behavioral1
Sample
563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe
Resource
win10v2004-20230915-en
General
-
Target
563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe
-
Size
56KB
-
MD5
31d7fcd3d8dc83f7db128907718fa638
-
SHA1
e598453491a2f82d0daa0635187c5e2b2d87bc79
-
SHA256
563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101
-
SHA512
6a4f42a67bdf0984cd98843f6d710f730b80b8114140d5d12dd400a7c2e192437a2f8b0db397f27dec0d6b1fe5f545997088f4cbcfe8b9837720c980a484f1a4
-
SSDEEP
1536:wsfgLdQAQfcfymNU/mMEjpOUuPvOk+hIjBPxw:wsftffjmNAmMEj8nOIRxw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2484 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3056 Logo1_.exe 2760 563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe -
Loads dropped DLL 1 IoCs
pid Process 2484 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SubsetList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\InfoPathOMFormServicesV12\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe File created C:\Windows\Logo1_.exe 563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3056 Logo1_.exe 3056 Logo1_.exe 3056 Logo1_.exe 3056 Logo1_.exe 3056 Logo1_.exe 3056 Logo1_.exe 3056 Logo1_.exe 3056 Logo1_.exe 3056 Logo1_.exe 3056 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2484 2984 563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe 28 PID 2984 wrote to memory of 2484 2984 563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe 28 PID 2984 wrote to memory of 2484 2984 563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe 28 PID 2984 wrote to memory of 2484 2984 563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe 28 PID 2984 wrote to memory of 3056 2984 563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe 30 PID 2984 wrote to memory of 3056 2984 563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe 30 PID 2984 wrote to memory of 3056 2984 563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe 30 PID 2984 wrote to memory of 3056 2984 563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe 30 PID 3056 wrote to memory of 2596 3056 Logo1_.exe 31 PID 3056 wrote to memory of 2596 3056 Logo1_.exe 31 PID 3056 wrote to memory of 2596 3056 Logo1_.exe 31 PID 3056 wrote to memory of 2596 3056 Logo1_.exe 31 PID 2596 wrote to memory of 2332 2596 net.exe 33 PID 2596 wrote to memory of 2332 2596 net.exe 33 PID 2596 wrote to memory of 2332 2596 net.exe 33 PID 2596 wrote to memory of 2332 2596 net.exe 33 PID 2484 wrote to memory of 2760 2484 cmd.exe 34 PID 2484 wrote to memory of 2760 2484 cmd.exe 34 PID 2484 wrote to memory of 2760 2484 cmd.exe 34 PID 2484 wrote to memory of 2760 2484 cmd.exe 34 PID 3056 wrote to memory of 1400 3056 Logo1_.exe 16 PID 3056 wrote to memory of 1400 3056 Logo1_.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe"C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a95E9.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe"C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe"4⤵
- Executes dropped EXE
PID:2760
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2332
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD53663c1381766ef643154f7248cee081a
SHA1d3391539358af56ef7ac65a5b87886e45e9bc42c
SHA2560471b2b82fb08307f138b69649e69dd51864d5650e13d0dafe67d37d91288c29
SHA512c3ed0a5d8b9eaa02efd030d4191849f5aa999e1585a47af66e8497ab494141488e97ca39289b412919f33faf78016c4e875522232c8f67bde995d968ecc7f6f7
-
Filesize
722B
MD536e91885a4749f0ce96ebe212c0e07d8
SHA1d92e6f8517dc891c784c40eba54074a93ce8d7a6
SHA256e4f2f41d3f9bc907201fc5390f10994b843e4fa228be8b5f2e00b27ac29182b3
SHA51207268221f5dd399fe550655d72ff868fac3f2f3feef952054089d7984f2fcb698a75d1e88494f7fb5d4d39ad32b29d651ed24b6bdb4bed1a58a9be786364c407
-
Filesize
722B
MD536e91885a4749f0ce96ebe212c0e07d8
SHA1d92e6f8517dc891c784c40eba54074a93ce8d7a6
SHA256e4f2f41d3f9bc907201fc5390f10994b843e4fa228be8b5f2e00b27ac29182b3
SHA51207268221f5dd399fe550655d72ff868fac3f2f3feef952054089d7984f2fcb698a75d1e88494f7fb5d4d39ad32b29d651ed24b6bdb4bed1a58a9be786364c407
-
C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe
Filesize30KB
MD50bc6aea4a6e5f575bc2da604905a8114
SHA18c162fc24a2b2f14489ced504b2d73190f46672a
SHA2569eaa64e0cfd2c7362c3e4d60e681c3326688523f50cb3ef7c8e874a62dcf6328
SHA512ce596aa90205d7230c51765bece29823fd9fede174312c788fe1a8c69b8f1876199785c1df59f140033204d9ee78e39180853a5f8c00105acd1c56155b56b928
-
C:\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe.exe
Filesize30KB
MD50bc6aea4a6e5f575bc2da604905a8114
SHA18c162fc24a2b2f14489ced504b2d73190f46672a
SHA2569eaa64e0cfd2c7362c3e4d60e681c3326688523f50cb3ef7c8e874a62dcf6328
SHA512ce596aa90205d7230c51765bece29823fd9fede174312c788fe1a8c69b8f1876199785c1df59f140033204d9ee78e39180853a5f8c00105acd1c56155b56b928
-
Filesize
26KB
MD54f6b7b7dd1e90f9968e5197d34085d7c
SHA1e49e73e61aede77f897b3be38716b22a9ed86e37
SHA256c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf
SHA5124225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2
-
Filesize
26KB
MD54f6b7b7dd1e90f9968e5197d34085d7c
SHA1e49e73e61aede77f897b3be38716b22a9ed86e37
SHA256c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf
SHA5124225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2
-
Filesize
26KB
MD54f6b7b7dd1e90f9968e5197d34085d7c
SHA1e49e73e61aede77f897b3be38716b22a9ed86e37
SHA256c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf
SHA5124225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2
-
Filesize
26KB
MD54f6b7b7dd1e90f9968e5197d34085d7c
SHA1e49e73e61aede77f897b3be38716b22a9ed86e37
SHA256c203da2bf8f27304bf94615ee5c238a6fefed6c557aaf65869306f68955756bf
SHA5124225a9c7c3cd1092ca2215fd915a1bd7cd5cc3f4bc8ffb83909f2a9a0b70b2b08281ae2b9f7302cbc5e4282d0ecf94654e4ce8538218b504fee05ff7b4834da2
-
Filesize
10B
MD5b00c1a89b15effd3d1fb2de4fdc7bee5
SHA10c3a4f06bcd397d1d3a63ab2ca05e64cc7ae554d
SHA2560767fccea7e57d6427b0a9b440f28687f4b835409c5dcdeb337a479009222cd9
SHA512b50a3c1df331ecd7dbbd88c202c7b7b8fe6ece8df96249d88f40138952fb3c523f6f133a2d12daa2fd892643b53e4c19b39bcb16ef810f789c996e00bad03bc0
-
\Users\Admin\AppData\Local\Temp\563f1eda4f69c1a676bebedfa87318baf5bc297739dbfec687faea15590d9101.exe
Filesize30KB
MD50bc6aea4a6e5f575bc2da604905a8114
SHA18c162fc24a2b2f14489ced504b2d73190f46672a
SHA2569eaa64e0cfd2c7362c3e4d60e681c3326688523f50cb3ef7c8e874a62dcf6328
SHA512ce596aa90205d7230c51765bece29823fd9fede174312c788fe1a8c69b8f1876199785c1df59f140033204d9ee78e39180853a5f8c00105acd1c56155b56b928