Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
04/11/2023, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe
Resource
win10v2004-20231020-en
General
-
Target
91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe
-
Size
101KB
-
MD5
d4e42d2a1f81742c9aa3d5efc9d0f76b
-
SHA1
39e4e462aead3ef720695cb591037431b7fca5f8
-
SHA256
91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39
-
SHA512
58aab2c90edc7cd3bc603fb01d9c7c3d70d520e955625322ac8274ba86dd03b3a0a09a54f70f2859522aa72e3830302829cb2e156b20f908cdf9f86731a6fe53
-
SSDEEP
3072:cNftffjmNoxPGvE4pL4zv2NL6sRe5lxe:cdVfjmNUGvEaL4z6Re5S
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2064 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2960 Logo1_.exe 2264 91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe 2772 91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\setup_wm.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Groove.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SONORA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe File created C:\Windows\Logo1_.exe 91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2960 Logo1_.exe 2960 Logo1_.exe 2960 Logo1_.exe 2960 Logo1_.exe 2960 Logo1_.exe 2960 Logo1_.exe 2960 Logo1_.exe 2960 Logo1_.exe 2960 Logo1_.exe 2960 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2064 2020 91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe 28 PID 2020 wrote to memory of 2064 2020 91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe 28 PID 2020 wrote to memory of 2064 2020 91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe 28 PID 2020 wrote to memory of 2064 2020 91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe 28 PID 2020 wrote to memory of 2960 2020 91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe 29 PID 2020 wrote to memory of 2960 2020 91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe 29 PID 2020 wrote to memory of 2960 2020 91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe 29 PID 2020 wrote to memory of 2960 2020 91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe 29 PID 2960 wrote to memory of 2636 2960 Logo1_.exe 31 PID 2960 wrote to memory of 2636 2960 Logo1_.exe 31 PID 2960 wrote to memory of 2636 2960 Logo1_.exe 31 PID 2960 wrote to memory of 2636 2960 Logo1_.exe 31 PID 2636 wrote to memory of 2820 2636 net.exe 34 PID 2636 wrote to memory of 2820 2636 net.exe 34 PID 2636 wrote to memory of 2820 2636 net.exe 34 PID 2636 wrote to memory of 2820 2636 net.exe 34 PID 2960 wrote to memory of 1264 2960 Logo1_.exe 11 PID 2960 wrote to memory of 1264 2960 Logo1_.exe 11
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe"C:\Users\Admin\AppData\Local\Temp\91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a600A.bat3⤵
- Deletes itself
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe"C:\Users\Admin\AppData\Local\Temp\91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe"4⤵
- Executes dropped EXE
PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe"C:\Users\Admin\AppData\Local\Temp\91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe"4⤵
- Executes dropped EXE
PID:2772
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2820
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
471KB
MD5c6c8fde27f649c91ddaab8cb9ca344a6
SHA15e4865aec432a18107182f47edda176e8c566152
SHA25632c3fed53bfc1d890e9bd1d771fdc7e2c81480e03f1425bce07b4045a192d100
SHA512a8df7d1e852d871d7f16bae10c4ff049359583da88cc85a039f0298525839040d5363ce5ef4cbdb92a12a25785f73df83cf0df07752b78e6e6444f32160a2155
-
Filesize
722B
MD5dcb69bdb196816a77d25afce407b9d48
SHA16d74d1e9f9beb06f312b15ce74234f6c2ea4aa81
SHA256c1febaaa4b0369429b45c37477eb3c99a830d7053004d175cbf8eb715c07729e
SHA512d307916047db92fcf698f6efa9786a4ec7824b0b92d5f35e606870611fe092d518e7fe0086ef073ae1e1ad00921cc84bae2596d6893dee9fb965fdc2ce63e5b1
-
Filesize
722B
MD5dcb69bdb196816a77d25afce407b9d48
SHA16d74d1e9f9beb06f312b15ce74234f6c2ea4aa81
SHA256c1febaaa4b0369429b45c37477eb3c99a830d7053004d175cbf8eb715c07729e
SHA512d307916047db92fcf698f6efa9786a4ec7824b0b92d5f35e606870611fe092d518e7fe0086ef073ae1e1ad00921cc84bae2596d6893dee9fb965fdc2ce63e5b1
-
C:\Users\Admin\AppData\Local\Temp\91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe
Filesize75KB
MD5a7851a05e83f42f741a804320c485083
SHA1b76d2e6eb6d2bf289a5118c908578906851460d0
SHA2563600ff58fdb37f53562e626fd74d6f4d8d39925d711a96f221bb4aca7992926a
SHA512eadbfbee79aa0f34b35e0a9c9d717b3c8ac18729df8e52332b696352a2a41d0da37119ab1cb81a10bb7854b930e6479686f8fa8b5a447d48213e3c1c9304ce7b
-
C:\Users\Admin\AppData\Local\Temp\91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe
Filesize75KB
MD5a7851a05e83f42f741a804320c485083
SHA1b76d2e6eb6d2bf289a5118c908578906851460d0
SHA2563600ff58fdb37f53562e626fd74d6f4d8d39925d711a96f221bb4aca7992926a
SHA512eadbfbee79aa0f34b35e0a9c9d717b3c8ac18729df8e52332b696352a2a41d0da37119ab1cb81a10bb7854b930e6479686f8fa8b5a447d48213e3c1c9304ce7b
-
C:\Users\Admin\AppData\Local\Temp\91a599fb57df5595914b7019fad54551713be537af250f0f43ebb7c9e2acbf39.exe.exe
Filesize75KB
MD5a7851a05e83f42f741a804320c485083
SHA1b76d2e6eb6d2bf289a5118c908578906851460d0
SHA2563600ff58fdb37f53562e626fd74d6f4d8d39925d711a96f221bb4aca7992926a
SHA512eadbfbee79aa0f34b35e0a9c9d717b3c8ac18729df8e52332b696352a2a41d0da37119ab1cb81a10bb7854b930e6479686f8fa8b5a447d48213e3c1c9304ce7b
-
Filesize
26KB
MD5949c1d647427e45748ca7bf99f69f6c5
SHA1cb82678be077dced0eac4746aa4d1cce90ab37c1
SHA256af7ea121df690d7fddfea9342c9e4e7cbc68594a10009a2c927bb3148772f85d
SHA512595d73796c765cb010f3dd557724742cc64efb244ceca5f6405a54674ce187f51a5f93d7717a4e6a5647c7178487b93a537fa9cb0a313da5048eddd9c40d646c
-
Filesize
26KB
MD5949c1d647427e45748ca7bf99f69f6c5
SHA1cb82678be077dced0eac4746aa4d1cce90ab37c1
SHA256af7ea121df690d7fddfea9342c9e4e7cbc68594a10009a2c927bb3148772f85d
SHA512595d73796c765cb010f3dd557724742cc64efb244ceca5f6405a54674ce187f51a5f93d7717a4e6a5647c7178487b93a537fa9cb0a313da5048eddd9c40d646c
-
Filesize
26KB
MD5949c1d647427e45748ca7bf99f69f6c5
SHA1cb82678be077dced0eac4746aa4d1cce90ab37c1
SHA256af7ea121df690d7fddfea9342c9e4e7cbc68594a10009a2c927bb3148772f85d
SHA512595d73796c765cb010f3dd557724742cc64efb244ceca5f6405a54674ce187f51a5f93d7717a4e6a5647c7178487b93a537fa9cb0a313da5048eddd9c40d646c
-
Filesize
26KB
MD5949c1d647427e45748ca7bf99f69f6c5
SHA1cb82678be077dced0eac4746aa4d1cce90ab37c1
SHA256af7ea121df690d7fddfea9342c9e4e7cbc68594a10009a2c927bb3148772f85d
SHA512595d73796c765cb010f3dd557724742cc64efb244ceca5f6405a54674ce187f51a5f93d7717a4e6a5647c7178487b93a537fa9cb0a313da5048eddd9c40d646c
-
Filesize
9B
MD56029ce528adbc1284163cdd2b27a082e
SHA1a2f23e1d5101c3b6929686a2d5711c2af2dec1b7
SHA2565036deecfbb090aa7f7c21c159b1921df0cf23eedafb7e0c208668ad82872dae
SHA512a661e939e69a59f88fd86fa654371ba4b3e3e8faf5c1b39bdaa0def8b277b26b63e96d4f5eb047ca3d8888597165dc709f395eeaf333c25c9cf56441c31dd676