Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
13/11/2023, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe
Resource
win10v2004-20231023-en
General
-
Target
9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe
-
Size
585KB
-
MD5
6de4dc36a48a6bbb75f008697a6becc1
-
SHA1
7abf7e6762b9ef2db74ce8a69e3ea2c3be63c567
-
SHA256
9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07
-
SHA512
780bdabbbff0870ccfce07f45563cfdeca35d3522c4beefcc378c900bc0d5d9e19be07d535e8ad377a0ef859cd45c454077cce5855f56acd1dc2b826b9a63abc
-
SSDEEP
12288:fYNsM2JDT5oGuNJ3+kqW86JwclTx/nGAUx0xRpbgye4hdTXlUXJdDstj:fo6KRpsvq5KLstj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2416 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2288 Logo1_.exe 2852 9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe -
Loads dropped DLL 1 IoCs
pid Process 2416 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wab.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2288 Logo1_.exe 2288 Logo1_.exe 2288 Logo1_.exe 2288 Logo1_.exe 2288 Logo1_.exe 2288 Logo1_.exe 2288 Logo1_.exe 2288 Logo1_.exe 2288 Logo1_.exe 2288 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2416 2508 9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe 28 PID 2508 wrote to memory of 2416 2508 9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe 28 PID 2508 wrote to memory of 2416 2508 9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe 28 PID 2508 wrote to memory of 2416 2508 9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe 28 PID 2508 wrote to memory of 2288 2508 9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe 30 PID 2508 wrote to memory of 2288 2508 9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe 30 PID 2508 wrote to memory of 2288 2508 9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe 30 PID 2508 wrote to memory of 2288 2508 9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe 30 PID 2288 wrote to memory of 2844 2288 Logo1_.exe 31 PID 2288 wrote to memory of 2844 2288 Logo1_.exe 31 PID 2288 wrote to memory of 2844 2288 Logo1_.exe 31 PID 2288 wrote to memory of 2844 2288 Logo1_.exe 31 PID 2416 wrote to memory of 2852 2416 cmd.exe 33 PID 2416 wrote to memory of 2852 2416 cmd.exe 33 PID 2416 wrote to memory of 2852 2416 cmd.exe 33 PID 2416 wrote to memory of 2852 2416 cmd.exe 33 PID 2844 wrote to memory of 2860 2844 net.exe 34 PID 2844 wrote to memory of 2860 2844 net.exe 34 PID 2844 wrote to memory of 2860 2844 net.exe 34 PID 2844 wrote to memory of 2860 2844 net.exe 34 PID 2288 wrote to memory of 1248 2288 Logo1_.exe 26 PID 2288 wrote to memory of 1248 2288 Logo1_.exe 26
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe"C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a3E0A.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe"C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe"4⤵
- Executes dropped EXE
PID:2852
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2860
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5568f17750238ab463c745953a303648a
SHA125e9de37d6edb52c584c442e4f93a0448b4b37d4
SHA2565351b82387339c78b116a077f2ba633da2a6fef86a165d92bfe28c2c3770ac81
SHA5129034bc060e8155e07009d2142830f03b29c50525232fa1719038eae4fc742d460c5dad7b7fdd6957264c338072fbe71193a23d994510dc809ae240023b9f1ed3
-
Filesize
474KB
MD582d95ff3c368229d3ecd547bfc2e95e4
SHA105c2c8065f243260792924168f85c614057119e8
SHA2565fd8262ebaf159fa1ba5a2b80dad6f98477d1f549a651fc1a327f0dd207f2fdb
SHA51227815b93d6070f7026c23ceac6210a78e694616d6a6a2012369b271e2d2ec986438f80dd3a29db4c4419b08084cb5a5914af216177669b86d8e2ae7184691699
-
Filesize
722B
MD51310dc98b5909c90867856291a2a1305
SHA1ce25137a831d17161a85b7e8c1290a5f4e2429a4
SHA256d4c23edf28737aa0c7a6178d2a50d616a0c775117699663e7fdfb6989d95d7f5
SHA51240c20f40f5bcf02ca660018338c0845e8cccfecea1b2b6794d1d44d9ad1bbb1894a907df2f2a645e72c4ca16af9f23f85d7591f74dafe64c38097b771a329927
-
Filesize
722B
MD51310dc98b5909c90867856291a2a1305
SHA1ce25137a831d17161a85b7e8c1290a5f4e2429a4
SHA256d4c23edf28737aa0c7a6178d2a50d616a0c775117699663e7fdfb6989d95d7f5
SHA51240c20f40f5bcf02ca660018338c0845e8cccfecea1b2b6794d1d44d9ad1bbb1894a907df2f2a645e72c4ca16af9f23f85d7591f74dafe64c38097b771a329927
-
C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe
Filesize556KB
MD51011236b2cbd03b55a8b31ac429355f2
SHA1fe255c9f9d40f654000dc64d3b8877758b4c73ca
SHA2567c74e8d992dd08770fed30a50c94c5a968c1c83be883df03e4452e74ea9ae66a
SHA5128b205690c4b068a170a7cb21a12ca35b323845f080038f4d84788b5a5973698abdc7141801737462e99df7ce5902cff3e56e62d2e600844b19d1c24eef94f953
-
C:\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe.exe
Filesize556KB
MD51011236b2cbd03b55a8b31ac429355f2
SHA1fe255c9f9d40f654000dc64d3b8877758b4c73ca
SHA2567c74e8d992dd08770fed30a50c94c5a968c1c83be883df03e4452e74ea9ae66a
SHA5128b205690c4b068a170a7cb21a12ca35b323845f080038f4d84788b5a5973698abdc7141801737462e99df7ce5902cff3e56e62d2e600844b19d1c24eef94f953
-
Filesize
29KB
MD5886eb3bf6157b45d4a041e1e32608c70
SHA1f476a007366ac0349789b0e803ec46be523f457a
SHA256a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b
SHA5126e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca
-
Filesize
29KB
MD5886eb3bf6157b45d4a041e1e32608c70
SHA1f476a007366ac0349789b0e803ec46be523f457a
SHA256a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b
SHA5126e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca
-
Filesize
29KB
MD5886eb3bf6157b45d4a041e1e32608c70
SHA1f476a007366ac0349789b0e803ec46be523f457a
SHA256a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b
SHA5126e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca
-
Filesize
29KB
MD5886eb3bf6157b45d4a041e1e32608c70
SHA1f476a007366ac0349789b0e803ec46be523f457a
SHA256a0e9eac517b54fe732db8bf9ceeb76c64a43e2e53bfd18b5a4ab0f8475f3873b
SHA5126e978385b23d3054695eaf2209e92591a667ccbde747f69cb63ae28f2db3a362d136bf16afb41ceb8eb304161cc698853f9cb825a26cc683e9a693d07c190fca
-
Filesize
10B
MD57af371ae7aad351d505f1b26382de243
SHA10a19bf0a1ccfb902a03b3da68bdd289190e62f5f
SHA2564fcc643d52dbc25dd57a011e27cbb0503711cf1a2ad1610a4f9e7b9f17c5bc1b
SHA5121127b9c88de9e2d58f7a512dd52c31bb9d96b0543f13e4cfff59ca2b73e60307538dd9bcd1c480e6d260fe45b44208a5554a5a60e8c2e3da8385b2cdd0e77d3e
-
\Users\Admin\AppData\Local\Temp\9fc5f5f6bcb78091cc54e6857dacd4270bed00771040ebe0c236a15866507a07.exe
Filesize556KB
MD51011236b2cbd03b55a8b31ac429355f2
SHA1fe255c9f9d40f654000dc64d3b8877758b4c73ca
SHA2567c74e8d992dd08770fed30a50c94c5a968c1c83be883df03e4452e74ea9ae66a
SHA5128b205690c4b068a170a7cb21a12ca35b323845f080038f4d84788b5a5973698abdc7141801737462e99df7ce5902cff3e56e62d2e600844b19d1c24eef94f953