Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe
Resource
win10v2004-20231023-en
General
-
Target
0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe
-
Size
995KB
-
MD5
70c2f412d8f1cc36436305449085cbde
-
SHA1
2a29c62bee28abb5b411968c345656c3f5fbb518
-
SHA256
0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae
-
SHA512
136b3d0d2225e3679769746b8f05178ee295f0fb8654558b2efa2ddc666f230ff5511989e6965effe4ebb694b802109237d8822a12a1ef350a9fac8660522900
-
SSDEEP
24576:f7Z7jrcnAhDSHukZXLBrO7Epc++mrcURx/p7:f71MsD6XVru+j3p
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1700 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3036 Logo1_.exe 1604 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe -
Loads dropped DLL 1 IoCs
pid Process 1700 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CASCADE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\SOLVER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PowerPoint.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\3082\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wab.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe File created C:\Windows\Logo1_.exe 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe 3036 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1700 1724 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 28 PID 1724 wrote to memory of 1700 1724 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 28 PID 1724 wrote to memory of 1700 1724 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 28 PID 1724 wrote to memory of 1700 1724 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 28 PID 1724 wrote to memory of 3036 1724 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 29 PID 1724 wrote to memory of 3036 1724 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 29 PID 1724 wrote to memory of 3036 1724 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 29 PID 1724 wrote to memory of 3036 1724 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 29 PID 3036 wrote to memory of 2680 3036 Logo1_.exe 31 PID 3036 wrote to memory of 2680 3036 Logo1_.exe 31 PID 3036 wrote to memory of 2680 3036 Logo1_.exe 31 PID 3036 wrote to memory of 2680 3036 Logo1_.exe 31 PID 2680 wrote to memory of 2476 2680 net.exe 33 PID 2680 wrote to memory of 2476 2680 net.exe 33 PID 2680 wrote to memory of 2476 2680 net.exe 33 PID 2680 wrote to memory of 2476 2680 net.exe 33 PID 1700 wrote to memory of 1604 1700 cmd.exe 34 PID 1700 wrote to memory of 1604 1700 cmd.exe 34 PID 1700 wrote to memory of 1604 1700 cmd.exe 34 PID 1700 wrote to memory of 1604 1700 cmd.exe 34 PID 3036 wrote to memory of 1212 3036 Logo1_.exe 14 PID 3036 wrote to memory of 1212 3036 Logo1_.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe"C:\Users\Admin\AppData\Local\Temp\0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4CC9.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe"C:\Users\Admin\AppData\Local\Temp\0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe"4⤵
- Executes dropped EXE
PID:1604
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2476
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5f2b4ffcebf68bb134bfd543c5deedb1c
SHA1712a452544dd056b3a8abfe8eeef97dcc10b24a2
SHA256b7d49362d2896de606ba512344e656bfd6bbfdaaf2c741d2394d57aaf6549bbf
SHA512a1bb0ed24bd61b4c5266e1cb8dc2987c28a39b644c52262d319b6fb7d8eededd5b9ebcbb11adc49de8dd0af68e39f054c75cd498e96e10e2e91fa1e49f55ca69
-
Filesize
722B
MD5f6850f02cd285e77139fb1228bf21022
SHA14228d64a8f89f42aa69869dbe299b49b305e690c
SHA2560438fc060d9816805d65849c4066595c0fb2d5002320d55f75a59f1730b7b8a9
SHA512e8b6a3d747ca7efdb7a6399b4f1f4cadf287625490ce150da9f60b7648fbeb4271aa36d2dbe2a9f35cc616be60534e7f00312a00f0d6685bde2c359549d7d8bd
-
Filesize
722B
MD5f6850f02cd285e77139fb1228bf21022
SHA14228d64a8f89f42aa69869dbe299b49b305e690c
SHA2560438fc060d9816805d65849c4066595c0fb2d5002320d55f75a59f1730b7b8a9
SHA512e8b6a3d747ca7efdb7a6399b4f1f4cadf287625490ce150da9f60b7648fbeb4271aa36d2dbe2a9f35cc616be60534e7f00312a00f0d6685bde2c359549d7d8bd
-
C:\Users\Admin\AppData\Local\Temp\0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe
Filesize969KB
MD57ac55c17043ed33f0284a440aa8bfdf8
SHA17f17e48af2a9c33b91a4c0e179303238785b448a
SHA256231b68de53b97fcec0334d891b83d18869613d14c1c92992eb71a436479d83cf
SHA51267b861b3c27cfb3dfaf3b9a9409af0d3cf76c1c65c8f8c5b7e4e3b00ce54ae68a6705fba55becac56cd4151ba434a4ca0300eee4628e1207e12a77d3605c9b22
-
C:\Users\Admin\AppData\Local\Temp\0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe.exe
Filesize969KB
MD57ac55c17043ed33f0284a440aa8bfdf8
SHA17f17e48af2a9c33b91a4c0e179303238785b448a
SHA256231b68de53b97fcec0334d891b83d18869613d14c1c92992eb71a436479d83cf
SHA51267b861b3c27cfb3dfaf3b9a9409af0d3cf76c1c65c8f8c5b7e4e3b00ce54ae68a6705fba55becac56cd4151ba434a4ca0300eee4628e1207e12a77d3605c9b22
-
Filesize
26KB
MD5b2275fd451409ee1e9f00f0d70813921
SHA1acb90912029b49d0a1382d86be15bd3d3d6ac5ea
SHA256a314139ec0861ca49e653a195c3dce60e6f58a855f3c796b877929ca4b6daa58
SHA512337a5b193be8482697c9ec63a6b1d523ea4f018aa0fafe24f3b6407087a956597f2685755e7b8ea9452456932bd2dac73978b6532b39855e0cd69101d5e75b9e
-
Filesize
26KB
MD5b2275fd451409ee1e9f00f0d70813921
SHA1acb90912029b49d0a1382d86be15bd3d3d6ac5ea
SHA256a314139ec0861ca49e653a195c3dce60e6f58a855f3c796b877929ca4b6daa58
SHA512337a5b193be8482697c9ec63a6b1d523ea4f018aa0fafe24f3b6407087a956597f2685755e7b8ea9452456932bd2dac73978b6532b39855e0cd69101d5e75b9e
-
Filesize
26KB
MD5b2275fd451409ee1e9f00f0d70813921
SHA1acb90912029b49d0a1382d86be15bd3d3d6ac5ea
SHA256a314139ec0861ca49e653a195c3dce60e6f58a855f3c796b877929ca4b6daa58
SHA512337a5b193be8482697c9ec63a6b1d523ea4f018aa0fafe24f3b6407087a956597f2685755e7b8ea9452456932bd2dac73978b6532b39855e0cd69101d5e75b9e
-
Filesize
26KB
MD5b2275fd451409ee1e9f00f0d70813921
SHA1acb90912029b49d0a1382d86be15bd3d3d6ac5ea
SHA256a314139ec0861ca49e653a195c3dce60e6f58a855f3c796b877929ca4b6daa58
SHA512337a5b193be8482697c9ec63a6b1d523ea4f018aa0fafe24f3b6407087a956597f2685755e7b8ea9452456932bd2dac73978b6532b39855e0cd69101d5e75b9e
-
Filesize
10B
MD560d14ad2d8cf983c15b0537099900c9c
SHA1e1ee66c7f17631143d9ddf816bc1ec0787e17447
SHA2563ac04e33b3ef42c31240d788afd9639b8f26c5edf2f0d7bb82d348a7d8bc513e
SHA5122d19dfda574fdbc46ee25954549bcc6330abebc4432abde57253d602aa750fe3cb3a976c769aeeae3cc0a7a5e43e505256a474dd3be5f84ceaba0607d6bb6685
-
\Users\Admin\AppData\Local\Temp\0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe
Filesize969KB
MD57ac55c17043ed33f0284a440aa8bfdf8
SHA17f17e48af2a9c33b91a4c0e179303238785b448a
SHA256231b68de53b97fcec0334d891b83d18869613d14c1c92992eb71a436479d83cf
SHA51267b861b3c27cfb3dfaf3b9a9409af0d3cf76c1c65c8f8c5b7e4e3b00ce54ae68a6705fba55becac56cd4151ba434a4ca0300eee4628e1207e12a77d3605c9b22