Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe
Resource
win10v2004-20231023-en
General
-
Target
0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe
-
Size
995KB
-
MD5
70c2f412d8f1cc36436305449085cbde
-
SHA1
2a29c62bee28abb5b411968c345656c3f5fbb518
-
SHA256
0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae
-
SHA512
136b3d0d2225e3679769746b8f05178ee295f0fb8654558b2efa2ddc666f230ff5511989e6965effe4ebb694b802109237d8822a12a1ef350a9fac8660522900
-
SSDEEP
24576:f7Z7jrcnAhDSHukZXLBrO7Epc++mrcURx/p7:f71MsD6XVru+j3p
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1736 Logo1_.exe 3624 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge_pwa_launcher.exe Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\nb-NO\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\stickers\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Lumia.MagicEdit\UserControls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\SoundRec.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\plugins\rhp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lo-LA\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.UI\Resources\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hu-hu\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe File created C:\Windows\Logo1_.exe 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe 1736 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3676 wrote to memory of 2800 3676 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 84 PID 3676 wrote to memory of 2800 3676 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 84 PID 3676 wrote to memory of 2800 3676 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 84 PID 3676 wrote to memory of 1736 3676 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 85 PID 3676 wrote to memory of 1736 3676 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 85 PID 3676 wrote to memory of 1736 3676 0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe 85 PID 1736 wrote to memory of 1088 1736 Logo1_.exe 86 PID 1736 wrote to memory of 1088 1736 Logo1_.exe 86 PID 1736 wrote to memory of 1088 1736 Logo1_.exe 86 PID 1088 wrote to memory of 1440 1088 net.exe 88 PID 1088 wrote to memory of 1440 1088 net.exe 88 PID 1088 wrote to memory of 1440 1088 net.exe 88 PID 2800 wrote to memory of 3624 2800 cmd.exe 90 PID 2800 wrote to memory of 3624 2800 cmd.exe 90 PID 2800 wrote to memory of 3624 2800 cmd.exe 90 PID 1736 wrote to memory of 3216 1736 Logo1_.exe 56 PID 1736 wrote to memory of 3216 1736 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe"C:\Users\Admin\AppData\Local\Temp\0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aDC75.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe"C:\Users\Admin\AppData\Local\Temp\0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe"4⤵
- Executes dropped EXE
PID:3624
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1440
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5f2b4ffcebf68bb134bfd543c5deedb1c
SHA1712a452544dd056b3a8abfe8eeef97dcc10b24a2
SHA256b7d49362d2896de606ba512344e656bfd6bbfdaaf2c741d2394d57aaf6549bbf
SHA512a1bb0ed24bd61b4c5266e1cb8dc2987c28a39b644c52262d319b6fb7d8eededd5b9ebcbb11adc49de8dd0af68e39f054c75cd498e96e10e2e91fa1e49f55ca69
-
Filesize
484KB
MD5d0472712f6e35225d3d006af731abcff
SHA1aca70ad30fba0aa1b2f3464a472779ef1e44725e
SHA2560409d1af0f58c78d03f3a0fe324a8c12d55b16d01e694e69cce721641dc1f8fd
SHA51260bfd8819b1444dba6e0e6bfc7aa59691b912594b309c54cfe13c004e68427c9c960ce8b4907f1ac9771f53cdf27406530c18bdcb696893cfdb9f4b8ef761b5b
-
Filesize
722B
MD516c3d3b1846c7606c2ace70e5d943607
SHA158d5673e4ab28cd0a10d775d528384a2c97ae00d
SHA256b5c15bb35ef568fd2debde146e9b4612990ca5fad8e089336da1aedcae0a42b6
SHA512429956364820d5512ef9c18567c9018ca26c43e7967d5f81fa09e23b2504a4dda632b85b66d033a5b338f456a11ed08e74915fd607cfe41d946a8d317bc9ccd2
-
C:\Users\Admin\AppData\Local\Temp\0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe
Filesize969KB
MD57ac55c17043ed33f0284a440aa8bfdf8
SHA17f17e48af2a9c33b91a4c0e179303238785b448a
SHA256231b68de53b97fcec0334d891b83d18869613d14c1c92992eb71a436479d83cf
SHA51267b861b3c27cfb3dfaf3b9a9409af0d3cf76c1c65c8f8c5b7e4e3b00ce54ae68a6705fba55becac56cd4151ba434a4ca0300eee4628e1207e12a77d3605c9b22
-
C:\Users\Admin\AppData\Local\Temp\0f35555ccc2d39afa0918d897d69bc950ffb39e4c9c0e78fc3a26017dc9cc4ae.exe.exe
Filesize969KB
MD57ac55c17043ed33f0284a440aa8bfdf8
SHA17f17e48af2a9c33b91a4c0e179303238785b448a
SHA256231b68de53b97fcec0334d891b83d18869613d14c1c92992eb71a436479d83cf
SHA51267b861b3c27cfb3dfaf3b9a9409af0d3cf76c1c65c8f8c5b7e4e3b00ce54ae68a6705fba55becac56cd4151ba434a4ca0300eee4628e1207e12a77d3605c9b22
-
Filesize
26KB
MD5b2275fd451409ee1e9f00f0d70813921
SHA1acb90912029b49d0a1382d86be15bd3d3d6ac5ea
SHA256a314139ec0861ca49e653a195c3dce60e6f58a855f3c796b877929ca4b6daa58
SHA512337a5b193be8482697c9ec63a6b1d523ea4f018aa0fafe24f3b6407087a956597f2685755e7b8ea9452456932bd2dac73978b6532b39855e0cd69101d5e75b9e
-
Filesize
26KB
MD5b2275fd451409ee1e9f00f0d70813921
SHA1acb90912029b49d0a1382d86be15bd3d3d6ac5ea
SHA256a314139ec0861ca49e653a195c3dce60e6f58a855f3c796b877929ca4b6daa58
SHA512337a5b193be8482697c9ec63a6b1d523ea4f018aa0fafe24f3b6407087a956597f2685755e7b8ea9452456932bd2dac73978b6532b39855e0cd69101d5e75b9e
-
Filesize
26KB
MD5b2275fd451409ee1e9f00f0d70813921
SHA1acb90912029b49d0a1382d86be15bd3d3d6ac5ea
SHA256a314139ec0861ca49e653a195c3dce60e6f58a855f3c796b877929ca4b6daa58
SHA512337a5b193be8482697c9ec63a6b1d523ea4f018aa0fafe24f3b6407087a956597f2685755e7b8ea9452456932bd2dac73978b6532b39855e0cd69101d5e75b9e
-
Filesize
10B
MD560d14ad2d8cf983c15b0537099900c9c
SHA1e1ee66c7f17631143d9ddf816bc1ec0787e17447
SHA2563ac04e33b3ef42c31240d788afd9639b8f26c5edf2f0d7bb82d348a7d8bc513e
SHA5122d19dfda574fdbc46ee25954549bcc6330abebc4432abde57253d602aa750fe3cb3a976c769aeeae3cc0a7a5e43e505256a474dd3be5f84ceaba0607d6bb6685