Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
18/11/2023, 22:57 UTC
Static task
static1
Behavioral task
behavioral1
Sample
f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe
Resource
win10v2004-20231023-en
General
-
Target
f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe
-
Size
168KB
-
MD5
22dc8b195f3cfcebf6fb2fab2292c30f
-
SHA1
a92f811d58932662ae0d33b4fc4326253b3b3fd9
-
SHA256
f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e
-
SHA512
756319f91f632f4ad9c3bdaeb56f1dfc07ade7cc2bbcbabd2e266e379e74b3019e36dd26c99634f9f60fce126f07824de109e5ad5f2a3a263392ed8e191b7e35
-
SSDEEP
3072:AJftffjmNoxk2aACAMfVxHsjqUwkMejsRkCdvR0FlgHIRXmUa9Il6:6VfjmN92dMQRcR0FZXpw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3056 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2548 Logo1_.exe 2608 f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe -
Loads dropped DLL 1 IoCs
pid Process 3056 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Uninstall Information\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Temp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECHO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PROPLUS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SUMIPNTG\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe File created C:\Windows\Logo1_.exe f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2548 Logo1_.exe 2548 Logo1_.exe 2548 Logo1_.exe 2548 Logo1_.exe 2548 Logo1_.exe 2548 Logo1_.exe 2548 Logo1_.exe 2548 Logo1_.exe 2548 Logo1_.exe 2548 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2040 wrote to memory of 3056 2040 f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe 28 PID 2040 wrote to memory of 3056 2040 f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe 28 PID 2040 wrote to memory of 3056 2040 f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe 28 PID 2040 wrote to memory of 3056 2040 f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe 28 PID 2040 wrote to memory of 2548 2040 f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe 29 PID 2040 wrote to memory of 2548 2040 f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe 29 PID 2040 wrote to memory of 2548 2040 f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe 29 PID 2040 wrote to memory of 2548 2040 f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe 29 PID 2548 wrote to memory of 2128 2548 Logo1_.exe 30 PID 2548 wrote to memory of 2128 2548 Logo1_.exe 30 PID 2548 wrote to memory of 2128 2548 Logo1_.exe 30 PID 2548 wrote to memory of 2128 2548 Logo1_.exe 30 PID 2128 wrote to memory of 2616 2128 net.exe 33 PID 2128 wrote to memory of 2616 2128 net.exe 33 PID 2128 wrote to memory of 2616 2128 net.exe 33 PID 2128 wrote to memory of 2616 2128 net.exe 33 PID 3056 wrote to memory of 2608 3056 cmd.exe 34 PID 3056 wrote to memory of 2608 3056 cmd.exe 34 PID 3056 wrote to memory of 2608 3056 cmd.exe 34 PID 3056 wrote to memory of 2608 3056 cmd.exe 34 PID 2548 wrote to memory of 1212 2548 Logo1_.exe 17 PID 2548 wrote to memory of 1212 2548 Logo1_.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe"C:\Users\Admin\AppData\Local\Temp\f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a9F3C.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe"C:\Users\Admin\AppData\Local\Temp\f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe"4⤵
- Executes dropped EXE
PID:2608
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2616
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD54ce7099971ace528948a8a4aebc3ff9c
SHA127398895057cd20390efdd9221b9690d366e76f3
SHA2562bb3ba284a7dcaf6fd29aa131aebd41b39b3f24ffc422468661b5bb3df3bd770
SHA512678b183ecc43d9717d8e8defd2153247b4f4c1c179f4b95cea73524c3df81c823de728f2e18b25974f51cb217d683c45ede401c0250f4cae5d6f513e8cba45a4
-
Filesize
471KB
MD5c6c8fde27f649c91ddaab8cb9ca344a6
SHA15e4865aec432a18107182f47edda176e8c566152
SHA25632c3fed53bfc1d890e9bd1d771fdc7e2c81480e03f1425bce07b4045a192d100
SHA512a8df7d1e852d871d7f16bae10c4ff049359583da88cc85a039f0298525839040d5363ce5ef4cbdb92a12a25785f73df83cf0df07752b78e6e6444f32160a2155
-
Filesize
722B
MD5cf33be96ab879616eb462e77dcb3cc7b
SHA1b2fc8328c5b281d90a1b6a5bcdd60bc23de74803
SHA256ff3a402e7aa2cbd4664812aad4a3e8ca7daabd5f88a6a7d0a770f57b23a392c9
SHA512803bd9edf1ece1e90e1a30db6ba0a40c836157fd18f0dd98ca91403d2315f0978faf888cc8df0596c2e5eda28baf674f5fb8c9886945ea187e25a9b89b495b07
-
Filesize
722B
MD5cf33be96ab879616eb462e77dcb3cc7b
SHA1b2fc8328c5b281d90a1b6a5bcdd60bc23de74803
SHA256ff3a402e7aa2cbd4664812aad4a3e8ca7daabd5f88a6a7d0a770f57b23a392c9
SHA512803bd9edf1ece1e90e1a30db6ba0a40c836157fd18f0dd98ca91403d2315f0978faf888cc8df0596c2e5eda28baf674f5fb8c9886945ea187e25a9b89b495b07
-
C:\Users\Admin\AppData\Local\Temp\f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe
Filesize141KB
MD55a432a042dae460abe7199b758e8606c
SHA1821b965267ee15c6c59178777ae7a8dcfc80f4ba
SHA2566e5d1f477d290905be27cebf9572bac6b05ffef2fad901d3c8e11f665f8b9a71
SHA51272823cc212c585a8080122c416e66fe28cb5a1787ae384d52b2068aec4a16944ed10731c622c1db0d8035aee7b5706bc7d2a4e6295a6ce3e50eb4895cc968c75
-
C:\Users\Admin\AppData\Local\Temp\f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe.exe
Filesize141KB
MD55a432a042dae460abe7199b758e8606c
SHA1821b965267ee15c6c59178777ae7a8dcfc80f4ba
SHA2566e5d1f477d290905be27cebf9572bac6b05ffef2fad901d3c8e11f665f8b9a71
SHA51272823cc212c585a8080122c416e66fe28cb5a1787ae384d52b2068aec4a16944ed10731c622c1db0d8035aee7b5706bc7d2a4e6295a6ce3e50eb4895cc968c75
-
Filesize
26KB
MD5edefa926ddb5dfe186d18e6203474ca0
SHA186c9f2eda46c448b917132afcc737f5a70265b2c
SHA25656d13ff3abc7dbc60ec382fa1411f2baa07920a5a6fa3f34f49ce61386c815db
SHA5123b4ffb3260e3ce6dadf94020953de7e59028ae110866a38e7e3fe38feefbe77c6f167ce60da06728935668c1d45272927501d9ef017379eb8b453be75a27486d
-
Filesize
26KB
MD5edefa926ddb5dfe186d18e6203474ca0
SHA186c9f2eda46c448b917132afcc737f5a70265b2c
SHA25656d13ff3abc7dbc60ec382fa1411f2baa07920a5a6fa3f34f49ce61386c815db
SHA5123b4ffb3260e3ce6dadf94020953de7e59028ae110866a38e7e3fe38feefbe77c6f167ce60da06728935668c1d45272927501d9ef017379eb8b453be75a27486d
-
Filesize
26KB
MD5edefa926ddb5dfe186d18e6203474ca0
SHA186c9f2eda46c448b917132afcc737f5a70265b2c
SHA25656d13ff3abc7dbc60ec382fa1411f2baa07920a5a6fa3f34f49ce61386c815db
SHA5123b4ffb3260e3ce6dadf94020953de7e59028ae110866a38e7e3fe38feefbe77c6f167ce60da06728935668c1d45272927501d9ef017379eb8b453be75a27486d
-
Filesize
26KB
MD5edefa926ddb5dfe186d18e6203474ca0
SHA186c9f2eda46c448b917132afcc737f5a70265b2c
SHA25656d13ff3abc7dbc60ec382fa1411f2baa07920a5a6fa3f34f49ce61386c815db
SHA5123b4ffb3260e3ce6dadf94020953de7e59028ae110866a38e7e3fe38feefbe77c6f167ce60da06728935668c1d45272927501d9ef017379eb8b453be75a27486d
-
Filesize
10B
MD5efd2ef11e05f1e4e71c36b61f42f4b74
SHA166f050470e42f08b4f86a669c0c3e7739d334585
SHA256c4d0fb64b84374af29c373ad1807dd661605dc6714e45c6617f7f5c537b9c5f4
SHA51230402f761b30147ad56861e2c5da6b70c5a9056cf6b582a5c333b9f867259fd42bb2e18c8d8a43762a9365e7147d624e13f0356d307535863ba0b2c9567e486b
-
\Users\Admin\AppData\Local\Temp\f8719ffaf215d7f84bb520b9cb28b1fcb04e711ae4eb418895f3b07a5a30069e.exe
Filesize141KB
MD55a432a042dae460abe7199b758e8606c
SHA1821b965267ee15c6c59178777ae7a8dcfc80f4ba
SHA2566e5d1f477d290905be27cebf9572bac6b05ffef2fad901d3c8e11f665f8b9a71
SHA51272823cc212c585a8080122c416e66fe28cb5a1787ae384d52b2068aec4a16944ed10731c622c1db0d8035aee7b5706bc7d2a4e6295a6ce3e50eb4895cc968c75