Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe
Resource
win10v2004-20231215-en
General
-
Target
78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe
-
Size
227KB
-
MD5
7a539b03e779c57a06383779a014825d
-
SHA1
87483db2f259d80df45272195436ef6dcbc1eb6d
-
SHA256
78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca
-
SHA512
a1099082ce9c4b9ce8ef2f7c1ef4d6a95f68b9ff48df1b6c1d92df8cdbe4f0d7829d557f19994728f2e8639b00ca8a5786828e2d344cf5a8484fff517a9613d8
-
SSDEEP
3072:isftffjmNrHrfzY6c6X/YoW4l/DReos0gXf+EvC6C36eCWdMuIB+NSzx602h9dX+:bVfjmNHAel/DRfkTC3dMnB++Cs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2932 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2156 Logo1_.exe 2660 78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe -
Loads dropped DLL 1 IoCs
pid Process 2932 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Access.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PowerPoint.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Icons\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\cmm\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Temp\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Access.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe File created C:\Windows\Logo1_.exe 78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe 2156 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2932 1576 78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe 28 PID 1576 wrote to memory of 2932 1576 78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe 28 PID 1576 wrote to memory of 2932 1576 78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe 28 PID 1576 wrote to memory of 2932 1576 78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe 28 PID 1576 wrote to memory of 2156 1576 78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe 29 PID 1576 wrote to memory of 2156 1576 78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe 29 PID 1576 wrote to memory of 2156 1576 78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe 29 PID 1576 wrote to memory of 2156 1576 78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe 29 PID 2156 wrote to memory of 2920 2156 Logo1_.exe 31 PID 2156 wrote to memory of 2920 2156 Logo1_.exe 31 PID 2156 wrote to memory of 2920 2156 Logo1_.exe 31 PID 2156 wrote to memory of 2920 2156 Logo1_.exe 31 PID 2920 wrote to memory of 2632 2920 net.exe 33 PID 2920 wrote to memory of 2632 2920 net.exe 33 PID 2920 wrote to memory of 2632 2920 net.exe 33 PID 2920 wrote to memory of 2632 2920 net.exe 33 PID 2932 wrote to memory of 2660 2932 cmd.exe 34 PID 2932 wrote to memory of 2660 2932 cmd.exe 34 PID 2932 wrote to memory of 2660 2932 cmd.exe 34 PID 2932 wrote to memory of 2660 2932 cmd.exe 34 PID 2932 wrote to memory of 2660 2932 cmd.exe 34 PID 2932 wrote to memory of 2660 2932 cmd.exe 34 PID 2932 wrote to memory of 2660 2932 cmd.exe 34 PID 2156 wrote to memory of 1372 2156 Logo1_.exe 7 PID 2156 wrote to memory of 1372 2156 Logo1_.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe"C:\Users\Admin\AppData\Local\Temp\78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1777.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe"C:\Users\Admin\AppData\Local\Temp\78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe"3⤵
- Executes dropped EXE
PID:2660
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2632
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD59e86b3778c8efbbd353f70cbd9dcb918
SHA10ceb144e856d6e5bfdf49b51cc5129c689dc95d3
SHA256b83b01915b636deb3e0e48d88254b1dbf04302fc9f84889f9cdaea28ae634ba9
SHA5129e1c0c872b5447bd58edaaedfe3e7549d90345b5ec6b664bb90c980be0a3ee59a8d3b545d1167c3f236fa7ec5392aa59099629b318d1c15d2a0700866eb10712
-
C:\Users\Admin\AppData\Local\Temp\78619af783c3c8c0d7c41159ac86ff40de9eb94b59ef1842675c8e7a5feee8ca.exe.exe
Filesize201KB
MD511fe091ace9d03b9ada6d5a22d12c0d0
SHA15379ebe84500d425586904e7f9ac0393ab2a9d24
SHA25650f4ed60a507ce9dd1f3f4e7d53053d923cb71594374a25251746a9b2271e4ee
SHA5120f39af99697332c697ca62e2708e0a9200552a55f2d3057b64e9b18df2fe2828be750b14b5336ac9518b4c1282e82cd170b64587cf56b45b840ca231108b7fdf
-
Filesize
26KB
MD56a2fe8366e8c4e599cf0f58addd6dbfb
SHA142d87d444f62be53bf6e092aadb030b7f14a8a9b
SHA256275f0e70263a79d5e1dd80f8aa774b43597bfc3d951ff2785a3b55c38325a340
SHA5122d2caa6ac1e694a18d02726e4d6a4e9f2179fa5a056c081029d0a6bc5cd2d971eeb17b528edd92a5bfafe3ef8598eaead539d9226e502f984d8be62c5ee94e6e
-
Filesize
10B
MD5b8fe24fdb9877e9096606f3ec04e8aee
SHA1195fca588a722e6802e655b3f8a838bf4cbc18a3
SHA256c73bcb74435008f4d7f5d19e221dfb777624db21cc98dcbf6969e313783b0525
SHA512bfb98ccb3dc3106bb839319e5f7b3c1b7c67a5f97160ac967b944472eff9da64819daf40809b335bfe08a1610ea9f2ea0fb0bfde86b85a5ba6239b1201615295