Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
172s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20/12/2023, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe
Resource
win10v2004-20231215-en
General
-
Target
88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe
-
Size
111KB
-
MD5
50e2772c1d2e6f5cf101120c67c3cfd2
-
SHA1
8e32a420335712972c9c85fbe22c0da2f8b0b439
-
SHA256
88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b
-
SHA512
c6fedb229774a7487330927827b236cc5eb7fbbd7045cfd0166d2b1e36120a092c5fc00a6db8af2963522f712fd0650fc9a5afb21655b084bd4faf8fac45d074
-
SSDEEP
1536:AfgLdQAQfcfymNr4yuzgQ5WugrQ+SccIp1t4xO67y5qHae:AftffjmNsyuzgKwr9bB1t4xO67y5j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2832 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2756 Logo1_.exe 2652 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe -
Loads dropped DLL 1 IoCs
pid Process 2832 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Components\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wab.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE Logo1_.exe File created C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Skins\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\3082\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe File created C:\Windows\Logo1_.exe 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe 2756 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2832 2128 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 20 PID 2128 wrote to memory of 2832 2128 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 20 PID 2128 wrote to memory of 2832 2128 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 20 PID 2128 wrote to memory of 2832 2128 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 20 PID 2128 wrote to memory of 2756 2128 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 18 PID 2128 wrote to memory of 2756 2128 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 18 PID 2128 wrote to memory of 2756 2128 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 18 PID 2128 wrote to memory of 2756 2128 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 18 PID 2756 wrote to memory of 2868 2756 Logo1_.exe 17 PID 2756 wrote to memory of 2868 2756 Logo1_.exe 17 PID 2756 wrote to memory of 2868 2756 Logo1_.exe 17 PID 2756 wrote to memory of 2868 2756 Logo1_.exe 17 PID 2832 wrote to memory of 2652 2832 cmd.exe 15 PID 2832 wrote to memory of 2652 2832 cmd.exe 15 PID 2832 wrote to memory of 2652 2832 cmd.exe 15 PID 2832 wrote to memory of 2652 2832 cmd.exe 15 PID 2868 wrote to memory of 2792 2868 net.exe 14 PID 2868 wrote to memory of 2792 2868 net.exe 14 PID 2868 wrote to memory of 2792 2868 net.exe 14 PID 2868 wrote to memory of 2792 2868 net.exe 14 PID 2756 wrote to memory of 1208 2756 Logo1_.exe 24 PID 2756 wrote to memory of 1208 2756 Logo1_.exe 24
Processes
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"1⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe"C:\Users\Admin\AppData\Local\Temp\88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe"1⤵
- Executes dropped EXE
PID:2652
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"1⤵
- Suspicious use of WriteProcessMemory
PID:2868
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD48E.bat1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832
-
C:\Users\Admin\AppData\Local\Temp\88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe"C:\Users\Admin\AppData\Local\Temp\88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2128
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5d71c890d8041aa5f8fcc10e9278afc68
SHA126953285cf84630243be86b92fca3c387361f34f
SHA256a84672808cd89a7a153ee2120799dd4d162be02fa136cc7d1fac501d1659a471
SHA512194f42deb1a9401f6aa0c596d71707de465eddb86498040b64f9c94be5667b11f454d05d42ab03386a359e39405dbe15a4f475eb7057e85760800b0c8b86ba49
-
Filesize
722B
MD555ef22b4a68fc44d4327ed4d6206a8d0
SHA14ece8d9a874556d8d69342f98ae9c6bdf118e1e1
SHA256b92cc21d7408d03f8c31ee2ecd1eb856d91c26aa2abf0285b34a934ac195d544
SHA5124f8d29ab62f789052dc4c9bb8d7f19cb80e3f4ff16ac6a5fc54cc523db1ac4f13315effc46159f545be0d0774d2c14e468cbe199c69302a2d179f8c0c2c934ee
-
C:\Users\Admin\AppData\Local\Temp\88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe.exe
Filesize85KB
MD5371e896d818784934bd1456296b99cbe
SHA188f23b0913ef5f94cd888605504e1e54c3a6e48f
SHA256604679789c46a01aa320eb1390da98b92721b7144e57ef63853c3c8f6d7ea85d
SHA5121d3342118271b783c3937acbdb15cc16f1db91b3ce1cf5069078afd595d468d61efc6c6e082ab2a3122c046af6de5cdb70d822e60d526e782abcb7beaa10fb53
-
Filesize
26KB
MD54f100cba849d788770ac90cd66c97120
SHA1ebb9cbf021afc23121a8c682a4a5b80240bddc37
SHA256ae843e93ea4355adff60e584fc7186e05eaa40468b64510cc3dc501fc1db1fdd
SHA51269f3c5f1efd10053e8debd76143a88755d5a035882b69c3bca7ebc93aa040e3ef0aede3e7691089485850dd3212abcc02b23acdc396878a6d2658419cec8a0ee
-
Filesize
10B
MD5157dcc32271e1367e7e2dd14aa27e5a3
SHA14971ce85072488f8136ba098ba71b0e6b45e221a
SHA256763de86e71d2e922753efeaf737c37f65f77f3fdef2ae784faf43ffacf606ec8
SHA5121c6e4cbf451952cdc047759d933761ae156643f6b7372a95f1a8e3739aebad946e6b1916dbb77d786316456419357d9f358034a8750e2c96938d8c915ecd46ed