Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/12/2023, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe
Resource
win10v2004-20231215-en
General
-
Target
88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe
-
Size
111KB
-
MD5
50e2772c1d2e6f5cf101120c67c3cfd2
-
SHA1
8e32a420335712972c9c85fbe22c0da2f8b0b439
-
SHA256
88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b
-
SHA512
c6fedb229774a7487330927827b236cc5eb7fbbd7045cfd0166d2b1e36120a092c5fc00a6db8af2963522f712fd0650fc9a5afb21655b084bd4faf8fac45d074
-
SSDEEP
1536:AfgLdQAQfcfymNr4yuzgQ5WugrQ+SccIp1t4xO67y5qHae:AftffjmNsyuzgKwr9bB1t4xO67y5j
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1808 Logo1_.exe 4468 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_GB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Comprehensive\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\ru\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_2019.125.2243.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pl-PL\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\libs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_2019.430.2026.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\MicrosoftEdgeUpdate.exe Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Calculator\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe File created C:\Windows\Logo1_.exe 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe 1808 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1588 wrote to memory of 976 1588 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 90 PID 1588 wrote to memory of 976 1588 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 90 PID 1588 wrote to memory of 976 1588 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 90 PID 1588 wrote to memory of 1808 1588 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 91 PID 1588 wrote to memory of 1808 1588 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 91 PID 1588 wrote to memory of 1808 1588 88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe 91 PID 1808 wrote to memory of 3604 1808 Logo1_.exe 94 PID 1808 wrote to memory of 3604 1808 Logo1_.exe 94 PID 1808 wrote to memory of 3604 1808 Logo1_.exe 94 PID 3604 wrote to memory of 3876 3604 net.exe 95 PID 3604 wrote to memory of 3876 3604 net.exe 95 PID 3604 wrote to memory of 3876 3604 net.exe 95 PID 976 wrote to memory of 4468 976 cmd.exe 96 PID 976 wrote to memory of 4468 976 cmd.exe 96 PID 976 wrote to memory of 4468 976 cmd.exe 96 PID 1808 wrote to memory of 3408 1808 Logo1_.exe 48 PID 1808 wrote to memory of 3408 1808 Logo1_.exe 48
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe"C:\Users\Admin\AppData\Local\Temp\88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3FB8.bat3⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe"C:\Users\Admin\AppData\Local\Temp\88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe"4⤵
- Executes dropped EXE
PID:4468
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3876
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5d71c890d8041aa5f8fcc10e9278afc68
SHA126953285cf84630243be86b92fca3c387361f34f
SHA256a84672808cd89a7a153ee2120799dd4d162be02fa136cc7d1fac501d1659a471
SHA512194f42deb1a9401f6aa0c596d71707de465eddb86498040b64f9c94be5667b11f454d05d42ab03386a359e39405dbe15a4f475eb7057e85760800b0c8b86ba49
-
Filesize
570KB
MD5dabf58f42d479cb001a8c8fe4bcd7d1b
SHA13e0b83036dc4fcb6fceb8435d338fec29d75ac7b
SHA256b620b8686d3e33de89c03281c08d67140aa0ec7a2d90a58eb723ffb9a39fd421
SHA5125cefe9ff324afa7fe084e12e58b1f1d2eb6df001b210fe0bd31e046a18e49b8d1e33f7c7697dcab34a31cade1a9bbe5910c0d580af0fd672d621f103f46997f2
-
Filesize
481KB
MD51db5b390daa2d070657fbdb4f5d2cc55
SHA177e633e49df484b827080753514cc376749b0ceb
SHA256d5fbaf5c0d8e313d4dad23b28cac4256c5dbed6ab3b0d797e2971f30c5e095ad
SHA51268aa0152f5aae79a146c1813915fd16ec5454b285bd1781370923f97d6c147d53684192f7f4161e5c1a340959ec432ecaac127b0abe7d08f70c387e08ee4f617
-
Filesize
722B
MD5ab988f45b6d4683556a8fa2449e7fcb4
SHA126fc067ae769ab5c3e179ff5a4c6379e9ca5de0e
SHA25674c9d3b7375be95a0ab9f8a101cf5a12e563e9e70a72b79660a3f7bd6f68f2a7
SHA51247ed356a40e3306fb829236c14dd6b720c7e565cec6268664ee0b63be348767b5d43b0b1a8fc4111f77b02bb0d57daeab04cafb534411701bcbb86568b0509ab
-
C:\Users\Admin\AppData\Local\Temp\88f529b9f243fb181bddc87e3a60f48262197b8b3b7a9c08e0064c2ea5c1fe5b.exe
Filesize85KB
MD5371e896d818784934bd1456296b99cbe
SHA188f23b0913ef5f94cd888605504e1e54c3a6e48f
SHA256604679789c46a01aa320eb1390da98b92721b7144e57ef63853c3c8f6d7ea85d
SHA5121d3342118271b783c3937acbdb15cc16f1db91b3ce1cf5069078afd595d468d61efc6c6e082ab2a3122c046af6de5cdb70d822e60d526e782abcb7beaa10fb53
-
Filesize
26KB
MD54f100cba849d788770ac90cd66c97120
SHA1ebb9cbf021afc23121a8c682a4a5b80240bddc37
SHA256ae843e93ea4355adff60e584fc7186e05eaa40468b64510cc3dc501fc1db1fdd
SHA51269f3c5f1efd10053e8debd76143a88755d5a035882b69c3bca7ebc93aa040e3ef0aede3e7691089485850dd3212abcc02b23acdc396878a6d2658419cec8a0ee
-
Filesize
10B
MD5157dcc32271e1367e7e2dd14aa27e5a3
SHA14971ce85072488f8136ba098ba71b0e6b45e221a
SHA256763de86e71d2e922753efeaf737c37f65f77f3fdef2ae784faf43ffacf606ec8
SHA5121c6e4cbf451952cdc047759d933761ae156643f6b7372a95f1a8e3739aebad946e6b1916dbb77d786316456419357d9f358034a8750e2c96938d8c915ecd46ed