Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20/12/2023, 09:37
Static task
static1
Behavioral task
behavioral1
Sample
775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe
Resource
win10v2004-20231215-en
General
-
Target
775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe
-
Size
104KB
-
MD5
8cc1d6c72cc4cfd9c50f350813b2cba3
-
SHA1
ce417c2563c93772f42fee53cca7e86fef518b54
-
SHA256
775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332
-
SHA512
0d6e39ce05ab1ef45599ecc1a1088dba0aad8605ab9f5b6727a70e9e265c02fe3c31a2e2da3671ef1aa51824f7edefb7ea2fd97465170cd405029208726695e3
-
SSDEEP
3072:QftffjmNruuKxHSbz07u4zjJY251dZmxq4hi9ezOhu9vPt:QVfjmNAHSb45dZWqdezOhI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3016 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1084 Logo1_.exe 2480 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe -
Loads dropped DLL 1 IoCs
pid Process 3016 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FRAR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe Logo1_.exe File created C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Portal\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe File created C:\Windows\Logo1_.exe 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe 1084 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3016 2420 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 28 PID 2420 wrote to memory of 3016 2420 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 28 PID 2420 wrote to memory of 3016 2420 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 28 PID 2420 wrote to memory of 3016 2420 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 28 PID 2420 wrote to memory of 1084 2420 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 29 PID 2420 wrote to memory of 1084 2420 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 29 PID 2420 wrote to memory of 1084 2420 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 29 PID 2420 wrote to memory of 1084 2420 775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe 29 PID 1084 wrote to memory of 2620 1084 Logo1_.exe 30 PID 1084 wrote to memory of 2620 1084 Logo1_.exe 30 PID 1084 wrote to memory of 2620 1084 Logo1_.exe 30 PID 1084 wrote to memory of 2620 1084 Logo1_.exe 30 PID 2620 wrote to memory of 2632 2620 net.exe 33 PID 2620 wrote to memory of 2632 2620 net.exe 33 PID 2620 wrote to memory of 2632 2620 net.exe 33 PID 2620 wrote to memory of 2632 2620 net.exe 33 PID 3016 wrote to memory of 2480 3016 cmd.exe 34 PID 3016 wrote to memory of 2480 3016 cmd.exe 34 PID 3016 wrote to memory of 2480 3016 cmd.exe 34 PID 3016 wrote to memory of 2480 3016 cmd.exe 34 PID 1084 wrote to memory of 1328 1084 Logo1_.exe 9 PID 1084 wrote to memory of 1328 1084 Logo1_.exe 9
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe"C:\Users\Admin\AppData\Local\Temp\775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a81C.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe"C:\Users\Admin\AppData\Local\Temp\775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe"4⤵
- Executes dropped EXE
PID:2480
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2632
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5e075d6f023b7cb10033019a8de098f1e
SHA1e9803456c485c4c47936d5c305b8ce82742cc986
SHA25694151a22a001563daa308189de19e39a15b37575c63931214e7e2491a2208138
SHA512038a9d76c7b2bac8a0240007772f6cbd3f95a6279608e76b5c1ccae0ff856a98ba16181c74d1e80d581960212324c5b27e87c251127bcebd9de54d5c4ada788d
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
721B
MD52f70b322ffe0cf4db7b8d5f76a6765ae
SHA134ff8531fd8cbb8cc4743c0b10e1482dfe21aea4
SHA256e07d47e5a2530c17760456be0fdcafcaf4b47c547149020b8fbf0d095787bd56
SHA512e94a6faba33a80ff73697e4ed911f4a3e820428c513ff6ab55c5bfaa45f2e64baca0284fccdca52dcde646a678db1c8a9b70a631fbe5f8ac58f4dbb377af6d5c
-
C:\Users\Admin\AppData\Local\Temp\775adbb8c268bf35cb63614d03a62db1019c6344dab87aaf2f118111c023f332.exe.exe
Filesize78KB
MD5b82829adc9cfa9931fd90db4c064fa42
SHA10a717fc3f7ef3bd6fad81a358fbfd629a07da565
SHA256b811979578ed2fda03e2537ad221d6861ff5e425c11d34a20a4b24bf508fcaf2
SHA512c09a8159b661975cc5e9be6de12e40592c208f7e0ac99481e2be86ae705c3f8c475a885461da4c01519b9cb17187c2cef0de8b9620c633ac7fd5a86d313c4023
-
Filesize
26KB
MD54583153f094bff89d91f62da9f4b0345
SHA16a195668b1548bf26c3860c0ead4d87d0c53e82f
SHA2562cfdad99035f50d6b9cf9a29d8b5e9e7611421a6f2c6d65f70124b18bb99372d
SHA512c308e29361a53bc172b3ad7e2a65bf6eef0146bec262e59110cae001047765ad666362deb5fe323cfea236ebe9a6c3355413db465b2118fd4f538e8468365c55
-
Filesize
10B
MD5157dcc32271e1367e7e2dd14aa27e5a3
SHA14971ce85072488f8136ba098ba71b0e6b45e221a
SHA256763de86e71d2e922753efeaf737c37f65f77f3fdef2ae784faf43ffacf606ec8
SHA5121c6e4cbf451952cdc047759d933761ae156643f6b7372a95f1a8e3739aebad946e6b1916dbb77d786316456419357d9f358034a8750e2c96938d8c915ecd46ed