Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
427f9615cf393b372949ae9b027a3e01.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
427f9615cf393b372949ae9b027a3e01.exe
Resource
win10v2004-20231215-en
General
-
Target
427f9615cf393b372949ae9b027a3e01.exe
-
Size
330KB
-
MD5
427f9615cf393b372949ae9b027a3e01
-
SHA1
048293ce62da9d65a6df04ca57bdf0e0b90de2f6
-
SHA256
8fd593fd43f03a3e1b2490663e0a642707b363666a653cd10fb14a3d1f2b67a7
-
SHA512
804a90f01c9e4133684db3512202cbe7323bffe6686a7b2d5b0934d6a42ae15b12bf70bc7e4b3a8eed611e31a7da7c7c7e79573467d033db1943f916bf6fa61c
-
SSDEEP
3072:CftffhJCu/IQqifsI2+wrIk95SICKPsyEjvTtQXkVqKgvqgyAN9tQRiBE+y/Z:SVfhgu/1x2F0iSIGN7pmvX9/Q9Z
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4044 Logo1_.exe 2492 427f9615cf393b372949ae9b027a3e01.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\dotnet\host\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\pt-BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe Logo1_.exe File created C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\host\fxr\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\zh-Hans\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\management\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.0\createdump.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\cmm\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\limited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 427f9615cf393b372949ae9b027a3e01.exe File created C:\Windows\Logo1_.exe 427f9615cf393b372949ae9b027a3e01.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe 4044 Logo1_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2528 2684 427f9615cf393b372949ae9b027a3e01.exe 90 PID 2684 wrote to memory of 2528 2684 427f9615cf393b372949ae9b027a3e01.exe 90 PID 2684 wrote to memory of 2528 2684 427f9615cf393b372949ae9b027a3e01.exe 90 PID 2684 wrote to memory of 4044 2684 427f9615cf393b372949ae9b027a3e01.exe 91 PID 2684 wrote to memory of 4044 2684 427f9615cf393b372949ae9b027a3e01.exe 91 PID 2684 wrote to memory of 4044 2684 427f9615cf393b372949ae9b027a3e01.exe 91 PID 4044 wrote to memory of 1044 4044 Logo1_.exe 94 PID 4044 wrote to memory of 1044 4044 Logo1_.exe 94 PID 4044 wrote to memory of 1044 4044 Logo1_.exe 94 PID 1044 wrote to memory of 1140 1044 net.exe 95 PID 1044 wrote to memory of 1140 1044 net.exe 95 PID 1044 wrote to memory of 1140 1044 net.exe 95 PID 4044 wrote to memory of 3364 4044 Logo1_.exe 51 PID 4044 wrote to memory of 3364 4044 Logo1_.exe 51
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\427f9615cf393b372949ae9b027a3e01.exe"C:\Users\Admin\AppData\Local\Temp\427f9615cf393b372949ae9b027a3e01.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA6DF.bat3⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\427f9615cf393b372949ae9b027a3e01.exe"C:\Users\Admin\AppData\Local\Temp\427f9615cf393b372949ae9b027a3e01.exe"4⤵
- Executes dropped EXE
PID:2492
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1140
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD5db7ae8173a9712df1e3073af2f93fc54
SHA1b298ee5348d534a20f34f674b5fa1315dd0ad51c
SHA2562886245aacd885490d5b168a46ee7adf132f8a7962e2e5ad4e29491263352df9
SHA512c8c091ad4103bd0f0b728443690ed8fb1128d87d8902a9c6b0f8dcb009e5def36c543d539e665fb2957df15b864a9d5d4be0603e1cf2a818188d74799d956768
-
Filesize
530B
MD5a09bf456aab9cad745d518499de7d04b
SHA1d912f4f7541dc7771fe46451fd8eeeb20f216016
SHA2562c6ed8200a60b086d4df826f39003cedd1d09647ae7897530cde4c6115e3674e
SHA512c976ef0b9666507c98ff62631dc02d97e254f62b9074c09c94ff2669a270ce546caa3a94ce82e08b4f30a32198ad03ce77d039f6a54b77493aca8d0c954c9109
-
Filesize
304KB
MD532856c61ab3c0711dbf54890dcd0755a
SHA1d242f8115fec145dfdff0a0729f34991027bd7a3
SHA256de6e79f384444aebb61c5d38044ea430c2911162d1a3770267a63ac2cd9c03ab
SHA51200fd2b0e4965b7a85ca772a34fae8fdeca14dfc5bc347412ebe6d15017ebc07f22cd78d9f6f9f61c49ba26ba62a21bae6721488872be97a6ffd64616320f83a8
-
Filesize
26KB
MD54deec1ee4c508e658e9ac56bd4e367d8
SHA18449fb96da6490e6abe8e6aa9cd38051f2c39625
SHA256e4af0831fd974f9cbdbeca824ddeaf6d14472d0078aeb60fc3ed31c6189a763b
SHA5127fab6020e1151beec9f8bc77c520c1ae60ec76815a24fbd5551b78a696611e5f9639f34671e84885fee17a227263b4904c47deedd0734c6c5b38fddfcd908b40
-
Filesize
10B
MD5dac5fda49398490d5c087360437ceda2
SHA193f612913565101624fc7a13c7e7d932bbc1a922
SHA256803ca38dd859bfb259b80410b8adea5e7b38a655bc999501843102affc8ce9c5
SHA51239315941c3f5f4fddfdaccd31758281415474d9f51b756f256473b1d343740fd98e7e339ede6db57765566d68da1009c8eddc4d67e59a47ed8f746ee94dea581