Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
169s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 22:40 UTC
Static task
static1
Behavioral task
behavioral1
Sample
49f6629071e229186053aefe4bac4a61.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49f6629071e229186053aefe4bac4a61.exe
Resource
win10v2004-20231215-en
General
-
Target
49f6629071e229186053aefe4bac4a61.exe
-
Size
110KB
-
MD5
49f6629071e229186053aefe4bac4a61
-
SHA1
142be03ac427778c423da93dd05a785357b761d2
-
SHA256
8e84de521675caf2e21d6d3874d85f12b3062f444b6be36393ff5c0784ea6d41
-
SHA512
3fdf76ce1c235f4f2f2727ecb49292d76cba5a412a2e62ee849e6345da700a0f18d2ae5a9d8abce272e77d9e5bd2b038e2a13da8a601725c4f0d84dff16eb8ac
-
SSDEEP
3072:G3+BaOaaFoFims/PZYuuVIaAJyTZ+sKPv:9BaOBoKCeyT8
Malware Config
Signatures
-
Renames multiple (175) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 49f6629071e229186053aefe4bac4a61.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
pid Process 2624 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2916 Logo1_.exe 2604 49f6629071e229186053aefe4bac4a61.exe -
Loads dropped DLL 2 IoCs
pid Process 2624 cmd.exe 2624 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" 49f6629071e229186053aefe4bac4a61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe.Exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe Logo1_.exe File created C:\Program Files\7-Zip\7zFM.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe.Exe Logo1_.exe File created C:\Program Files\Java\jre7\bin\jabswitch.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe.Exe Logo1_.exe File created C:\Program Files\Java\jre7\bin\rmid.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe.Exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe.Exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe Logo1_.exe File created C:\Program Files\Java\jre7\bin\java.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe.Exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe.Exe Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe.Exe Logo1_.exe File created C:\Program Files\Java\jre7\bin\tnameserv.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe.Exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\RichDll.dll Logo1_.exe File created C:\Windows\uninstall\rundl132.exe 49f6629071e229186053aefe4bac4a61.exe File created C:\Windows\Logo1_.exe 49f6629071e229186053aefe4bac4a61.exe File opened for modification C:\Windows\uninstall\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2308 49f6629071e229186053aefe4bac4a61.exe 2308 49f6629071e229186053aefe4bac4a61.exe 2308 49f6629071e229186053aefe4bac4a61.exe 2308 49f6629071e229186053aefe4bac4a61.exe 2308 49f6629071e229186053aefe4bac4a61.exe 2308 49f6629071e229186053aefe4bac4a61.exe 2308 49f6629071e229186053aefe4bac4a61.exe 2308 49f6629071e229186053aefe4bac4a61.exe 2308 49f6629071e229186053aefe4bac4a61.exe 2308 49f6629071e229186053aefe4bac4a61.exe 2308 49f6629071e229186053aefe4bac4a61.exe 2308 49f6629071e229186053aefe4bac4a61.exe 2308 49f6629071e229186053aefe4bac4a61.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe 2916 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2744 2308 49f6629071e229186053aefe4bac4a61.exe 27 PID 2308 wrote to memory of 2744 2308 49f6629071e229186053aefe4bac4a61.exe 27 PID 2308 wrote to memory of 2744 2308 49f6629071e229186053aefe4bac4a61.exe 27 PID 2308 wrote to memory of 2744 2308 49f6629071e229186053aefe4bac4a61.exe 27 PID 2744 wrote to memory of 2892 2744 net.exe 29 PID 2744 wrote to memory of 2892 2744 net.exe 29 PID 2744 wrote to memory of 2892 2744 net.exe 29 PID 2744 wrote to memory of 2892 2744 net.exe 29 PID 2308 wrote to memory of 2624 2308 49f6629071e229186053aefe4bac4a61.exe 30 PID 2308 wrote to memory of 2624 2308 49f6629071e229186053aefe4bac4a61.exe 30 PID 2308 wrote to memory of 2624 2308 49f6629071e229186053aefe4bac4a61.exe 30 PID 2308 wrote to memory of 2624 2308 49f6629071e229186053aefe4bac4a61.exe 30 PID 2308 wrote to memory of 2916 2308 49f6629071e229186053aefe4bac4a61.exe 32 PID 2308 wrote to memory of 2916 2308 49f6629071e229186053aefe4bac4a61.exe 32 PID 2308 wrote to memory of 2916 2308 49f6629071e229186053aefe4bac4a61.exe 32 PID 2308 wrote to memory of 2916 2308 49f6629071e229186053aefe4bac4a61.exe 32 PID 2916 wrote to memory of 2632 2916 Logo1_.exe 33 PID 2916 wrote to memory of 2632 2916 Logo1_.exe 33 PID 2916 wrote to memory of 2632 2916 Logo1_.exe 33 PID 2916 wrote to memory of 2632 2916 Logo1_.exe 33 PID 2624 wrote to memory of 2604 2624 cmd.exe 35 PID 2624 wrote to memory of 2604 2624 cmd.exe 35 PID 2624 wrote to memory of 2604 2624 cmd.exe 35 PID 2624 wrote to memory of 2604 2624 cmd.exe 35 PID 2632 wrote to memory of 2664 2632 net.exe 36 PID 2632 wrote to memory of 2664 2632 net.exe 36 PID 2632 wrote to memory of 2664 2632 net.exe 36 PID 2632 wrote to memory of 2664 2632 net.exe 36 PID 2916 wrote to memory of 1460 2916 Logo1_.exe 37 PID 2916 wrote to memory of 1460 2916 Logo1_.exe 37 PID 2916 wrote to memory of 1460 2916 Logo1_.exe 37 PID 2916 wrote to memory of 1460 2916 Logo1_.exe 37 PID 1460 wrote to memory of 2280 1460 net.exe 39 PID 1460 wrote to memory of 2280 1460 net.exe 39 PID 1460 wrote to memory of 2280 1460 net.exe 39 PID 1460 wrote to memory of 2280 1460 net.exe 39 PID 2916 wrote to memory of 1208 2916 Logo1_.exe 9 PID 2916 wrote to memory of 1208 2916 Logo1_.exe 9
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\49f6629071e229186053aefe4bac4a61.exe"C:\Users\Admin\AppData\Local\Temp\49f6629071e229186053aefe4bac4a61.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aC590.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\49f6629071e229186053aefe4bac4a61.exe"C:\Users\Admin\AppData\Local\Temp\49f6629071e229186053aefe4bac4a61.exe"4⤵
- Executes dropped EXE
PID:2604
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2664
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2280
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
530B
MD567288c51ee58f1bb9a4250f592883dee
SHA1a3c46e55b093aeb5051b5373238f90a29db07e46
SHA2563f8bc2a41426075dc959257e91fbb3187bbf3c62ea6436213254973cf005780c
SHA5122fca2e3afb8dc089e979574c9cee42c833c395796769239629f63566a671ce4de3bcedb5e072a86ca1df8987e08351c01a5a3acb01da15525536770bbb709cc6
-
Filesize
58KB
MD52e8204b925e702dabc11b988a3f60896
SHA136bb3f97fcceeb1ae009cb8a31f112ee4e0685f5
SHA256e63ee3bd70268ceed0ec6635f11b7b4abd0dc1effe8d3ce21755eaafaf096a6a
SHA5128bd2bab90b539f9505dc6830749a484e17fef91fc7b330905c72cb97dc0ca54964f72e641148f5130e9058b66b167898a37a4721c1be5da00d14865734d0fd8d
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
52KB
MD53c5daa92b200992806dd0673d629e4bc
SHA1cf29a14d69b90558b3fd0ced977ead9453ed1165
SHA256ce3fca3f56fb0f478a466576d97d0d257d8c6a517b9be89f493c2a902beaf6a6
SHA51213ea73879715f12aee71607b9331030c65812acd37eff56894ae3a1b763e2f0feaef6a09b63b5523f3a8b3d85572dcea703deb1b08aa18da435ae854b49b37e3