Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe
Resource
win10v2004-20231222-en
General
-
Target
15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe
-
Size
530KB
-
MD5
17b18fad091a105b7adc27ad2545bbdc
-
SHA1
13f8144b240ca6df7847b86d610b07bc811bb40b
-
SHA256
15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364
-
SHA512
42881a8068d3d74acbd29ac36fe33ad2179ce1cd1ddc7fe76154e06d5b39c86dbbbb8f27ae0659220555a559aa8d2e367a60b01744b0d3e25e0b0a1bec69f74d
-
SSDEEP
12288:w7+oqb61gjjtmevCClxPZyH2WaGWcZywmITc5kOCexlBGu8dKOU5:w75q+1KhmOgH26WcZywmITc5kOCexlBD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1600 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3004 Logo1_.exe 2676 15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe -
Loads dropped DLL 2 IoCs
pid Process 1600 cmd.exe 1600 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\3082\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\PROOF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PrivateAssemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\XLSTART\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1600 2128 15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe 22 PID 2128 wrote to memory of 1600 2128 15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe 22 PID 2128 wrote to memory of 1600 2128 15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe 22 PID 2128 wrote to memory of 1600 2128 15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe 22 PID 2128 wrote to memory of 3004 2128 15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe 20 PID 2128 wrote to memory of 3004 2128 15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe 20 PID 2128 wrote to memory of 3004 2128 15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe 20 PID 2128 wrote to memory of 3004 2128 15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe 20 PID 3004 wrote to memory of 2680 3004 Logo1_.exe 19 PID 3004 wrote to memory of 2680 3004 Logo1_.exe 19 PID 3004 wrote to memory of 2680 3004 Logo1_.exe 19 PID 3004 wrote to memory of 2680 3004 Logo1_.exe 19 PID 1600 wrote to memory of 2676 1600 cmd.exe 17 PID 1600 wrote to memory of 2676 1600 cmd.exe 17 PID 1600 wrote to memory of 2676 1600 cmd.exe 17 PID 1600 wrote to memory of 2676 1600 cmd.exe 17 PID 2680 wrote to memory of 2816 2680 net.exe 16 PID 2680 wrote to memory of 2816 2680 net.exe 16 PID 2680 wrote to memory of 2816 2680 net.exe 16 PID 2680 wrote to memory of 2816 2680 net.exe 16 PID 3004 wrote to memory of 1200 3004 Logo1_.exe 7 PID 3004 wrote to memory of 1200 3004 Logo1_.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe"C:\Users\Admin\AppData\Local\Temp\15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1890.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1600
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"1⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe"C:\Users\Admin\AppData\Local\Temp\15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe"1⤵
- Executes dropped EXE
PID:2676
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"1⤵
- Suspicious use of WriteProcessMemory
PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5c65bcc4201f7f618a8ce6de5677fa65a
SHA12992b7d62355470ced5ed4bc5a640f2cf8978278
SHA256d460b00e491d72836b5f489a1c506f03077eda1ceaf7f0fb07bbe6c66c0e0962
SHA512d2b45731d044e91583ef3bde0e33f0c6131ba2145a9211aa866c61cde5d07de2522e3f8713adcc40d5e897789b62eb891f275c2c074c47ceb3934a8fbf2c74cc
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD51994157616467158fb6378b1b4e2a18c
SHA193ce0782b7e9beb7699edc1fae79447b6eb19846
SHA256907d9b4b3c845382146adbad21667c7baa3258fd4c487ceb53cafa3076c93b66
SHA5120175dfaad0ad40dfe71b2ae22203c871124c7d9e6d3b732be352c2c40c4cb7ae19d22142c447fdce116eda36a8c15613c89c8271aa915d2880d46875820bd89b
-
C:\Users\Admin\AppData\Local\Temp\15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe
Filesize504KB
MD5e150dd76323c7fe98a33cd5ad98ebdaf
SHA1163dfcef247fed3fefe8b7c1f1c33c994bc4142f
SHA25622c29f274636e634fd27f5679c90ad2c217861ea45d7eb21e09bd9a3d9a88628
SHA51214b45c45671e4ce910cf6a2dda7165835a9e9be6e7b00f4b0bf3d79982e9f81e1533b8810dccee008e54f834dbd2750acd29dffd3f18797cc2f699eeb46d1a8c
-
Filesize
26KB
MD5736bfccf89b0055bacacf13bc37b50ce
SHA1dabc333f28e954f49aa80a3b0531160ae5bdec82
SHA2566fa3aa279929eee03df371ace16a751b2184da323b9c72ab97bb36c947aa12c3
SHA512a7af014c4f8d3af22c2fe20fbd50a6c52d17d77adf0e59365e67c98fbdbd4890a96d2b010e42728bb33f92ab468e1ec50449fb97c10c3204ac13c49d9ef8d578
-
Filesize
9B
MD543bfb8ec11aeaf165dc2b4ae60ab3be3
SHA1cb410a309b1a56ae5fdda61d68b9d41e1e4d8128
SHA256edb9cece5d0056ab9be898bb317a3712b9d0db010a9455c6e265c6b5e85774a0
SHA5122f192df131177ea8f969aaa1883fafe9e463eca96c31ca48b506ed94d7d86e06dc88885df587c46efe61a366b97dd79aa56f8c6fb1bfd7759894132db3a8dfa5
-
\Users\Admin\AppData\Local\Temp\15cec831b12a0713a14a38c3d8a1a067adb86e538fb599296a09c8dc5bc8b364.exe
Filesize436KB
MD53e93cfdefdaed8045200759fe3c6bd01
SHA1d0bf9eb324af88871481bb499aa80a96bb4aa04e
SHA256252ff16057d5e3b5c8565b797bba20fadb3984d12128443ad0740a0b9ed6cb98
SHA5121e18eb98b5cf542315c749a9e3ebd481ab1a9cb1e80fa07dcd75ce849928736b38e8a33da49155d01b9a9e1c0f2f612049819820d5e36a7062bd8e38b2ab48b2