Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe
Resource
win10v2004-20240220-en
General
-
Target
adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe
-
Size
3.3MB
-
MD5
7a077ab20849b6cc5c9182f89f579d2f
-
SHA1
bdfbd17751abf641a8c2a349c8387fd829d8e7ce
-
SHA256
adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331
-
SHA512
f6a0bdd22098ea3a5f78704736cdfb132e177da0e3bc68b4030a630cc8782d92e091088cde186c39751811e270d514a4f0404b2660b776e6415c7851e8c07a62
-
SSDEEP
98304:ZnQwzmQe7A3gATZ0HTEUj2bTmLQHZ7Jg6ZVeFVvnAfZBd:ZQ4uIULL6VyVvnAf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1708 Logo1_.exe 2096 adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\SmartSelect\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Configuration\Registration\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\logger\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Videos\Help\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7z.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedgewebview2.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\css\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Speech\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\WinMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\id-ID\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-gb\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe File created C:\Windows\Logo1_.exe adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe 1708 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4232 wrote to memory of 3892 4232 adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe 83 PID 4232 wrote to memory of 3892 4232 adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe 83 PID 4232 wrote to memory of 3892 4232 adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe 83 PID 4232 wrote to memory of 1708 4232 adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe 86 PID 4232 wrote to memory of 1708 4232 adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe 86 PID 4232 wrote to memory of 1708 4232 adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe 86 PID 1708 wrote to memory of 3032 1708 Logo1_.exe 85 PID 1708 wrote to memory of 3032 1708 Logo1_.exe 85 PID 1708 wrote to memory of 3032 1708 Logo1_.exe 85 PID 3032 wrote to memory of 1488 3032 net.exe 88 PID 3032 wrote to memory of 1488 3032 net.exe 88 PID 3032 wrote to memory of 1488 3032 net.exe 88 PID 3892 wrote to memory of 2096 3892 cmd.exe 90 PID 3892 wrote to memory of 2096 3892 cmd.exe 90 PID 3892 wrote to memory of 2096 3892 cmd.exe 90 PID 1708 wrote to memory of 3436 1708 Logo1_.exe 44 PID 1708 wrote to memory of 3436 1708 Logo1_.exe 44
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe"C:\Users\Admin\AppData\Local\Temp\adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a5A36.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe"C:\Users\Admin\AppData\Local\Temp\adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe"4⤵
- Executes dropped EXE
PID:2096
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"2⤵PID:1488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD57ef2913fc272a57a19fcf8462455aa97
SHA1f39caed4f4bad2eaa6c7830771c42227bc1831f4
SHA256e8629b61eb536fd383d308f941b792af2be1744c87bcadb83e5bce5b35e1394a
SHA5126af4857c1b41f65fb826f81beca5df0f68b314c865813ece879dd32f353a7adbe4d2f9ca0c3af2e447338e74fd45e3669ded0c21f1c99f3d9641b389d03d1c02
-
Filesize
570KB
MD5c6105dcd0bea25a20bc055f582b9ffd1
SHA18c0f8584be913f06a39443a60f32edd80eaf740b
SHA256021a02646fa073494f1df66ebb42cd9b72549ca53396e13797a6dddb65cc2b1a
SHA512dacbcacb68bd5bfe795561493f1a9921fded748e1a29887b3551c520719af2d3c6d5a207d594b0a8a509f4c93c3994990020e71a8ef04cb199153320b138763e
-
Filesize
722B
MD59d0ef63f1a098bb82ff0389a0c4cca64
SHA1c78e0231f0270c7d5688e39e84e5c5ee339ef610
SHA256f8f95184825141c8c6397f50e930ea563ca124e7e2fcd208a5553491c413c77a
SHA512123b4143eade9ae0a6c4d8f84a69173434fdf635da45eebd30576c09aeea00ef50a7da626506c747a3333bb07eb405b7795ad1afb7f916c6fff6742da7996408
-
C:\Users\Admin\AppData\Local\Temp\adde0c7d43f4b198ac9a875a34df4e0a4e9b16f7fffdb5d0d72b2339c0a81331.exe.exe
Filesize3.3MB
MD5d212ca9a75494cf665901f63f4d9b422
SHA188be01da898259b61f3a5a92496b5967ef3b57e5
SHA2566401ce76a781fa0e430f55b49f4b35e34c8ab5c92f7e3d28655a13ba89a5a598
SHA512ff5d14f6a53d6569f1d56c5019bbf4ca67b90ae80ce34d7013732edd49062643e6b47c42f3118af4e79ecb133763a85fe66d522f7d9a4203d8da894dc21e683e
-
Filesize
26KB
MD50901dc82d2fca942701b9f12bc1fd530
SHA16913b4c6a6ce2c7e162e986fe74cb5c135af37ac
SHA2563bb60e8cfe0ffd2e771c2382401f634b2194d8883a42716bc46cf132ac163150
SHA5129b1913e0641f72b7d1e9f8066266a50f1c4ee5ec0ea7432ece057f6db8636d9eaa507d5137f796015d27511563a75093890bd4b5d54d3c1dac750eab658a6c41
-
Filesize
9B
MD5b347a774e254ac3f0d6aaea35544ac50
SHA17f332d15a7648f7a698b3068a428811361f4e9ab
SHA2561ebd1b85bb264260df3d9fb0a2062b29199c7b6137dcc98486874c1d257c73cd
SHA512ce8615c90c8794f0aefeb0c6ce5da126732695e6be36b5e625f3a073d55c6f8cd88ca465b07e2c0e87355b5baad887a3f0b26c4eb262484a83d35565e72ba138