Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe
Resource
win10v2004-20240221-en
General
-
Target
a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe
-
Size
2.2MB
-
MD5
e7f27916866dc3c5c20b9d6b017b5eaa
-
SHA1
7fd790606ae7f519f45022e63ec647784f052c15
-
SHA256
a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4
-
SHA512
dbbbe3731e93bd86881fa11aff6e6daf8a85a9f308b7ac26ed40ce6a22fe7ac0dfce2d898d55639f9a291913cf65f2d832115ce1c27adfe450124bc7da8e7983
-
SSDEEP
49152:ODOh6fnFr1YGJ6HD/6RYfCzKzi1bgeCiD13EtMJNXV:yOfjSRYf1iB3P/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4336 Logo1_.exe 116 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Retail\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\is-IS\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VideoFrameExtractor\Views\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Mutable\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\ko\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\cmm\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-100_8wekyb3d8bbwe\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\requests\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\AppCore\Location\Shifter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\wab.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\Fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Lighting\Light\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\en-US\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe File created C:\Windows\Logo1_.exe a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe 4336 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1396 1500 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 87 PID 1500 wrote to memory of 1396 1500 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 87 PID 1500 wrote to memory of 1396 1500 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 87 PID 1500 wrote to memory of 4336 1500 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 88 PID 1500 wrote to memory of 4336 1500 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 88 PID 1500 wrote to memory of 4336 1500 a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe 88 PID 4336 wrote to memory of 4144 4336 Logo1_.exe 89 PID 4336 wrote to memory of 4144 4336 Logo1_.exe 89 PID 4336 wrote to memory of 4144 4336 Logo1_.exe 89 PID 4144 wrote to memory of 3372 4144 net.exe 92 PID 4144 wrote to memory of 3372 4144 net.exe 92 PID 4144 wrote to memory of 3372 4144 net.exe 92 PID 1396 wrote to memory of 116 1396 cmd.exe 93 PID 1396 wrote to memory of 116 1396 cmd.exe 93 PID 4336 wrote to memory of 3416 4336 Logo1_.exe 37 PID 4336 wrote to memory of 3416 4336 Logo1_.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe"C:\Users\Admin\AppData\Local\Temp\a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a34DB.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe"C:\Users\Admin\AppData\Local\Temp\a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe"4⤵
- Executes dropped EXE
PID:116
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3372
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5cdae1f54012ef122e2fa90c68b018ad7
SHA1b3c20e121d5e6edb3e2aecc47d09d6c31a23c011
SHA25615de13a231ffb9945fa3e860a3112923dffdef0b224de9f54bd18d272a0a71a5
SHA5120d48e83cb31c9bc299ee0e8338aefe1aa4a040dc431136b74cd3608ff5aca1b2f58b83e50c6f8c6a5684e9da5e31a4e846854aa3a4c95446f46bd349a67a9192
-
Filesize
571KB
MD5f1fa25aad44f6d23d15bf0fe9942240c
SHA158a38f3cbfe3d90d952812e2c2fead293ee45556
SHA256dd3ba3954c9b745dbc07724879681d25a7a92c60ea5a2609dae19a2537a25522
SHA512ef2ef20408d959eab8f28b1495a4ad54e078cc46ea64b6de1107bd5efd7278bc6aefa22938b032f4a32c7d99c9158c4aaadf6d2e610c1c29ec4d009ae2096543
-
Filesize
482KB
MD5ef2faa6fbcf12b63da1cf3e9283ad1cf
SHA12032ddc0f6ed9560583f70a279ca858b1e746409
SHA2562c7657fe57ec426599ef848815689264720ffed5a0f9a5d33d07cafabeb43bf3
SHA51246b169f4142d45197207d0015119145c12eb01150c6b742c5f3792b01d2e23bda9e25e181144f4b9963eefcff7ccb9d37fad4d27b044753325ceeaea330fa00b
-
Filesize
722B
MD51ffd19769440034e43b6309ab54e2a9d
SHA180dbce9deb2872ca3757f89667dc05bd5487a2da
SHA256cd8d02e72394e5b9a724b58183361600a2055dc4a764359b144e6343eb644f98
SHA51255f658e3b74db980d7c4863051252df55b07972df33217705c53eb3c29d472c70eb7fb0d2e9eb349f7c8c6291a021a33eaaa5936959fa924ecdc6aa242be4fcc
-
C:\Users\Admin\AppData\Local\Temp\a5c0e52f7a32f16a56b1e3409b96c2ef51899168bb086536c6d64774c65d63a4.exe.exe
Filesize2.1MB
MD575e4e1db589ba3e9144e1a79d6dbb344
SHA197e7cdbbb049ebf7aedab67303d994715edf5b52
SHA256abf73d033eed3f166df49c9a32255d2ad261a40df432b2338e39c417e0050f14
SHA512c569357ef2943d2d107c261e89c46ed01a0e0e65141c153f60d177e981eb4e3c3533007e169b7826d14f0c961dfe0cf3923398a4d26a3dbb2e714eb51d10c7dc
-
Filesize
27KB
MD5f691a97a588c19faf9f6dda6390c094e
SHA15d5e3c33dde450fb7b1168b8eb4705c76bbae34f
SHA25606e90c757f7dbbae2d605e715181af918a8bb56afa1caaa0a83a41fae0ffa9f9
SHA512f89651464d3e685fd5f8b9b07d3b6feab8979c28ec84e480580b868cfab184401be1367060150525fa9d9260e88cac93a0e36f0b4046040b81d765ba93c1b460
-
Filesize
9B
MD5d69146fa3f15be895e219a620fdd153b
SHA1fa21485227046ccf2d7638b4236f749862dd4b64
SHA256406651396485eef0c407fc8241aeaa805a311294cdf7abb18ca20e8540694652
SHA512b0509216c0bd6ad432374c98f3fc2f2919d9353e4bccf510b20e0cbbf8a0fdf77ccdeff786df0305f83f22865794cc675537e51de5a1478fc8431999566701c0