Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe
Resource
win10v2004-20240226-en
General
-
Target
12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe
-
Size
140KB
-
MD5
0a7a4f6fc64026bdf28b41d4d033a0cc
-
SHA1
1e8c8ab26094e3fa220a2706f3cdba4488149d5f
-
SHA256
12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980
-
SHA512
2af6f32505d705ab9bdd9f78c68c74a73589e9912515612c15b94c3447cab444c780871e5714a806670ddd1036f1ac55af555a925ab620bf45b6d7b80006d80c
-
SSDEEP
3072:SftffjmNusOfCOv//kxBsg87j914yBHlMKTaEUk:iVfjmNvOzvkxOg87gyBHldU
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3320 Logo1_.exe 3336 12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\uk-UA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\js\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-200_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\SoundRec.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\cmm\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Security\BrowserCore\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\vi-VN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\hu-hu\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe File created C:\Windows\Logo1_.exe 12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe 3320 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2576 wrote to memory of 3124 2576 12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe 90 PID 2576 wrote to memory of 3124 2576 12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe 90 PID 2576 wrote to memory of 3124 2576 12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe 90 PID 2576 wrote to memory of 3320 2576 12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe 91 PID 2576 wrote to memory of 3320 2576 12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe 91 PID 2576 wrote to memory of 3320 2576 12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe 91 PID 3320 wrote to memory of 1128 3320 Logo1_.exe 92 PID 3320 wrote to memory of 1128 3320 Logo1_.exe 92 PID 3320 wrote to memory of 1128 3320 Logo1_.exe 92 PID 1128 wrote to memory of 3604 1128 net.exe 95 PID 1128 wrote to memory of 3604 1128 net.exe 95 PID 1128 wrote to memory of 3604 1128 net.exe 95 PID 3124 wrote to memory of 3336 3124 cmd.exe 96 PID 3124 wrote to memory of 3336 3124 cmd.exe 96 PID 3320 wrote to memory of 3300 3320 Logo1_.exe 58 PID 3320 wrote to memory of 3300 3320 Logo1_.exe 58
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe"C:\Users\Admin\AppData\Local\Temp\12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6B9B.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe"C:\Users\Admin\AppData\Local\Temp\12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe"4⤵
- Executes dropped EXE
PID:3336
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3604
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5511a2d5905efad810a21feada48ceb39
SHA16a4cf6d0a4bb651ea17966e3accbea68d62b9c3e
SHA256e4286846db738761d9e779ad53e9ba92d875f9acc03f8086307e6f1f1173ebaf
SHA51256e2dda4271555861074bca1121e1b512c64aacc991bc089ef546f11e619359d5b338762d76bf67c8a069293a542ef1f59715f19efceac2ead1fe5eafacc8d3c
-
Filesize
570KB
MD5f3c335cf0cfac4740936df9f21f12af2
SHA151f516989f3992dc5c70474ed51765c743112df1
SHA256743e2459a48b6f28539de9d760f44a5d67c4ebed8263ac243598186363321a7b
SHA51278663ddd606657a46e01b14104ca416cc7b35b3d039544ec03c100fbc39f85dbb802f21ebc0e3042da1b4f472715e30d9be52251685dc5fb936874cb4c0c161c
-
Filesize
722B
MD572058aa4b43827440f67b0d565cc711e
SHA1e7475e6323b23b3e54f6b86f753c0f1c58ac893c
SHA2561e02bcd93caf886d4053860a79476a085b83567d3f966a3b9cdb57e0f0e9d86a
SHA512dffb49afb9aeab56e354288aa4960e7af155e316f1f02cba587bdf21fbcfe7086852a31ef0fcc4777b5bb09af3437e566930d58d004c2967be074eaa945e5042
-
C:\Users\Admin\AppData\Local\Temp\12127e1a505452f2476e535000783f803722e9bfb9efae49b906df8669af1980.exe.exe
Filesize114KB
MD56c80c1bf7daa513dd0620bd7b4df1d46
SHA1dfa6ed503b0e3f5b803f525eb6d8073847c437c9
SHA256b489419bb8438de7196b180da1923b98c912ab7db96e0ad63c2b3b5ee2b2808f
SHA512fa238af9c2bce8f5bed9939264daff575002d9698c3206457fa716713c35a3660dbf06a851a1e43d9d5600ceae20816acf2b188d5f40ae478aa0e2d23cc5e733
-
Filesize
26KB
MD5247aafc1af131a360429f437cdedad82
SHA102ab749c7aa28ae7beb232991754aecbc3e596ba
SHA256318e25db58c0812b719310265b3dc04aa4e1fa756cef4e26b57162ab54fc0ad1
SHA5122486fe7c037e6d57936521ea35098df0955a16438979d1335d48f7c912d0ee21b37225c14fb6a2ad62c268b84132883650684664c4370e7188105cd070bddf78
-
Filesize
9B
MD520579de1c6702ea14f25df921a00274b
SHA1fc7299007b5fb0580c7a3ef6ae0efd8aaf80a35f
SHA2563eb24c26a19e67d7f499ccb30f78fc29bee126bafd13f41470223c1b8f2e1e4e
SHA512e9a21ede4321b86e5d215d41321741f8db22b9eb92c1325026182c688311d5134041102a194d670abcbd182d2c91d5180ac9b7c9daaf9e41109a3b3d8e3c3d81