Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe
Resource
win10v2004-20240226-en
General
-
Target
54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe
-
Size
306KB
-
MD5
4aaabba576b636750de26ebdba21298c
-
SHA1
2b1a3c426e9c67d4bcefac90c13301d1e9086fab
-
SHA256
54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0
-
SHA512
5f44135df0a215df3c369309a126001773432f7933f2d20d610594b98f71cbc188e823d0b9152f30a6d07ee157fb5ced9d2cb0cbe9c33d0286a2c209b13f390a
-
SSDEEP
6144:d8VfgPYxJfXaybsYYT6A+TeuL+5/XohWY8v5:d+Y4JPaS2Td+Tez5/Xo65
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2036 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2520 Logo1_.exe 2648 54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe -
Loads dropped DLL 1 IoCs
pid Process 2036 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d9\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.WW\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\or\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe File created C:\Windows\Logo1_.exe 54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe 2520 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2036 2324 54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe 28 PID 2324 wrote to memory of 2036 2324 54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe 28 PID 2324 wrote to memory of 2036 2324 54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe 28 PID 2324 wrote to memory of 2036 2324 54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe 28 PID 2324 wrote to memory of 2520 2324 54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe 30 PID 2324 wrote to memory of 2520 2324 54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe 30 PID 2324 wrote to memory of 2520 2324 54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe 30 PID 2324 wrote to memory of 2520 2324 54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe 30 PID 2520 wrote to memory of 2588 2520 Logo1_.exe 31 PID 2520 wrote to memory of 2588 2520 Logo1_.exe 31 PID 2520 wrote to memory of 2588 2520 Logo1_.exe 31 PID 2520 wrote to memory of 2588 2520 Logo1_.exe 31 PID 2036 wrote to memory of 2648 2036 cmd.exe 33 PID 2036 wrote to memory of 2648 2036 cmd.exe 33 PID 2036 wrote to memory of 2648 2036 cmd.exe 33 PID 2036 wrote to memory of 2648 2036 cmd.exe 33 PID 2588 wrote to memory of 2692 2588 net.exe 34 PID 2588 wrote to memory of 2692 2588 net.exe 34 PID 2588 wrote to memory of 2692 2588 net.exe 34 PID 2588 wrote to memory of 2692 2588 net.exe 34 PID 2520 wrote to memory of 1152 2520 Logo1_.exe 20 PID 2520 wrote to memory of 1152 2520 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe"C:\Users\Admin\AppData\Local\Temp\54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1822.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe"C:\Users\Admin\AppData\Local\Temp\54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe"4⤵
- Executes dropped EXE
PID:2648
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2692
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD565b4a0bf5703bbb54c97a3adc1eda035
SHA12133af6d980782e84a0b2645619e981973bd9167
SHA2564c68edc3a62e2b1b4ef69e977d1749fff63af3b0dbf50d8d6637d9605853bb12
SHA512730daacda7efa72b1394d1eabed5d2a7104f1e5ecd5e0a96bc32a21754c298b0727270e85434dd3f8291e4e5eb55cea3fa820177b873bb02bdf4dfcf30ff779b
-
Filesize
471KB
MD51a0dbecba0dbb963c2f3b0448796d47a
SHA15c0b5d378d3614fe984ce2915b5720886992da0c
SHA2561ea2fb84177a921bc3df4763c3da53a970e192f93f6175d09696ded019e50cf8
SHA5128e25dc08fa6f280a6bc1ccacb1ce665ab055b5d539f8915915fc7536c90185a221cb0c50a02d34b521b871b8487a155b9c40a5f25df87306e1df24ca7e96da25
-
Filesize
722B
MD5d7897ba28f641a8af6b15aa3016e7ded
SHA1f844580bf72a523c811adaf95519e78d8a532a06
SHA256c631112a1fd29abe727796d65c7f7ec2cff301a51d21dfb1559e8f65068092ad
SHA512c39d89e3159196af147b04ca460faf322ca8e2e29e0c0162030c5e8146b09ff48cc25d8b3e02ea3c72a474a265e88c7632dfaa3e64995b13087708aee573dd0a
-
C:\Users\Admin\AppData\Local\Temp\54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe
Filesize260KB
MD52b69c511c5d2483d27450d6f8c79a2e7
SHA13bc30e097451bdf7457213700c4a36160a36d752
SHA256dc896e2339c5b1ed6c96cf02b2e9481f64c56cca83d94e4c3f9a7ffa6963e09a
SHA51282f0c3cd22c2f3d474462527ce7b87a41286b38b526aa518452bbf29f0818ada55e3644423f42b664149c0b4ae6a8cd00c7b51f6d7b93808e2eb0350b89ea8be
-
C:\Users\Admin\AppData\Local\Temp\54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe.exe
Filesize141KB
MD50251363b53d6fb37f48ed85ce30aada1
SHA1bfbe90ce11485db97ed43157cbc580ef35432ce8
SHA2562a26955b55097a4b041a1ee8fa12130e43b171a23b4ac76a2d8d649a6f766f1e
SHA512ed4816cce1f6cd6a49f25daecb2c645dd1cb5ad1f7b96f0ee7de9553f88ead015feb715252f5559f5b8e5c94fcbed74988db33f526ab8db947effec56103f73b
-
Filesize
26KB
MD5ef3256717d6b0edc9776e10d8a519313
SHA1c7629324ead6c72e3aaec3c4715ecafb752e305c
SHA25671fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5
SHA512eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77
-
Filesize
9B
MD599e7b853191358d26886fb0fbf829151
SHA1e48d4d584139ac8cef25e13fec7558deb3394143
SHA256e361153f54284dcb6dd9194e2517751c54440206148beb878dfd37e380405f4d
SHA512d9de2712f2d0af5774acd4f44b4081f9b0d6e7bcd43518431ec8e53932a9e10bcd3ee93fa8565a79619e0b10b3c7178fdfc5ff11675198a6f035a15f6aa03280
-
\Users\Admin\AppData\Local\Temp\54e69d7f53d339d57884a05a425f7f972946efea3989b80027012a908c30c7b0.exe
Filesize280KB
MD51b294698fdea69a9957efcd241211cba
SHA1723cbfdb4497def21730ee3cb64c5522d03b555b
SHA256a6231c541aa480ff1a9db9cd40b1366c1a8d53abcaed0ab42bf834e59fe490c8
SHA5129fde02405009a7be99094f66114f4b23fc94dc6023170d6ccd1518cc5e0703c8b7537dda45ecc42afa36b06b8cf368d997ba0964e2b147e9a6695f410647971c