Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe
Resource
win7-20240221-en
General
-
Target
694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe
-
Size
178KB
-
MD5
e9cdf2209cc3d95e7a141b0b80844cf7
-
SHA1
88871f53f6391ddee0fe2b8996ed25849105e3d3
-
SHA256
694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e
-
SHA512
62fa554c6b4862be18346ce77f91f9b838baf3cb57043ec81b80f7b152e8eba9113927e76ca2375ac7b15a83cc8a216c0d90889d1e80b878ae78b8878b3565a7
-
SSDEEP
3072:47e+aX3tM6gT9ov1Gny0is1iygSw01IZ1ymklBF5TjZqMNl:3+aX3u6gT9ocR3gSZ1IZ1yjrvl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2640 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2604 Logo1_.exe 2592 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe -
Loads dropped DLL 1 IoCs
pid Process 2640 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FRAR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PrivateAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe File created C:\Windows\Logo1_.exe 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1956 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 28 PID 1712 wrote to memory of 1956 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 28 PID 1712 wrote to memory of 1956 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 28 PID 1712 wrote to memory of 1956 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 28 PID 1956 wrote to memory of 2124 1956 net.exe 30 PID 1956 wrote to memory of 2124 1956 net.exe 30 PID 1956 wrote to memory of 2124 1956 net.exe 30 PID 1956 wrote to memory of 2124 1956 net.exe 30 PID 1712 wrote to memory of 2640 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 31 PID 1712 wrote to memory of 2640 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 31 PID 1712 wrote to memory of 2640 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 31 PID 1712 wrote to memory of 2640 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 31 PID 1712 wrote to memory of 2604 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 33 PID 1712 wrote to memory of 2604 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 33 PID 1712 wrote to memory of 2604 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 33 PID 1712 wrote to memory of 2604 1712 694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe 33 PID 2604 wrote to memory of 2412 2604 Logo1_.exe 34 PID 2604 wrote to memory of 2412 2604 Logo1_.exe 34 PID 2604 wrote to memory of 2412 2604 Logo1_.exe 34 PID 2604 wrote to memory of 2412 2604 Logo1_.exe 34 PID 2412 wrote to memory of 2064 2412 net.exe 36 PID 2412 wrote to memory of 2064 2412 net.exe 36 PID 2412 wrote to memory of 2064 2412 net.exe 36 PID 2412 wrote to memory of 2064 2412 net.exe 36 PID 2640 wrote to memory of 2592 2640 cmd.exe 37 PID 2640 wrote to memory of 2592 2640 cmd.exe 37 PID 2640 wrote to memory of 2592 2640 cmd.exe 37 PID 2640 wrote to memory of 2592 2640 cmd.exe 37 PID 2604 wrote to memory of 2544 2604 Logo1_.exe 38 PID 2604 wrote to memory of 2544 2604 Logo1_.exe 38 PID 2604 wrote to memory of 2544 2604 Logo1_.exe 38 PID 2604 wrote to memory of 2544 2604 Logo1_.exe 38 PID 2544 wrote to memory of 2460 2544 net.exe 40 PID 2544 wrote to memory of 2460 2544 net.exe 40 PID 2544 wrote to memory of 2460 2544 net.exe 40 PID 2544 wrote to memory of 2460 2544 net.exe 40 PID 2604 wrote to memory of 1384 2604 Logo1_.exe 21 PID 2604 wrote to memory of 1384 2604 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe"C:\Users\Admin\AppData\Local\Temp\694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a52F0.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe"C:\Users\Admin\AppData\Local\Temp\694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe"4⤵
- Executes dropped EXE
PID:2592
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2064
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2460
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD56329333b400828394f1806aa1670367f
SHA159e41436c41f1dd6cd8242df2cbeaf04e7b864a6
SHA256fa69d50d5373451478641062a25ee6d509247d2ee18f2505c54048695f2363b9
SHA5126fc5cd02230ee989d00c67356080affb387a36600d96ef6666c15a90d914964c8780a198d63831a570a04d850fbe87b7567866940cf4affb3cf1458053fb870d
-
Filesize
477KB
MD549d515b044bbad65c9307b89dd66e79a
SHA1d0edd7c63488d72b6ba185eee80e63df89df6966
SHA256c696990b3d0f156f8e572201d9ac44dd5a79c95235c9b84c2a8ffcd098789ebe
SHA512aedd7b238961a154477d8704082691ab64a75f4c3bbb584ce55b62845b46b94dd2e39a1eb8939398f662db6cc504da9af788c054a4d054e683d02fcbad0d5d84
-
Filesize
722B
MD570da681a4e527bf5d4a2704ec7b5a55c
SHA1c8a6a7a4bf1cc8b4e33b8e5fd55b6a3d67984971
SHA256a990e666c34cf659c24aca80a70e549174ee2c0460fb4502a903321ba42c76fa
SHA512632cc9689e597aeb71d95890d2f6efe971537bc55823f2fbad14d80bb308b1be0a18bd4541f5ab06d065fe1fecf5b8511079f56f7f8fa1bea419ee533d5a7282
-
C:\Users\Admin\AppData\Local\Temp\694739d5ed9cce5e8483fa5fef800cf180a829d5e5c497d439bcd119cd63676e.exe.exe
Filesize145KB
MD5f0003bbe2ddbc6a86bcd8bb3e59a459e
SHA172a13c7a33c9262cc60037aeaf120f54a21cdeb6
SHA2566b3875c773db867834fe34c0efe43263908cfd264b77336f4c99977927650914
SHA5127603900304bfd5f31e6165554a30d2dcbaa62d2d60debf55e9e7fb4c8c3d9f86a78725beb435ff9c85bd57562d538d527645cbe5dfbcb73efa9b2c5e600ab7a7
-
Filesize
33KB
MD58d5b24a731c86a9a1d648e167662785c
SHA188ad95a57fa097fde78785d2166b2e601704455f
SHA2567bbf74b55580006eac528539f928998942ff4038dcca81adc29c3ea2b47f0d98
SHA512d603a5e3a80c2a66d79316561673f0f704ac15a7afb7df24356af7e75f06a94e295ffff449da7ac3fd1ce642fcc2a289e2eecefc0895065c7e6d31016dd03755
-
Filesize
9B
MD5a7058e06d084fd947f7dddc2897ebb22
SHA1400bcc9cc3cbab99b910b4696cc0163ba8713226
SHA256da0976fbb0588170763cb9b0d9b3ce23b0ff3e7cc146ecf1840a40e7655f1287
SHA5124921df984df8d792e9cde40d30fd19e315b2af1b034966c6fc397ef92e3cb25cfa258400758277e9ec01b5609f3041ba42c8e5911b79eff5a08843a91ad9c9c9