Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe
Resource
win10v2004-20240226-en
General
-
Target
8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe
-
Size
1.0MB
-
MD5
18d80f4a86a010d8c71a20fc92be62b3
-
SHA1
9e288f8d3db9b7b63b114ca0e00c8fdb52dc23b7
-
SHA256
8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c
-
SHA512
01948c35fc280b2adce4cc1690125bc9911e44819ca1fc7e5ee567152f4cf47232148ffb318d97666b1e6b7362402f31aaa4a48ede0e7bc08affdfe93aeae6aa
-
SSDEEP
12288:+7+ByGzzIKB2GjRTKdal60yMoFKimTBEAGlyV/vtvOhw5WxZevp:+7tGYWzkAd8fBlYKwnvp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1296 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2128 Logo1_.exe 2544 8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe -
Loads dropped DLL 2 IoCs
pid Process 1296 cmd.exe 1296 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Publisher.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe File created C:\Windows\Logo1_.exe 8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2128 Logo1_.exe 2128 Logo1_.exe 2128 Logo1_.exe 2128 Logo1_.exe 2128 Logo1_.exe 2128 Logo1_.exe 2128 Logo1_.exe 2128 Logo1_.exe 2128 Logo1_.exe 2128 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1296 2168 8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe 28 PID 2168 wrote to memory of 1296 2168 8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe 28 PID 2168 wrote to memory of 1296 2168 8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe 28 PID 2168 wrote to memory of 1296 2168 8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe 28 PID 2168 wrote to memory of 2128 2168 8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe 29 PID 2168 wrote to memory of 2128 2168 8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe 29 PID 2168 wrote to memory of 2128 2168 8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe 29 PID 2168 wrote to memory of 2128 2168 8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe 29 PID 2128 wrote to memory of 1896 2128 Logo1_.exe 31 PID 2128 wrote to memory of 1896 2128 Logo1_.exe 31 PID 2128 wrote to memory of 1896 2128 Logo1_.exe 31 PID 2128 wrote to memory of 1896 2128 Logo1_.exe 31 PID 1296 wrote to memory of 2544 1296 cmd.exe 34 PID 1296 wrote to memory of 2544 1296 cmd.exe 34 PID 1296 wrote to memory of 2544 1296 cmd.exe 34 PID 1296 wrote to memory of 2544 1296 cmd.exe 34 PID 1896 wrote to memory of 1772 1896 net.exe 33 PID 1896 wrote to memory of 1772 1896 net.exe 33 PID 1896 wrote to memory of 1772 1896 net.exe 33 PID 1896 wrote to memory of 1772 1896 net.exe 33 PID 2128 wrote to memory of 1192 2128 Logo1_.exe 21 PID 2128 wrote to memory of 1192 2128 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe"C:\Users\Admin\AppData\Local\Temp\8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1DCD.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe"C:\Users\Admin\AppData\Local\Temp\8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe"4⤵
- Executes dropped EXE
PID:2544
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1772
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5533ce215a7c274602dc456ca375cef93
SHA176c502d7c45eca3fd96f6b04eb850e751bc785dd
SHA256d70c9f73bbeed5cbc0df4a4d14bae68789f84d8092281337d2919322b288ce9c
SHA51209d9dee36c48567921de4b7c31c4a822d5f9ed5e0b1cb0330031b320f40b5ba9b15e89dc37d52561094642c0ff16c14d32e81ed5b1dac06150fefbbd6f3365bf
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD53b2f9d1d54771aff256d1ac3c98ab4f9
SHA12420d8946a73e65cdd29e6918a36dcc736f09e66
SHA2564a4b146f7716e36063f90bba77bd6b55b8e6e21166cbcbf95cad0f814307d643
SHA512d2b35fe92675638b9449dbadccd63165d0a44346ec8b50a61ea1fdc191f14a0e7a549740bf775d8511784c0426d1a88af1acbafc94a734952e8dc2cec7aede1c
-
C:\Users\Admin\AppData\Local\Temp\8c4b92b8336c96c213c4c87a92c0f3d3d8bb8874dcd8aac06152f8a784d2625c.exe.exe
Filesize1.0MB
MD52a0b9e1cc0c5e6aaa97c5d46a26ed318
SHA119c7d344e5bac170ce2f49068dc1c1c9fe71a6fa
SHA256b315bdcac92763162f4ef0807dc9ce87b2efd3e0b36b7d2645611f23e28aa69d
SHA512802cb1386c6e060595c288073c896c89319969bdffefcb2212ba021cdb031a9ae8b436148938d4858cfe46f66cba6218b459eb93e81187cb73d1810160f08e0f
-
Filesize
26KB
MD5e62adb904ebd7862a69e2a283a4b77b3
SHA1c61a8a5f4845f6a423278303f9c07ffe7bbb4237
SHA25604bf31e57ff334026e97af9022954d7fd2cbfc813c15fe9988e1b5776a695108
SHA51213831dc87dd569a91e7f2954ce04fa1c25bf1c019ca2ed4d178210c6af089b8316ace8cf0647dc5e58464ff3a30d890467d19c30f79585922734b948eb7824a1
-
Filesize
9B
MD59d515d16952bdb1cf51672ad091046bc
SHA15fe954c6d41499122182eb48cf6f9d203b9eae7c
SHA25612ddf5d72be26a3f4fb46d905661e24bf30948454c9701f20e50436a238a25db
SHA512d0f7522406355a837e55f5a99b6969ed4b0ccbc2e427b83a917eedffc37899b139c2b33ea73a90469a6045b3b71848bf97641528644a4a3f55d666223fa31d4b