Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe
Resource
win10v2004-20240412-en
General
-
Target
708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe
-
Size
70KB
-
MD5
0b49c461de25d2f8ade77f79a848b408
-
SHA1
a0b525fe402124f3ea5ba4a49da925431a6877c1
-
SHA256
708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef
-
SHA512
c2eaf9f8ee01fbdb5f288e1470b65984a7fbf8f811a4ab02cd2de53dd9ed2484e3b75c9479b2724d5adf3826a2104268d6c0ac4c4ad7019dfd1e24d85cc38844
-
SSDEEP
1536:pE3SHuJV9NdEToa9D4ZQKbgZi1dst7x9PxQ:pEkuJVLtlZQKbgZi1St7xQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2576 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2076 Logo1_.exe 2396 708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe -
Loads dropped DLL 1 IoCs
pid Process 2576 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe Logo1_.exe File created C:\Program Files (x86)\Windows Mail\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe Logo1_.exe File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.en\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe File created C:\Windows\Logo1_.exe 708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2076 Logo1_.exe 2076 Logo1_.exe 2076 Logo1_.exe 2076 Logo1_.exe 2076 Logo1_.exe 2076 Logo1_.exe 2076 Logo1_.exe 2076 Logo1_.exe 2076 Logo1_.exe 2076 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 948 wrote to memory of 2576 948 708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe 28 PID 948 wrote to memory of 2576 948 708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe 28 PID 948 wrote to memory of 2576 948 708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe 28 PID 948 wrote to memory of 2576 948 708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe 28 PID 948 wrote to memory of 2076 948 708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe 30 PID 948 wrote to memory of 2076 948 708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe 30 PID 948 wrote to memory of 2076 948 708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe 30 PID 948 wrote to memory of 2076 948 708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe 30 PID 2076 wrote to memory of 2636 2076 Logo1_.exe 31 PID 2076 wrote to memory of 2636 2076 Logo1_.exe 31 PID 2076 wrote to memory of 2636 2076 Logo1_.exe 31 PID 2076 wrote to memory of 2636 2076 Logo1_.exe 31 PID 2576 wrote to memory of 2396 2576 cmd.exe 34 PID 2576 wrote to memory of 2396 2576 cmd.exe 34 PID 2576 wrote to memory of 2396 2576 cmd.exe 34 PID 2576 wrote to memory of 2396 2576 cmd.exe 34 PID 2636 wrote to memory of 2896 2636 net.exe 33 PID 2636 wrote to memory of 2896 2636 net.exe 33 PID 2636 wrote to memory of 2896 2636 net.exe 33 PID 2636 wrote to memory of 2896 2636 net.exe 33 PID 2076 wrote to memory of 1376 2076 Logo1_.exe 21 PID 2076 wrote to memory of 1376 2076 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe"C:\Users\Admin\AppData\Local\Temp\708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a448F.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe"C:\Users\Admin\AppData\Local\Temp\708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe"4⤵
- Executes dropped EXE
PID:2396
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2896
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5a7b27a17fac283c53acdcab0cc48a5fa
SHA195b4cdb62c61eec7ea5f57cc1ad70469ceb5764f
SHA256892f194ccf74098c117ed206fb83921cb19810383c5ef8c5af78d590648422de
SHA512b7bdca8417c815e066fe451e272d55f3200abf4aa8dce8c62a7905b963862c9b88eaa9c6f17070f249d678082c7127c1b61e5e9de7c0a628dbb7172072957eab
-
Filesize
474KB
MD5e85807cbaf1c00d5c04e60d82117ed94
SHA12e586d30d725be909a6f4de38b582fc0bfe57c01
SHA256eb0caf5692f857aadb09867f6526b1dd6f02c9980ccb8d7d58e09342c87fdda9
SHA512af0d2fce26f6ddbf90d3a3359a9ac6740e4d9c830d65137914c3b85f68f9ae390f4454c90ed8fc5210a3c7ac45690d50690379996b5befa61a5853f93d041495
-
Filesize
722B
MD5d462df36bd510ed367b81731c1708d3c
SHA15bcf614389bf7873ffa1446d929ce4936aea8efe
SHA256828be86ed1444c99afa5332acdc26a5fa1dcb3c8f818d3d8c08b464284cc0f57
SHA512a81e7ce36e12d342373a70b82996b585872f6dda8f8d459f5d80e8052fcfc09f620b3e5c3fb0b46a1220008fc18052dda8ceac6aee95047febbed485e8ffbaa6
-
C:\Users\Admin\AppData\Local\Temp\708b5c88a5f406c50e874fc5d70f2d07398069f9870c59090659628e3eb1feef.exe.exe
Filesize41KB
MD5977e405c109268909fd24a94cc23d4f0
SHA1af5d032c2b6caa2164cf298e95b09060665c4188
SHA256cd24c61fe7dc3896c6c928c92a2adc58fab0a3ff61ef7ddcac1ba794182ab12f
SHA51212b4b59c1a8e65e72aa07ee4b6b6cd9fdedead01d5ce8e30f16ca26b5d733655e23a71c1d273a950a5b1a6cce810b696612de4a1148ac5f468ddf05d4549eed5
-
Filesize
29KB
MD5a8a13c8d7055a5a3cbc4682927cf64a4
SHA1cac4936e99f3a78f63b59e8e7d6760146676fbd2
SHA256064686b5d3f26aa24e64603ec1366fb604e260f831e946c0848283611012f058
SHA5126b8f8d7cc0c3e1412d00aaa8d13b8ada8846dba4682afc78137d532395726c4c88c211fa1197b27b8d6e7d194274c72e9c30471b89f4894aec41ce00d65e020c
-
Filesize
9B
MD502ced53ce3f5b175c3bbec378047e7a7
SHA1dafdf07efa697ec99b3d7b9f7512439a52ea618d
SHA256485bb2341321a2837fd015a36963ea549c7c6f40985e165fd56c8a1e89b3f331
SHA512669dde3ea8628704d40681a7f8974cf52985385c92a61a540c97c18c13eb4d451207ae171b2a56cd061cadbc90e672a84eb55111b1f5016846918d73fb075c99