Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe
Resource
win10v2004-20240412-en
General
-
Target
fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe
-
Size
68KB
-
MD5
a649ea0cd17c611a1773d2317825ee9c
-
SHA1
39e26c1d0e303667fc3d79956bab97a3586c161e
-
SHA256
fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b
-
SHA512
860909e74cd4b1daee13b2e25e7e5d6cb2010259334496c73293f1995e4d0c660ff44bda6c8354b69d56e244e91e1be3461e3739c08f67bebce1a9be6876cf1a
-
SSDEEP
1536:Ta3SHmLKarIpYeEToa9D4ZQKbgZi1dst7x9PxQ:TakF3pdlZQKbgZi1St7xQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2920 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2528 Logo1_.exe 2572 fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe -
Loads dropped DLL 1 IoCs
pid Process 2920 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zG.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\sd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proofing.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.WW\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.console_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\extensions\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe File created C:\Windows\Logo1_.exe fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe 2528 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2920 2084 fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe 28 PID 2084 wrote to memory of 2920 2084 fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe 28 PID 2084 wrote to memory of 2920 2084 fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe 28 PID 2084 wrote to memory of 2920 2084 fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe 28 PID 2084 wrote to memory of 2528 2084 fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe 30 PID 2084 wrote to memory of 2528 2084 fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe 30 PID 2084 wrote to memory of 2528 2084 fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe 30 PID 2084 wrote to memory of 2528 2084 fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe 30 PID 2528 wrote to memory of 2644 2528 Logo1_.exe 31 PID 2528 wrote to memory of 2644 2528 Logo1_.exe 31 PID 2528 wrote to memory of 2644 2528 Logo1_.exe 31 PID 2528 wrote to memory of 2644 2528 Logo1_.exe 31 PID 2644 wrote to memory of 2848 2644 net.exe 33 PID 2644 wrote to memory of 2848 2644 net.exe 33 PID 2644 wrote to memory of 2848 2644 net.exe 33 PID 2644 wrote to memory of 2848 2644 net.exe 33 PID 2920 wrote to memory of 2572 2920 cmd.exe 34 PID 2920 wrote to memory of 2572 2920 cmd.exe 34 PID 2920 wrote to memory of 2572 2920 cmd.exe 34 PID 2920 wrote to memory of 2572 2920 cmd.exe 34 PID 2528 wrote to memory of 1276 2528 Logo1_.exe 21 PID 2528 wrote to memory of 1276 2528 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe"C:\Users\Admin\AppData\Local\Temp\fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a45F6.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe"C:\Users\Admin\AppData\Local\Temp\fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe"4⤵
- Executes dropped EXE
PID:2572
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2848
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD55d32193de2cfdf187b43e5aff62a4fd2
SHA169c3b62ab39c979b2ebaff09c8f299ac3966690f
SHA256b777124eef2f354f48d4e31f57404982b2dcfaa8a08f18cc81dccb11459a367f
SHA512793dff9014d718b26300d6210fe9335131dd56ec0f6c48374ec1777b98fc5fa48cf285f6e066a02813fa77adab8269692e9ec4b14dc11bc04bf4782534ad9ae8
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD5139bc0485aaaba961b866a4a36d091a5
SHA18ba2e4da7ffb72576f780e376d8d4e35bf7abadf
SHA256a2eeccb23385d3ef24ff627ff55a2a8389f2cb7b49b79900507b254ff9002641
SHA512a50dcb930b88dbf26d757fc02d624fb4d9af5474f954064a63966f5ef3c2fedb1688abd8875da9eec4c40f283f33eb08c519cbc3185db4bf7629c5ca416907e9
-
C:\Users\Admin\AppData\Local\Temp\fb5b99692b2b123c7f767de087f1ebd43f5a0d8db0e814446f540d696227db2b.exe.exe
Filesize41KB
MD5977e405c109268909fd24a94cc23d4f0
SHA1af5d032c2b6caa2164cf298e95b09060665c4188
SHA256cd24c61fe7dc3896c6c928c92a2adc58fab0a3ff61ef7ddcac1ba794182ab12f
SHA51212b4b59c1a8e65e72aa07ee4b6b6cd9fdedead01d5ce8e30f16ca26b5d733655e23a71c1d273a950a5b1a6cce810b696612de4a1148ac5f468ddf05d4549eed5
-
Filesize
27KB
MD545fabbad5797257dc9a43b6cc8d2432d
SHA167df885f45d55667a66a6ec54b07bb1d84eab7de
SHA25626ac0021f99062a8bfe7fb75f9af3bb948576eca9585dd54701f27fad6706b6c
SHA512296c7145356bf381683b2095ab5b897003edae7e5db0e14c737e356340905fcde29a9f1fc94b9737d5efd95fbe132d4661b5316405445e6cde136c9a59a0d25c
-
Filesize
9B
MD502ced53ce3f5b175c3bbec378047e7a7
SHA1dafdf07efa697ec99b3d7b9f7512439a52ea618d
SHA256485bb2341321a2837fd015a36963ea549c7c6f40985e165fd56c8a1e89b3f331
SHA512669dde3ea8628704d40681a7f8974cf52985385c92a61a540c97c18c13eb4d451207ae171b2a56cd061cadbc90e672a84eb55111b1f5016846918d73fb075c99