Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe
Resource
win10v2004-20240412-en
General
-
Target
336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe
-
Size
39KB
-
MD5
2cea0c6a075971886b07f20a5a7a8d18
-
SHA1
bb994210d2a23811d2e98c25f5b8e92dc344ae5f
-
SHA256
336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff
-
SHA512
6cc95868b7b6858df9be24b868671fc774586e1bb3bdd4fc394973415ac02b06797a6a25d2a4f7e3d3f72843e37792a1a046a8bce4a818bfcd63a4268463d411
-
SSDEEP
768:p516GVRu1yK9fMnJG2V9dHS8DuHbKn/jGx:pv3SHuJV9NHuHbKSx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2576 Logo1_.exe 2748 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe -
Loads dropped DLL 6 IoCs
pid Process 3052 cmd.exe 2444 WerFault.exe 2444 WerFault.exe 2444 WerFault.exe 2444 WerFault.exe 2444 WerFault.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\WMPDMC.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office64.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe File created C:\Windows\Logo1_.exe 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2444 2748 WerFault.exe 33 -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe 2576 Logo1_.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3052 1632 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe 28 PID 1632 wrote to memory of 3052 1632 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe 28 PID 1632 wrote to memory of 3052 1632 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe 28 PID 1632 wrote to memory of 3052 1632 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe 28 PID 1632 wrote to memory of 2576 1632 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe 30 PID 1632 wrote to memory of 2576 1632 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe 30 PID 1632 wrote to memory of 2576 1632 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe 30 PID 1632 wrote to memory of 2576 1632 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe 30 PID 2576 wrote to memory of 2584 2576 Logo1_.exe 31 PID 2576 wrote to memory of 2584 2576 Logo1_.exe 31 PID 2576 wrote to memory of 2584 2576 Logo1_.exe 31 PID 2576 wrote to memory of 2584 2576 Logo1_.exe 31 PID 3052 wrote to memory of 2748 3052 cmd.exe 33 PID 3052 wrote to memory of 2748 3052 cmd.exe 33 PID 3052 wrote to memory of 2748 3052 cmd.exe 33 PID 3052 wrote to memory of 2748 3052 cmd.exe 33 PID 3052 wrote to memory of 2748 3052 cmd.exe 33 PID 3052 wrote to memory of 2748 3052 cmd.exe 33 PID 3052 wrote to memory of 2748 3052 cmd.exe 33 PID 2584 wrote to memory of 2740 2584 net.exe 34 PID 2584 wrote to memory of 2740 2584 net.exe 34 PID 2584 wrote to memory of 2740 2584 net.exe 34 PID 2584 wrote to memory of 2740 2584 net.exe 34 PID 2748 wrote to memory of 2444 2748 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe 35 PID 2748 wrote to memory of 2444 2748 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe 35 PID 2748 wrote to memory of 2444 2748 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe 35 PID 2748 wrote to memory of 2444 2748 336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe 35 PID 2576 wrote to memory of 1280 2576 Logo1_.exe 21 PID 2576 wrote to memory of 1280 2576 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe"C:\Users\Admin\AppData\Local\Temp\336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a70BD.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe"C:\Users\Admin\AppData\Local\Temp\336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 6765⤵
- Loads dropped DLL
- Program crash
PID:2444
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2740
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD54aaa245ff034f0f7748335aab26f0a66
SHA1892ec26603207dbb1f44ed51e96bddf38e40155b
SHA256585a81cd9d4bb39b76878de22d22252cfbd331da2cca7ea6e104c923ad6c1b01
SHA5122260a0364e79f25cb7236491ebe794de23891e7ee83656eef110fe5d2ef6168ccf3b29900a298fefcdee3aaa53dd9860366c34c8a18646b631225ee740af730f
-
Filesize
474KB
MD56eabc463f8025a7e6e65f38cba22f126
SHA13e430ee5ec01c5509ed750b88d3473e7990dfe95
SHA256cc8da3ecd355b519d81415d279ed037c725ba221bf323d250aa92ee2b2b88ca7
SHA512c8fde7026ac8633403bbefee4b044457184388fb7343d8c46f5f7f272724227976bf485ea91da49e2a85dd0cfb73f260ac705d8007333dd3e5539fe5ed67e3ab
-
Filesize
722B
MD54555ee9512b95f4678ebc67123eefba0
SHA1a67bd011b0e7fa0e47f978249978450c52108bbc
SHA256a0d0146b569387f88871971cf8c9f2e4fd4831979f1fc0a1cf3b967d8872b959
SHA512b388a2fb05b030b41ce3868e14f835eae637b55af8e81b0bd7bf2b15e6bbd38167f95cf0d6ce92b7a2f6215f6b839445e0f0c221fbb4fd55efc00395eb49f3d9
-
C:\Users\Admin\AppData\Local\Temp\336e9a72afce3663806bf222928ef44c6c4adfd18d302ece28ae4c260f74ffff.exe.exe
Filesize10KB
MD567f64a3ef10630d8305944d4c902e73e
SHA160ef09c067993aa87fd3dbfc10ae552f75ea4a82
SHA256663e8961961141247a8a5cd305b7c2d53ab1f8deaebcd60728ab73a0ec52fa79
SHA51235649265e61ebea7959a1d506298858faeeb0092e1ee1e01d5ceafcb678fbf7aea095de06a746afc41ee9fe0b3c250000cfcdbaea315e118e24a54999cf08b3b
-
Filesize
29KB
MD5c5155b96f66956ca08b4e42147111980
SHA1e9af8321fd989544d0e429c6b9abc4dade3de3e4
SHA2566fc7c42e92228d2aec2c4e86f01d0d097f2850053368caf26f9556664025b0e5
SHA512cfe46fe841ca89f2a22e99baccba837eede7b0697e6a5382c96a5ca760e791a0aa1657187fc513d3e7fff59d13f8f3c8f1b14a56e6b7de07a0a7ac93cc091c28
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0