Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe
Resource
win10v2004-20240226-en
General
-
Target
586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe
-
Size
2.1MB
-
MD5
ffcedb1564362366242f115173246db9
-
SHA1
b2a8994fe972a6d34259b4621a277cef0052f454
-
SHA256
586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b
-
SHA512
956134f7e804c7734d46ad55288bcdfb5704805140dcc581e052a9ae18f08b45abc8d8a4788aac673cb4c444b541210cf836b5079df9770a90981e4fe513059d
-
SSDEEP
24576:v75vNmH62Yl/oEGONDz4HlkZWmQBeAAtrpbr9flSvic2OwBVyuK380vF8yYsIDyb:v7ccwAjNlSvEzV638A8yYsIDDYIHa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2216 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2236 Logo1_.exe 2744 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Publisher.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Oasis\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{E285345D-6578-4F37-97CE-FB505D8DF788}\chrome_installer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Slate\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File created C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe File created C:\Windows\Logo1_.exe 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2236 Logo1_.exe 2236 Logo1_.exe 2236 Logo1_.exe 2236 Logo1_.exe 2236 Logo1_.exe 2236 Logo1_.exe 2236 Logo1_.exe 2236 Logo1_.exe 2236 Logo1_.exe 2236 Logo1_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2744 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2216 1676 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 28 PID 1676 wrote to memory of 2216 1676 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 28 PID 1676 wrote to memory of 2216 1676 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 28 PID 1676 wrote to memory of 2216 1676 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 28 PID 1676 wrote to memory of 2236 1676 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 30 PID 1676 wrote to memory of 2236 1676 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 30 PID 1676 wrote to memory of 2236 1676 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 30 PID 1676 wrote to memory of 2236 1676 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 30 PID 2236 wrote to memory of 2996 2236 Logo1_.exe 31 PID 2236 wrote to memory of 2996 2236 Logo1_.exe 31 PID 2236 wrote to memory of 2996 2236 Logo1_.exe 31 PID 2236 wrote to memory of 2996 2236 Logo1_.exe 31 PID 2216 wrote to memory of 2744 2216 cmd.exe 33 PID 2216 wrote to memory of 2744 2216 cmd.exe 33 PID 2216 wrote to memory of 2744 2216 cmd.exe 33 PID 2216 wrote to memory of 2744 2216 cmd.exe 33 PID 2216 wrote to memory of 2744 2216 cmd.exe 33 PID 2216 wrote to memory of 2744 2216 cmd.exe 33 PID 2216 wrote to memory of 2744 2216 cmd.exe 33 PID 2996 wrote to memory of 2576 2996 net.exe 34 PID 2996 wrote to memory of 2576 2996 net.exe 34 PID 2996 wrote to memory of 2576 2996 net.exe 34 PID 2996 wrote to memory of 2576 2996 net.exe 34 PID 2236 wrote to memory of 1272 2236 Logo1_.exe 21 PID 2236 wrote to memory of 1272 2236 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe"C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a3CE1.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe"C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2576
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5c90bb0ae6fdeaa8a340b82eda2aee4c3
SHA17700508a3e208a8b3df97429e0f89be050b66ad6
SHA256f2481f3a5a08145d2e8c5f4cb9c9b0c9f24a9f43a8b5bc1fe93f8c1c6311a6c8
SHA512eb969dc19ba0f849df1bfe689a0ba61ffcfb66a287d07590b204e61bd1f44a5f09ad67f29e5ab977214cbd711177a65f44876f03c4c5e52f721c8d037c711971
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5230e40f17e53af772132a3f4d37daab6
SHA1e07ddabf24c13314c8a734fd056c06def4aa4222
SHA256b1a3e5ab4ae5f90c416b27ec9bb71c2314b9b5654755a0c750ffa060e7517f5e
SHA512bfd099ff9ac693b77ff0a0fc39a9a1d1f38b96d0bbb6d828493c740d97fa493ffd21d8259f01091e8ee91f339cc3ece2709765ae0296a9e936dd97783e541b46
-
C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe.exe
Filesize2.0MB
MD54f8b3fa38737846375f10515b4074086
SHA1dd59d585d2b330e4477b8481cdaa58ab83b0492d
SHA2560d269d4ae961058923c9b6550f80699fe3a0cecdb36fceaefff61cd346427b43
SHA512b460a0cc85b5e775b5f02006fd4248b95bf49b396e2a765d756c9d7d9336186fae5a97fd8c9f4270ff6dcd7523906523a7c692c2ffa324e42b5b565e25bfb432
-
Filesize
26KB
MD5f9c87eae816e0f847b1c17f4d8ae3f99
SHA123cd46f320bdebc1deaaf7d069faaa2947fda6ca
SHA2564b63a9866b6afe3d75e3d99981a32aea75ea3e7c8f1a90074f25a15f39412372
SHA512e43f774952f21a191f1d1ba1c2518eeb8bfd2357757aab984577c93bf43c41f229e72383fa110ad0b2907f8fb557354db16bf93e0631fb897dc65926aabb3018
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0