Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe
Resource
win10v2004-20240226-en
General
-
Target
586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe
-
Size
2.1MB
-
MD5
ffcedb1564362366242f115173246db9
-
SHA1
b2a8994fe972a6d34259b4621a277cef0052f454
-
SHA256
586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b
-
SHA512
956134f7e804c7734d46ad55288bcdfb5704805140dcc581e052a9ae18f08b45abc8d8a4788aac673cb4c444b541210cf836b5079df9770a90981e4fe513059d
-
SSDEEP
24576:v75vNmH62Yl/oEGONDz4HlkZWmQBeAAtrpbr9flSvic2OwBVyuK380vF8yYsIDyb:v7ccwAjNlSvEzV638A8yYsIDDYIHa
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3776 Logo1_.exe 1192 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Lighting\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_2019.19071.19011.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\tr\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\ja\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_2019.716.2313.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Configuration\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe Logo1_.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\zh-Hans\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\gui\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewpoints\Dark\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\Json\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\it-IT\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\uk-UA\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe File created C:\Windows\Logo1_.exe 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1192 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 372 wrote to memory of 2220 372 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 91 PID 372 wrote to memory of 2220 372 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 91 PID 372 wrote to memory of 2220 372 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 91 PID 372 wrote to memory of 3776 372 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 93 PID 372 wrote to memory of 3776 372 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 93 PID 372 wrote to memory of 3776 372 586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe 93 PID 3776 wrote to memory of 4204 3776 Logo1_.exe 94 PID 3776 wrote to memory of 4204 3776 Logo1_.exe 94 PID 3776 wrote to memory of 4204 3776 Logo1_.exe 94 PID 4204 wrote to memory of 4928 4204 net.exe 96 PID 4204 wrote to memory of 4928 4204 net.exe 96 PID 4204 wrote to memory of 4928 4204 net.exe 96 PID 2220 wrote to memory of 1192 2220 cmd.exe 97 PID 2220 wrote to memory of 1192 2220 cmd.exe 97 PID 2220 wrote to memory of 1192 2220 cmd.exe 97 PID 3776 wrote to memory of 3360 3776 Logo1_.exe 57 PID 3776 wrote to memory of 3360 3776 Logo1_.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe"C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBC3.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe"C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4928
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3704 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:4040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD5cbecfee419b914df6a9084955b74157b
SHA13b93b7e37f0e5e7065018fd174203123e59ad10e
SHA25625f471c47b0238ac0dfc350462e5d01b58033d615dfa0003efbf59541c831804
SHA5127c9232504794fb0805aa17a277ef7f7d221a91e6ba9dd8276e3a3210216b6dc51e3fb39a0be610e4045c57d6cba0ec522e3d394bda2de82669db0cb77e02882a
-
Filesize
721B
MD5fa5c7d019af021387a1c806cefa316f5
SHA18ce992f93dbcf8f3735850bc3aab6a2aac7b2005
SHA256a4924d450ff17ce9a4dd24819996379a45a70e50fb1a365725440c4448d50686
SHA5124a3708d048184a912f3fab2bc028142e4ed910b582104c82b74f42abd131c45d31606907caa0f5867ba9f4972c6a5c08ff75e3b259aaf4e01467c6c916a3365a
-
C:\Users\Admin\AppData\Local\Temp\586012dba559469fda356535fd81ce78494d5a4acc329b12672bea9a00c6e70b.exe.exe
Filesize2.0MB
MD54f8b3fa38737846375f10515b4074086
SHA1dd59d585d2b330e4477b8481cdaa58ab83b0492d
SHA2560d269d4ae961058923c9b6550f80699fe3a0cecdb36fceaefff61cd346427b43
SHA512b460a0cc85b5e775b5f02006fd4248b95bf49b396e2a765d756c9d7d9336186fae5a97fd8c9f4270ff6dcd7523906523a7c692c2ffa324e42b5b565e25bfb432
-
Filesize
26KB
MD5f9c87eae816e0f847b1c17f4d8ae3f99
SHA123cd46f320bdebc1deaaf7d069faaa2947fda6ca
SHA2564b63a9866b6afe3d75e3d99981a32aea75ea3e7c8f1a90074f25a15f39412372
SHA512e43f774952f21a191f1d1ba1c2518eeb8bfd2357757aab984577c93bf43c41f229e72383fa110ad0b2907f8fb557354db16bf93e0631fb897dc65926aabb3018
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0