Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe
Resource
win10v2004-20240412-en
General
-
Target
a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe
-
Size
78KB
-
MD5
82ef23839c1e50f54ea6175c80d7527f
-
SHA1
bb12096f20f524f2b320eb799e2b6f71012c1391
-
SHA256
a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a
-
SHA512
8c80e20a02ee89c81a7012240dde68beca268a1b0a65a705ccd5cc275c37ab1bc5365ef3c1f35043c0c505087f7b8f97b79fca2b297dcbc87956e797c4c670bc
-
SSDEEP
1536:8fgLdQAQfcfymNpQKt8fjqXnviYhb8x//LenDkBT/ri:8ftffjmNWUXnviYhb8t/LenDkBTDi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1704 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 636 Logo1_.exe 2784 a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe -
Loads dropped DLL 2 IoCs
pid Process 1704 cmd.exe 1704 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\3082\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PowerPoint.en-us\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe File created C:\Windows\Logo1_.exe a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 636 Logo1_.exe 636 Logo1_.exe 636 Logo1_.exe 636 Logo1_.exe 636 Logo1_.exe 636 Logo1_.exe 636 Logo1_.exe 636 Logo1_.exe 636 Logo1_.exe 636 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1704 2224 a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe 28 PID 2224 wrote to memory of 1704 2224 a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe 28 PID 2224 wrote to memory of 1704 2224 a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe 28 PID 2224 wrote to memory of 1704 2224 a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe 28 PID 2224 wrote to memory of 636 2224 a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe 29 PID 2224 wrote to memory of 636 2224 a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe 29 PID 2224 wrote to memory of 636 2224 a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe 29 PID 2224 wrote to memory of 636 2224 a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe 29 PID 636 wrote to memory of 2512 636 Logo1_.exe 30 PID 636 wrote to memory of 2512 636 Logo1_.exe 30 PID 636 wrote to memory of 2512 636 Logo1_.exe 30 PID 636 wrote to memory of 2512 636 Logo1_.exe 30 PID 2512 wrote to memory of 2624 2512 net.exe 33 PID 2512 wrote to memory of 2624 2512 net.exe 33 PID 2512 wrote to memory of 2624 2512 net.exe 33 PID 2512 wrote to memory of 2624 2512 net.exe 33 PID 1704 wrote to memory of 2784 1704 cmd.exe 34 PID 1704 wrote to memory of 2784 1704 cmd.exe 34 PID 1704 wrote to memory of 2784 1704 cmd.exe 34 PID 1704 wrote to memory of 2784 1704 cmd.exe 34 PID 636 wrote to memory of 1224 636 Logo1_.exe 21 PID 636 wrote to memory of 1224 636 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe"C:\Users\Admin\AppData\Local\Temp\a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a29AF.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe"C:\Users\Admin\AppData\Local\Temp\a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe"4⤵
- Executes dropped EXE
PID:2784
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2624
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5f90c055be55cedb3415ecffcc9b6c9a0
SHA18ff0ec8f5f9b3d3f1d4e9bb22510f5812fd9953b
SHA256e04b452d7a31aac63fb50805269cbc8f9fa44cc398a73c67d372f63909665ace
SHA51246e5a16253511f7ce9694dcf23e756307d21f2fa02ac54d4d916d75b36933578ab7daf8cf09840a50858907532130c6fd033c9fd0c4646e717b4cd0aead23da0
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD549fe2c4caea690c961fcdc754dc15cf4
SHA1abacd2049400a34f33eda1985d19e196b1bc4c13
SHA256d85c2ec01c8c9651e31020d9d1bdc765b8eb0228cc7e00ac72d3ffc1d4cb5150
SHA5122e4fd0b56f93376a21f19970ff90305ab30833d25a3ba5f3910d43ad6565800e2f92009aecdaf6a59a7f2af7aea1d18d1f6bda914c1bedd4b90e8ddeb09f803b
-
C:\Users\Admin\AppData\Local\Temp\a3589409a51aba3d3f9889277827d64ed78133c3614290a3e149aeb0fd3fe29a.exe.exe
Filesize52KB
MD5ea602cfb7b4eb2f4192a192d97a71e28
SHA1bd82fd34c60ca4a70f1153d0888c83207fd12403
SHA25699a66e369f0cbebc727d38fc85c9e6ca39efad8b0c4983a7689118973a2ddcde
SHA512e3609d2b07839f8f197933645cac5dd86363363a86a0af8107c0841298c3fb73d9dd6cac899c430b14e9e1b31e96d70b4c6d5a27be20e112ec06628862c8d3a6
-
Filesize
26KB
MD55f2668d184a93234aa6ac83304ff60c9
SHA1162dcb8f0533b7554ded2962fd0ee692ec30c50e
SHA256297f8e9faf06f4dee70a3028c66040674c64969385f15f1dea7d77dc7b5d4763
SHA5120321e5d63f516c6c99c85225d0a8d7906c5b99324e4245b86f605ab48aa79dff5cf8c25ab4d5f6cd02426a5f1beea789a32fd1372001da72d7f0cc94ea36ad43
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0