Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe
Resource
win10v2004-20240412-en
General
-
Target
59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe
-
Size
334KB
-
MD5
0de78b53c8101c926e301ec7a7282fe0
-
SHA1
e9aecd85f616cbd6885ca4c76fcef178a8de02e6
-
SHA256
59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a
-
SHA512
83b0129f8378dbceeb0318eff404279ac2ed49eaaa4c89215aabf27c6632460ecf26f28fe77373782334ec62de6afe2f407455044a52ec0a1f416bc8474803cc
-
SSDEEP
6144:YVfjmNN0VQZgSLCVLiuLDG0JNSKeTM601jlvLlXsyizqbM4mF5sAOj/dxC0WKEyg:C7+uV5SLDuLDG0JNSKeTM601jlDlXC/N
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 632 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1940 Logo1_.exe 2868 59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe -
Loads dropped DLL 1 IoCs
pid Process 632 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\cmm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Access.en-us\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Skins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PROPLUS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe File created C:\Windows\Logo1_.exe 59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe 1940 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1108 wrote to memory of 632 1108 59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe 28 PID 1108 wrote to memory of 632 1108 59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe 28 PID 1108 wrote to memory of 632 1108 59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe 28 PID 1108 wrote to memory of 632 1108 59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe 28 PID 1108 wrote to memory of 1940 1108 59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe 29 PID 1108 wrote to memory of 1940 1108 59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe 29 PID 1108 wrote to memory of 1940 1108 59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe 29 PID 1108 wrote to memory of 1940 1108 59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe 29 PID 1940 wrote to memory of 1464 1940 Logo1_.exe 30 PID 1940 wrote to memory of 1464 1940 Logo1_.exe 30 PID 1940 wrote to memory of 1464 1940 Logo1_.exe 30 PID 1940 wrote to memory of 1464 1940 Logo1_.exe 30 PID 1464 wrote to memory of 2652 1464 net.exe 33 PID 1464 wrote to memory of 2652 1464 net.exe 33 PID 1464 wrote to memory of 2652 1464 net.exe 33 PID 1464 wrote to memory of 2652 1464 net.exe 33 PID 632 wrote to memory of 2868 632 cmd.exe 34 PID 632 wrote to memory of 2868 632 cmd.exe 34 PID 632 wrote to memory of 2868 632 cmd.exe 34 PID 632 wrote to memory of 2868 632 cmd.exe 34 PID 1940 wrote to memory of 1376 1940 Logo1_.exe 21 PID 1940 wrote to memory of 1376 1940 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe"C:\Users\Admin\AppData\Local\Temp\59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD1B.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe"C:\Users\Admin\AppData\Local\Temp\59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe"4⤵
- Executes dropped EXE
PID:2868
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2652
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD52c368c4079cec9a57fee722e7925399c
SHA1ced4580a1bca5b5ca94dd72691ee8a812f300553
SHA2560b7b6e95fb066be8fb5c68ad7e5513bd9a6e5de9b6493a7824f558e0b6271a63
SHA51288678c361f1a9351d543324c8ad96fda1199f78fba987463d7bf790bf738d608b1f865aa8f356cc6b340a2213a6b16a688991cba2444f9e187a6feab2efe7152
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
721B
MD5495c2ce3705bd9973a74c84d591c82e9
SHA1b25fade4690e5b448d02edecf26ee7cb72dd6d70
SHA25648b162d73838b809b909bf5d7c15716c74c022ad83fcf713a5c8f393bc9bb24a
SHA512972a6dd4d3b7841afd4fe360a528fdb10923fb8885843a8de6b916fc188b3bcd2f3106ef460d02cc8a1153f70f4469defafb5613acea261def832f3bef61250a
-
C:\Users\Admin\AppData\Local\Temp\59dc3375e8faaadb251aa057b9cd0e176f653cfef056e7bcf0f99a38b53bb35a.exe.exe
Filesize307KB
MD5cb1d6cc739e1d861031b30ae195dc7c4
SHA197dccecb4b898e6a608aee72ff78286fc2109d6a
SHA256a5df985020e668abe1c528e9545435f71076926b9a682019ed9e76f59d52c925
SHA512d0d9303fd7aa57dd4581564cd108b11af24e47e2c2012d2498337c25e06ea4c97b708c42e705be8c74785c528fb16f734c5abfb6227fbc87b8c383b6963a4738
-
Filesize
26KB
MD5487da9891a1e7032841518d66e9f99f4
SHA1af90ab8039b6920e1ac83191780b324b3605a26f
SHA256f2acf2477402b55c9f408c6fbde18ad3d2d5b1ea94a504dc60d651813349001c
SHA51299d74cc9a5bd8141cf1e81a4e0474d178fe7812163620450bc1ce3fb5d5d494a5c91c6de55e315675d615a98ebfa43854267c57e4d02603d3b322b20dbe2ffaa
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0