Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe
Resource
win10v2004-20240412-en
General
-
Target
6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe
-
Size
563KB
-
MD5
bf16e6d74a05f748114cb53b6f4e7ec4
-
SHA1
ee9bf89b1864d581f9c7062931e26ab8466fcfdd
-
SHA256
6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae
-
SHA512
e85b42a387dfbc384c768579ada7ad93059de89400cb77cd17fbd56a0cbbab321b9ee8e92dfeab5e3fcd62d873dfa19efb1590f1a20c659a4f398fb3600fc520
-
SSDEEP
12288:Y7+gLc+Gl3DflwlLrfw+fZdI+eN9K61cNiSvSGtTnOmyMcp7YJhnRw:Y7Dc+qILkOdIdcN/vvtTObMceJhRw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2248 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2516 Logo1_.exe 2612 6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe -
Loads dropped DLL 1 IoCs
pid Process 2248 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1042\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe File created C:\Windows\Logo1_.exe 6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2516 Logo1_.exe 2516 Logo1_.exe 2516 Logo1_.exe 2516 Logo1_.exe 2516 Logo1_.exe 2516 Logo1_.exe 2516 Logo1_.exe 2516 Logo1_.exe 2516 Logo1_.exe 2516 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2248 2000 6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe 28 PID 2000 wrote to memory of 2248 2000 6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe 28 PID 2000 wrote to memory of 2248 2000 6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe 28 PID 2000 wrote to memory of 2248 2000 6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe 28 PID 2000 wrote to memory of 2516 2000 6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe 29 PID 2000 wrote to memory of 2516 2000 6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe 29 PID 2000 wrote to memory of 2516 2000 6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe 29 PID 2000 wrote to memory of 2516 2000 6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe 29 PID 2516 wrote to memory of 2620 2516 Logo1_.exe 30 PID 2516 wrote to memory of 2620 2516 Logo1_.exe 30 PID 2516 wrote to memory of 2620 2516 Logo1_.exe 30 PID 2516 wrote to memory of 2620 2516 Logo1_.exe 30 PID 2620 wrote to memory of 2548 2620 net.exe 33 PID 2620 wrote to memory of 2548 2620 net.exe 33 PID 2620 wrote to memory of 2548 2620 net.exe 33 PID 2620 wrote to memory of 2548 2620 net.exe 33 PID 2248 wrote to memory of 2612 2248 cmd.exe 34 PID 2248 wrote to memory of 2612 2248 cmd.exe 34 PID 2248 wrote to memory of 2612 2248 cmd.exe 34 PID 2248 wrote to memory of 2612 2248 cmd.exe 34 PID 2516 wrote to memory of 1360 2516 Logo1_.exe 21 PID 2516 wrote to memory of 1360 2516 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe"C:\Users\Admin\AppData\Local\Temp\6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4E10.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe"C:\Users\Admin\AppData\Local\Temp\6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe"4⤵
- Executes dropped EXE
PID:2612
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2548
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD502e8a9f4997a06d42734002578ac2add
SHA1dadaaa1bcd850545f4f17a62afaff7aa6cfa3e2a
SHA2561ccd4f031805035f1f8e1ca4ff38fa1b37a824f6e43a81337eef2f97ddc8b0f3
SHA5121e1fde450effc10091ef5805d50dfbc63c15f49b9a3ddd1df1c97fdcedb1670ba03dc2c353f6efd81f5d3a4925dbbb107b34a5f1906943f66813c4d5b5fa53d5
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD517256d06d2b87fdd3ba7c6645a26006a
SHA16691f3cbd38d8c63a7461b3e900923a26e065695
SHA25616f20bf1e0d1402969500e505197654af4e83502e55512c06b5031436018ba37
SHA512b7e00e2b0b2416e6c2f6c520e09192b7d140c1bb6ff4e5c398b21a1da1acfcbac54107dac926f63dd43511b47538033674c259100b692596a86d0bee4baac7d9
-
C:\Users\Admin\AppData\Local\Temp\6ced9b3330ad2c372902c1b38136fc3d0aeccdd1a916c8cfd0a809c1b06648ae.exe.exe
Filesize537KB
MD5eee6800b67e4ce6b023081d9dba3bf63
SHA15d72812c2bece8c43ecdcb84fb34f3d7c838eb0e
SHA2568999f0f948e48667ebd2db8a65bea0dc30f459da5f76f91843675ec083eef7e1
SHA5127c55f5aa17d25189d1c149e5afe00752787f516ebd52a858c6d12c9973e58be2d5db093b64b34a10147fa74df0afe6ddb2fd86a495739fb3ab51c77c8d5f8240
-
Filesize
26KB
MD541a1fee41a294452d15bcbdfb5a84c35
SHA11b0fadfceb4b51453cd1884d5f859a6cdd68e892
SHA256446a10f3f850f5c88c16d02ac8bbd8d39e126439836d30740c0e81c8959963e8
SHA512e6a656cd615bf4fc2c601a6e66c1d04c9f0f56a777569434279e8d539c0ed24e6a6811352f3bcb8cbb35685275e4dd02433ab1082e296391f024f937eed3cc1f
-
Filesize
9B
MD572b7e38c6ba037d117f32b55c07b1a9c
SHA135e2435e512e17ca2be885e17d75913f06b90361
SHA256e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6
SHA5122bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a