Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe
Resource
win10v2004-20240226-en
General
-
Target
612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe
-
Size
99KB
-
MD5
5d4d3142a3aad5b1f95c4fb8daa20fbf
-
SHA1
91b52711e120e1ba1789aae6fcb48e837870c4d0
-
SHA256
612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5
-
SHA512
a12fc823412c876c3e5a777e39207ad2266a7da76e597601f0a268151ebc6ebaa99551301102b42b140644cc72414db7cfa8a9329c220cc3b3b0a40fa3917bad
-
SSDEEP
1536:zLfgLdQAQfcfymNOeRLagGxBalspwrQozDQ4rRh2G2WW5ntaF6Kkv9+4PIX5XPS7:zLftffjmNVcxBalsWfThs06n+D5Xq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2624 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3004 Logo1_.exe 2832 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe -
Loads dropped DLL 1 IoCs
pid Process 2624 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Biscay\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe Logo1_.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpconfig.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Groove.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Lime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Filters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe Logo1_.exe File created C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe File created C:\Windows\Logo1_.exe 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe 3004 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2624 2212 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 28 PID 2212 wrote to memory of 2624 2212 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 28 PID 2212 wrote to memory of 2624 2212 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 28 PID 2212 wrote to memory of 2624 2212 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 28 PID 2212 wrote to memory of 3004 2212 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 29 PID 2212 wrote to memory of 3004 2212 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 29 PID 2212 wrote to memory of 3004 2212 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 29 PID 2212 wrote to memory of 3004 2212 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 29 PID 3004 wrote to memory of 2668 3004 Logo1_.exe 31 PID 3004 wrote to memory of 2668 3004 Logo1_.exe 31 PID 3004 wrote to memory of 2668 3004 Logo1_.exe 31 PID 3004 wrote to memory of 2668 3004 Logo1_.exe 31 PID 2624 wrote to memory of 2832 2624 cmd.exe 32 PID 2624 wrote to memory of 2832 2624 cmd.exe 32 PID 2624 wrote to memory of 2832 2624 cmd.exe 32 PID 2624 wrote to memory of 2832 2624 cmd.exe 32 PID 2668 wrote to memory of 2572 2668 net.exe 34 PID 2668 wrote to memory of 2572 2668 net.exe 34 PID 2668 wrote to memory of 2572 2668 net.exe 34 PID 2668 wrote to memory of 2572 2668 net.exe 34 PID 3004 wrote to memory of 1208 3004 Logo1_.exe 21 PID 3004 wrote to memory of 1208 3004 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe"C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1D70.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe"C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe"4⤵
- Executes dropped EXE
PID:2832
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2572
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5bdd08c2b14bc84bdb0bb437b6dbcf72f
SHA1529a6a7c8beaa8b3074c6377b17bdb17fb848b54
SHA256e5137cfd43e6bbd5e2044cc56e6d08b4441423481a9f5be2efdf8b2d4261047e
SHA5127b2d923586038a4b0a4069d8c0d18b93ec39e363e6428f032df50a5091ec0617e921316bffcb70709d1e16d32b928d9c83cc3d831b57c641fb6497e1ae876fca
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5cc03b6b6a845c71bc700a7fe334824ba
SHA117f163929f79a0b17a786f862343112ca307cccd
SHA256d29440b9a53575700845fbe47426ed61a93bb7e78bdefbbb792862fd3baeda9e
SHA512f2207177ad4ff3e191c1ad3e2a3e981a7428b2f6017c7d1baf82fffebc8afb38d58854c6f0460258e86daf340a2543d38a53bb2bc7e44e74a880c655de1330ea
-
C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe.exe
Filesize73KB
MD5ff4f229bc63a0e9a7583b39663d9c59b
SHA194f6ad0c737a4d519586bfb9e2838779e32dbd39
SHA25639a3f52f90c4f35121720da8a8e8b5734d5582ca683b6ea67d17527ccf965947
SHA512377e95042ebf2e6ae2790143bfc562670f1fa523aef04e15fb8ff39ddddf2efecec9fbe6dbe7b9c22577cae8dfd5d58be0579ac72e7d39077fe57fc11925ec73
-
Filesize
26KB
MD5512efa11327090c7e4e592a32ad9a28c
SHA1d6821ff811143ff9cb7027ef991e9582f4ffc7d5
SHA256e135aefb131eeff159bb49e808679a6b837a183fae3e5c0b32d6f237ccddc7ef
SHA512074cb80f5835408e074f336ad7fd6ab4cd87e7614d389453c7ab0a753aa9f3aa2e56e9c0f4d50a1070fce1632f55aefc60a45bab97dd2cd480201cd10b81345b
-
Filesize
9B
MD572b7e38c6ba037d117f32b55c07b1a9c
SHA135e2435e512e17ca2be885e17d75913f06b90361
SHA256e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6
SHA5122bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a