Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe
Resource
win10v2004-20240226-en
General
-
Target
612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe
-
Size
99KB
-
MD5
5d4d3142a3aad5b1f95c4fb8daa20fbf
-
SHA1
91b52711e120e1ba1789aae6fcb48e837870c4d0
-
SHA256
612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5
-
SHA512
a12fc823412c876c3e5a777e39207ad2266a7da76e597601f0a268151ebc6ebaa99551301102b42b140644cc72414db7cfa8a9329c220cc3b3b0a40fa3917bad
-
SSDEEP
1536:zLfgLdQAQfcfymNOeRLagGxBalspwrQozDQ4rRh2G2WW5ntaF6Kkv9+4PIX5XPS7:zLftffjmNVcxBalsWfThs06n+D5Xq
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2268 Logo1_.exe 4148 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\tr-TR\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Config\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\msedge_pwa_launcher.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\ResiliencyLinks\Trust Protection Lists\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\include\win32\bridge\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\tool\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\CortanaApp.ViewElements\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files-select\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\logger\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\host\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VideoFrameExtractor\UserControls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\whatsnewsrc\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\messaging\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Security\BrowserCore\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Store.Purchase\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\root\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe File created C:\Windows\Logo1_.exe 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe 2268 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1184 wrote to memory of 4316 1184 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 90 PID 1184 wrote to memory of 4316 1184 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 90 PID 1184 wrote to memory of 4316 1184 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 90 PID 1184 wrote to memory of 2268 1184 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 91 PID 1184 wrote to memory of 2268 1184 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 91 PID 1184 wrote to memory of 2268 1184 612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe 91 PID 2268 wrote to memory of 3320 2268 Logo1_.exe 93 PID 2268 wrote to memory of 3320 2268 Logo1_.exe 93 PID 2268 wrote to memory of 3320 2268 Logo1_.exe 93 PID 4316 wrote to memory of 4148 4316 cmd.exe 95 PID 4316 wrote to memory of 4148 4316 cmd.exe 95 PID 4316 wrote to memory of 4148 4316 cmd.exe 95 PID 3320 wrote to memory of 4524 3320 net.exe 96 PID 3320 wrote to memory of 4524 3320 net.exe 96 PID 3320 wrote to memory of 4524 3320 net.exe 96 PID 2268 wrote to memory of 3336 2268 Logo1_.exe 56 PID 2268 wrote to memory of 3336 2268 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe"C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aF6F3.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe"C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe"4⤵
- Executes dropped EXE
PID:4148
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4524
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2232 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:3956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5bdd08c2b14bc84bdb0bb437b6dbcf72f
SHA1529a6a7c8beaa8b3074c6377b17bdb17fb848b54
SHA256e5137cfd43e6bbd5e2044cc56e6d08b4441423481a9f5be2efdf8b2d4261047e
SHA5127b2d923586038a4b0a4069d8c0d18b93ec39e363e6428f032df50a5091ec0617e921316bffcb70709d1e16d32b928d9c83cc3d831b57c641fb6497e1ae876fca
-
Filesize
570KB
MD5d4bbaa83fb9621669e64ab93da4a6301
SHA1da051eb49de23b582f78fc14249a9e17179fffc3
SHA256ee00fd559aebd0ad9a665de2ca9de129d13243e5ecf56724d3b9513cb1d8ae26
SHA512914ea142308fd11434182854baff67bdaf1e2e7fa2635e02066a0f3bf9b9a6048857b5b5f9d8fd479c73bec3d179669fd04b27682e34f701a80b21857457ba0b
-
Filesize
722B
MD51e1af02fd634e891f76dad644405dbd5
SHA16b3088ebd19cd41d4c1c4138cf4abbfa97fac067
SHA25621ab35609f3530e0339e73cd461bd9ef9028508bc9300a384e8775e4f84b193d
SHA51278e6c9ee81d78c2b39addee08f2433e871ee293cdb8d07853ac420d8d98bc6c5a45bbb77672212e39bb087dca22c4a52283bc987ec6d2df67166b118b9dd2a57
-
C:\Users\Admin\AppData\Local\Temp\612082e89ff3931365f179e90d8ac4ee1cc70e0b0773be5239621f46a9aefff5.exe.exe
Filesize73KB
MD5ff4f229bc63a0e9a7583b39663d9c59b
SHA194f6ad0c737a4d519586bfb9e2838779e32dbd39
SHA25639a3f52f90c4f35121720da8a8e8b5734d5582ca683b6ea67d17527ccf965947
SHA512377e95042ebf2e6ae2790143bfc562670f1fa523aef04e15fb8ff39ddddf2efecec9fbe6dbe7b9c22577cae8dfd5d58be0579ac72e7d39077fe57fc11925ec73
-
Filesize
26KB
MD5512efa11327090c7e4e592a32ad9a28c
SHA1d6821ff811143ff9cb7027ef991e9582f4ffc7d5
SHA256e135aefb131eeff159bb49e808679a6b837a183fae3e5c0b32d6f237ccddc7ef
SHA512074cb80f5835408e074f336ad7fd6ab4cd87e7614d389453c7ab0a753aa9f3aa2e56e9c0f4d50a1070fce1632f55aefc60a45bab97dd2cd480201cd10b81345b
-
Filesize
9B
MD572b7e38c6ba037d117f32b55c07b1a9c
SHA135e2435e512e17ca2be885e17d75913f06b90361
SHA256e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6
SHA5122bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a