Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe
Resource
win10v2004-20240412-en
General
-
Target
1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe
-
Size
387KB
-
MD5
0abbe3bd344e67b0bc54b886949d17de
-
SHA1
c9640320888b79b7fd998137a2518ecc33974899
-
SHA256
1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d
-
SHA512
9c785be0601fbd5a255b17a3bc9a3e50c54d0092a141ce580ec7178efdc0e3a18a875aebf1d8dc378c8d270d67e2400f87da22b428ce2b8bb9db456363e71208
-
SSDEEP
6144:wVfjmNaYVGfI8iej2CSwBmsYJ66UGLilZIN107HFxHG7:a7+aYVGPic2CA6w4xx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3004 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2552 Logo1_.exe 2692 1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe -
Loads dropped DLL 1 IoCs
pid Process 3004 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EURO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Components\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe File created C:\Windows\Logo1_.exe 1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe 2552 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2324 wrote to memory of 3004 2324 1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe 28 PID 2324 wrote to memory of 3004 2324 1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe 28 PID 2324 wrote to memory of 3004 2324 1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe 28 PID 2324 wrote to memory of 3004 2324 1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe 28 PID 2324 wrote to memory of 2552 2324 1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe 29 PID 2324 wrote to memory of 2552 2324 1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe 29 PID 2324 wrote to memory of 2552 2324 1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe 29 PID 2324 wrote to memory of 2552 2324 1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe 29 PID 2552 wrote to memory of 2660 2552 Logo1_.exe 31 PID 2552 wrote to memory of 2660 2552 Logo1_.exe 31 PID 2552 wrote to memory of 2660 2552 Logo1_.exe 31 PID 2552 wrote to memory of 2660 2552 Logo1_.exe 31 PID 3004 wrote to memory of 2692 3004 cmd.exe 32 PID 3004 wrote to memory of 2692 3004 cmd.exe 32 PID 3004 wrote to memory of 2692 3004 cmd.exe 32 PID 3004 wrote to memory of 2692 3004 cmd.exe 32 PID 3004 wrote to memory of 2692 3004 cmd.exe 32 PID 3004 wrote to memory of 2692 3004 cmd.exe 32 PID 3004 wrote to memory of 2692 3004 cmd.exe 32 PID 2660 wrote to memory of 2676 2660 net.exe 34 PID 2660 wrote to memory of 2676 2660 net.exe 34 PID 2660 wrote to memory of 2676 2660 net.exe 34 PID 2660 wrote to memory of 2676 2660 net.exe 34 PID 2552 wrote to memory of 1232 2552 Logo1_.exe 21 PID 2552 wrote to memory of 1232 2552 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe"C:\Users\Admin\AppData\Local\Temp\1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a148A.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe"C:\Users\Admin\AppData\Local\Temp\1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe"4⤵
- Executes dropped EXE
PID:2692
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2676
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5bcc29caaca6b900200dd926488279eb6
SHA166d3dd19be102552937338febde08b8c6e336cd1
SHA256aecc8287bb11d89180558523fa5bb81fb9d31d011fb3ba1b40dc1208d7b7b6ab
SHA512a82a6db08fdcd58fd96ed1aabc8c9e14c09a674152bdfb0e77e500afbac214c7ac8f36df9d7af975e28a39ccdef7b273357ce540d0d7880a71f10163bd54a68e
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5af6f4d312af16483ea4fde947d0cde27
SHA11f7005ea06c390ff2d545bbfd31ee3087e54bf5c
SHA25608aad965538171161991d9680236f7b4cf1d1c2d75e38a7852d05b16b6de3af5
SHA512299dc606026ca77f2d8ca7d6797ae494900af8b0e62517794729fa2cb4d80ce8609213ee1c43ec7e5e991571d114dd7b40b71f01b0f17fa09449746578f8f517
-
C:\Users\Admin\AppData\Local\Temp\1b681805714dca807e4c4e5d625cfdd18a9cc60f26ed3f105cb8db996bca999d.exe.exe
Filesize361KB
MD5f3f201bf438a3b9f6d240484c584de12
SHA1b24df00861f9dafcb54e4e138d4f4b28b940ebc0
SHA2569e513852ac3d838316360702c7926a6ad4b8e150085480177b9236a5de3d2686
SHA512b05a45143131a31703602cb63ae8fa7a73ab0e8f047095f281cee881387bd05a9026abbee5f563e69140d8e2e843a0edfc8d9d02f946e89ceb7b5a004d2472a0
-
Filesize
26KB
MD594182ab36b79f1cbcebd672d69be79b1
SHA1b72fe3968d5003790213f4e0b4d3eed51665d26d
SHA256844863241e5cbcbc20f4006b2dbcbc1412cd27bdd57f087add2757e509df59ce
SHA5121a6ccdc1f0ee5fa8a4cba7c16bbfc0d399d9b43379267ac57748f2bc9170b0b17bf464686bac4f4dee1d6fafe1b3aee709b05bff4dd2fdd520bcdf4a5b9b238c
-
Filesize
9B
MD572b7e38c6ba037d117f32b55c07b1a9c
SHA135e2435e512e17ca2be885e17d75913f06b90361
SHA256e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6
SHA5122bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a