Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe
Resource
win7-20240215-en
General
-
Target
12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe
-
Size
156KB
-
MD5
3fb7eac74e6998f4ad180de9b6379209
-
SHA1
74d860e071eb0db89eaa92c4b81a218fe4ffe5d6
-
SHA256
12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116
-
SHA512
1ee6b41df5bf16c3d1bedffcb8aa00967aef8ea25a821d484e4f75932dd90075444f29fa3b4ba16e00635f0d0b5ade6a68b280f93f5d412daf064da2ed07d270
-
SSDEEP
3072:84Ye+azbRPrlr9RXFHmZWXyaiedMbrN6pnoXPBsr5Zrt:Td+azbRZv5SNaPM4loo5Z5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1796 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2384 Logo1_.exe 2648 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe -
Loads dropped DLL 2 IoCs
pid Process 1796 cmd.exe 1796 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\deploy\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File opened for modification C:\Program Files\Java\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe File created C:\Windows\Logo1_.exe 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe 2384 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2280 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 28 PID 1304 wrote to memory of 2280 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 28 PID 1304 wrote to memory of 2280 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 28 PID 1304 wrote to memory of 2280 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 28 PID 2280 wrote to memory of 320 2280 net.exe 30 PID 2280 wrote to memory of 320 2280 net.exe 30 PID 2280 wrote to memory of 320 2280 net.exe 30 PID 2280 wrote to memory of 320 2280 net.exe 30 PID 1304 wrote to memory of 1796 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 31 PID 1304 wrote to memory of 1796 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 31 PID 1304 wrote to memory of 1796 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 31 PID 1304 wrote to memory of 1796 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 31 PID 1304 wrote to memory of 2384 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 33 PID 1304 wrote to memory of 2384 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 33 PID 1304 wrote to memory of 2384 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 33 PID 1304 wrote to memory of 2384 1304 12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe 33 PID 2384 wrote to memory of 2268 2384 Logo1_.exe 34 PID 2384 wrote to memory of 2268 2384 Logo1_.exe 34 PID 2384 wrote to memory of 2268 2384 Logo1_.exe 34 PID 2384 wrote to memory of 2268 2384 Logo1_.exe 34 PID 2268 wrote to memory of 2680 2268 net.exe 36 PID 2268 wrote to memory of 2680 2268 net.exe 36 PID 2268 wrote to memory of 2680 2268 net.exe 36 PID 2268 wrote to memory of 2680 2268 net.exe 36 PID 1796 wrote to memory of 2648 1796 cmd.exe 37 PID 1796 wrote to memory of 2648 1796 cmd.exe 37 PID 1796 wrote to memory of 2648 1796 cmd.exe 37 PID 1796 wrote to memory of 2648 1796 cmd.exe 37 PID 2384 wrote to memory of 2560 2384 Logo1_.exe 38 PID 2384 wrote to memory of 2560 2384 Logo1_.exe 38 PID 2384 wrote to memory of 2560 2384 Logo1_.exe 38 PID 2384 wrote to memory of 2560 2384 Logo1_.exe 38 PID 2560 wrote to memory of 2116 2560 net.exe 40 PID 2560 wrote to memory of 2116 2560 net.exe 40 PID 2560 wrote to memory of 2116 2560 net.exe 40 PID 2560 wrote to memory of 2116 2560 net.exe 40 PID 2384 wrote to memory of 1208 2384 Logo1_.exe 21 PID 2384 wrote to memory of 1208 2384 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe"C:\Users\Admin\AppData\Local\Temp\12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:320
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a15F1.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe"C:\Users\Admin\AppData\Local\Temp\12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe"4⤵
- Executes dropped EXE
PID:2648
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2680
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2116
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD532b6aa604bd02727e84d7952721f055a
SHA13cf3d7eb354b0dac52465fc69071e90a4412607c
SHA256cf99dc814df2ed704b1676e80f7a219474ac8b95c64d28b84b206a6bf7ed9bca
SHA512b1e1c29ce4589a5e30932c7543e1ea80b52faac234f352081a40d57e68ef385b563874ed5b142ed94c4accf889615b8c0678f43df50dca04195429014ce6df1e
-
Filesize
484KB
MD579d4fd1cb70f3844796aa1ea18a238e2
SHA178d207a7de2aeb85eefc185d894b0b7626e1e1f3
SHA256ccaacc3965c1bdfce8cd1e934895a4563dddf082016e56846966c250bed87d5b
SHA5127a0167cbce49f09ea39e490862b8c371eacf8ce3d74d6a6054e7f0e1df4b307019f5adee03603fcb9d4db2b17841cbc9cf129e9480d70b20c266fe82b3979b33
-
Filesize
722B
MD58b84a6acb5fd0e95919896d4d081504b
SHA14c210ea162768fb7db4054d1e5d60e79b612a7a2
SHA2568f0f691713df5091a783d5e9ac927fcf6ccd5d33f8825be1a75007d4da62c8e1
SHA512a036ea161f91757feedddf47553637059b862e9ae15c11eb1c6e4f47097ed5c728288c9e3cebb82c72cf5d436ccc8778230bbf9e8337815c6648e1d31f7cd0f4
-
C:\Users\Admin\AppData\Local\Temp\12d15bb829e4d2d2f0bf0e123650c21f74f0e7bd7a606aa09f1b5d02a5941116.exe.exe
Filesize116KB
MD514260726256d54de6ccb2eff1003c05c
SHA1073c85b1d5dade530694ef00543698f16d39fd45
SHA2563970359aee5c8cb9451c2c84ae6d4c859999a40ae955d8ade9abacba215a087a
SHA5128bf2d18c0bc4cb42af52ff223199f3504caf73e99fd49dd489306d79364c57d2b5d61039d83cebf898aedc825ab52397613b498aa49b6714fb4fe485112b7d7d
-
Filesize
39KB
MD53db42405aac4c2f3aee890c3c249f126
SHA18d92453ccd9af94d51702bfd28b191b295d1c4c8
SHA2561f48a0595daf780a6e51817d85f7ca6c0d4257c1bb74682f3be2676ab1d0461d
SHA512d555cd0ef14d2f3ef38282244ec1e674fdc3a73ea56e791d7795a78b465486dda3697cdbeab1d2c11e3ea1a000eabb7f92258ac93dfc7d43aa5b85f054ff11a7
-
Filesize
9B
MD5f29b71f66ac42a28a8d1e12a13d61861
SHA1bd61fbc8b6eed4cae3fa29d7b950784258be10cd
SHA2569a5e4ff44f8f5bb21798074ea03e493911b59680e37191522562dece826da1cf
SHA51290c31cda60a9a63e3fa78e99f1104d1a9c9f811e11b62f75063b6007ae284c8c233b5d1235defab7ae0deec3b7892c85af9319219405c44d16fa29a3215f50e0