Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe
Resource
win10v2004-20240226-en
General
-
Target
d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe
-
Size
66KB
-
MD5
8e7d06f73c3b09ef05898f8c4f25a12d
-
SHA1
beb6e663072fc2cb0b9058a2dc0a862c4e847dab
-
SHA256
d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1
-
SHA512
74ccd60b44ca1c1200534b3ee5aa2aaee1c7f281db3d6d88eccb199f5088f84686554c6e8f0aff0f4f62fe5a25fb94b3797c23193b8740c26449ed1537b011e3
-
SSDEEP
1536:p3C3SHuJV9NBriw+d9bHrkT5gUHz7FxtJ:pSkuJVLBrBkfkT5xHzD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1636 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2092 Logo1_.exe 2556 d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe -
Loads dropped DLL 1 IoCs
pid Process 1636 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\az\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Filters\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\management\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\SAMPLES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1041\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DAO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe File created C:\Windows\Logo1_.exe d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2092 Logo1_.exe 2092 Logo1_.exe 2092 Logo1_.exe 2092 Logo1_.exe 2092 Logo1_.exe 2092 Logo1_.exe 2092 Logo1_.exe 2092 Logo1_.exe 2092 Logo1_.exe 2092 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1636 2204 d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe 28 PID 2204 wrote to memory of 1636 2204 d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe 28 PID 2204 wrote to memory of 1636 2204 d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe 28 PID 2204 wrote to memory of 1636 2204 d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe 28 PID 2204 wrote to memory of 2092 2204 d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe 30 PID 2204 wrote to memory of 2092 2204 d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe 30 PID 2204 wrote to memory of 2092 2204 d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe 30 PID 2204 wrote to memory of 2092 2204 d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe 30 PID 2092 wrote to memory of 2660 2092 Logo1_.exe 31 PID 2092 wrote to memory of 2660 2092 Logo1_.exe 31 PID 2092 wrote to memory of 2660 2092 Logo1_.exe 31 PID 2092 wrote to memory of 2660 2092 Logo1_.exe 31 PID 1636 wrote to memory of 2556 1636 cmd.exe 33 PID 1636 wrote to memory of 2556 1636 cmd.exe 33 PID 1636 wrote to memory of 2556 1636 cmd.exe 33 PID 1636 wrote to memory of 2556 1636 cmd.exe 33 PID 2660 wrote to memory of 2228 2660 net.exe 34 PID 2660 wrote to memory of 2228 2660 net.exe 34 PID 2660 wrote to memory of 2228 2660 net.exe 34 PID 2660 wrote to memory of 2228 2660 net.exe 34 PID 2092 wrote to memory of 1232 2092 Logo1_.exe 21 PID 2092 wrote to memory of 1232 2092 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe"C:\Users\Admin\AppData\Local\Temp\d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2B26.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe"C:\Users\Admin\AppData\Local\Temp\d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe"4⤵
- Executes dropped EXE
PID:2556
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2228
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5fa568d1ff557fe70694d05133aa05183
SHA1cc58d226533877411b0010239d70a2761adda7ab
SHA256fcba9cd9a160fd1682674d17b212cd56408ef810e223a4ca147f2b8532413e5b
SHA51286cc53213f1a85ea7cb12a1259c50b6d8aff76d5ab5258d9ddb7655e7a552550f7771bc729a3aaadaff0509811fccd4dbd7b84741dd902a74addf7c6806faabc
-
Filesize
474KB
MD5c00c10d640d17d701e266a6fcc683ec1
SHA1fbd5b53c7f0e22f52d8201b738e9ec1cc7b953f3
SHA2568626b01936d75fb83021910d1c8d27539fca7a6ca5e2fdc8a63808075674fcbf
SHA51236162a1921eaaaf6bc9360e7cca63e909ec0a29d30019929787c5c07e80d73822f721c4af417609081c588b66d09035f968b86c0bc4348a86101e83f65e87db6
-
Filesize
722B
MD5f1d893ec03e685b9a5265f3eceef375a
SHA1a764fc1d22fdcd3438ad09eab3de005277ddd89e
SHA256f08905f1e96e90850a67f7ca4cfd8fe71e68cb50cc0b1da14eb77cefc048e7b6
SHA5125b8d3b27b81262eb45d7641e6862dd7da13491fa5cc754122b8dedcf3ba3251ee6d2d04521307a1d8982b56446a8aceb1b13c2a4d545c1a1cbc6f09f37b33968
-
C:\Users\Admin\AppData\Local\Temp\d8d68a4cd2cb9e6dc2b6a2deef71379db805b640a49ff87896e2b05514322dd1.exe.exe
Filesize36KB
MD59f498971cbe636662f3d210747d619e1
SHA144b8e2732fa1e2f204fc70eaa1cb406616250085
SHA2568adf6748981c3e7b62f5dbca992be6675574fffbce7673743f2d7fe787d56a41
SHA512b73083c2f7b028d2946cb8f7b4fe2289fedaa4175364a2aac37db0aeff4602aede772ccc9eba7e6dcfcb7276e52604ca45d8021952201b5834485b48bca3dc93
-
Filesize
29KB
MD525953e4f0f0e4091d08c35a393bd1085
SHA1ae497a759bf8fa1223e3afa4b54819b173d4be19
SHA256809b14b494567b982e5c4b70c57c78362ea5eafaf81ade1e1a156cda75f70846
SHA5123a25d7816bcf28fbb267e5fcc1f39e820c5b732cfced164e7110184d704e49b05b3cd298b7fc3108b59b9b403a32e8b24344cfd2d72dbe616837157ba3b03a6a
-
Filesize
9B
MD57ef570b2b21e58fd906ef1a980d64425
SHA118502489f652e74f8972bbfa100d5c163d719ab7
SHA256c3ce1b9216b58ac7d9ed3b93e5e3a1d6a2473b53b5bc1f008a621def49517055
SHA512e1175d861a79d62b85cd18661375f1c956dcc97e958765dc225f3aa4b0f0100ca9e17b9c61f5e18fc2a96e5167c0563f60645033aff1be1ec2f372c1b9a8b35f