Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe
Resource
win10v2004-20240412-en
General
-
Target
50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe
-
Size
198KB
-
MD5
99b47abf81854e17c735e3e31335a6d6
-
SHA1
42edecb5b007ec65b57f7fb5de05bd591416183d
-
SHA256
50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa
-
SHA512
a1e583b9ae3988429df71044a926970536ae1d6ebeb65d5352f8ac31e10c191cc13443a04d95e01f81c871d3b1e88d9805649c5ecf89e5c4cd359be3f84c62dc
-
SSDEEP
3072:mftffjmNvV+jEciNTtJ4StA5UdkrNoMO7ibp/:eVfjmNvV+EcItvUrOMO7ibp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2932 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2968 Logo1_.exe 2624 50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe -
Loads dropped DLL 2 IoCs
pid Process 2932 cmd.exe 2932 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1041\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe File created C:\Windows\Logo1_.exe 50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2968 Logo1_.exe 2968 Logo1_.exe 2968 Logo1_.exe 2968 Logo1_.exe 2968 Logo1_.exe 2968 Logo1_.exe 2968 Logo1_.exe 2968 Logo1_.exe 2968 Logo1_.exe 2968 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2932 1712 50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe 28 PID 1712 wrote to memory of 2932 1712 50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe 28 PID 1712 wrote to memory of 2932 1712 50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe 28 PID 1712 wrote to memory of 2932 1712 50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe 28 PID 1712 wrote to memory of 2968 1712 50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe 29 PID 1712 wrote to memory of 2968 1712 50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe 29 PID 1712 wrote to memory of 2968 1712 50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe 29 PID 1712 wrote to memory of 2968 1712 50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe 29 PID 2968 wrote to memory of 2584 2968 Logo1_.exe 30 PID 2968 wrote to memory of 2584 2968 Logo1_.exe 30 PID 2968 wrote to memory of 2584 2968 Logo1_.exe 30 PID 2968 wrote to memory of 2584 2968 Logo1_.exe 30 PID 2584 wrote to memory of 2548 2584 net.exe 33 PID 2584 wrote to memory of 2548 2584 net.exe 33 PID 2584 wrote to memory of 2548 2584 net.exe 33 PID 2584 wrote to memory of 2548 2584 net.exe 33 PID 2932 wrote to memory of 2624 2932 cmd.exe 34 PID 2932 wrote to memory of 2624 2932 cmd.exe 34 PID 2932 wrote to memory of 2624 2932 cmd.exe 34 PID 2932 wrote to memory of 2624 2932 cmd.exe 34 PID 2968 wrote to memory of 1084 2968 Logo1_.exe 18 PID 2968 wrote to memory of 1084 2968 Logo1_.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe"C:\Users\Admin\AppData\Local\Temp\50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aFD9.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe"C:\Users\Admin\AppData\Local\Temp\50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe"4⤵
- Executes dropped EXE
PID:2624
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2548
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD588ba822de7a42e1f02244644aaff2acb
SHA1abf7bfdb2dc02fafbcf3fb9f78ee37d6fece441b
SHA2565d907f41150eba00c206a1c08a44df023db9697494d6b58e4f81de810982ab0e
SHA5126c95d200afb3d0fd574407a77bf1b07de7cd18684598ff2b8face4ab4bd56f0212030dff0c2bb0813b6599ffebcbec2cdb39c7f9e70d2724babe0740bace3fd0
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
721B
MD5fbf7f69ecc49832eb5a36acdd12fbc8e
SHA150239a8c76f106ec672a298e7cb94e65be4de5d8
SHA256042cec5b6adf24476b7bfd791b01c2b29a8cb13309960f19e3848082873c9fc3
SHA5128c2c794b9ff4e4b830d55ffa5e764437feef3445f24d460180c91599d12edf5628a1935b19f0f3f429417a7cdbc72459d66af072ae1d450a4bb6c3b5fe421d1d
-
C:\Users\Admin\AppData\Local\Temp\50db4b6d47d6ee250bdd29ded1494975ea7786c200375a588d537cec2470fdfa.exe.exe
Filesize171KB
MD5982d6239748d730c26bdd99cb3811b50
SHA1ae930e0eda47bffa2cd55bcb701f47fd38b9f64d
SHA2562d471ecc0a7f16be9f473aeb3c3b0453e381454460b24f9a03659f2077e648ab
SHA5128ca0b20f8311b252391f52f325510b3d4ede6143359091c3e19753c8642022639dac023f31eb018da376f2f327cfd80ec5ed1e487c012838f864b786901c1ac6
-
Filesize
26KB
MD5b92134f69d03e7b0b2a302aa33e00411
SHA10df5f0345c347fcecae91e21f66ae9ca235d1e8d
SHA2565bf27156970c49ad3c066689a9117b0ca2f4bb12187059e378e916a1b3cac930
SHA512348c223e0159d783017d1f142de608df5997008c6c5665005fb4be8f20054b34bbe79736c05b12eeb303414c63ae10a198b8e91855c78a1a2d5fbf71c452d08e
-
Filesize
9B
MD57ef570b2b21e58fd906ef1a980d64425
SHA118502489f652e74f8972bbfa100d5c163d719ab7
SHA256c3ce1b9216b58ac7d9ed3b93e5e3a1d6a2473b53b5bc1f008a621def49517055
SHA512e1175d861a79d62b85cd18661375f1c956dcc97e958765dc225f3aa4b0f0100ca9e17b9c61f5e18fc2a96e5167c0563f60645033aff1be1ec2f372c1b9a8b35f