Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe
Resource
win10v2004-20240419-en
General
-
Target
575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe
-
Size
1.9MB
-
MD5
f35a9284fa9d4f9c17b2f07f084d12e1
-
SHA1
4575a15e2ac462188fd0363d497e9b1490b43695
-
SHA256
575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc
-
SHA512
93a8971f2fc2213f88e694fb8c52b192c3a3ffe4c47915bfbc7c664b98048f401f47095c0d9196b6944426789c6d772ec93d89ed903d07df2cf7070ff896f063
-
SSDEEP
49152:S7S40cscbgsmEHafDgPvII13CMPzsP2q7F5kS:aPzsP2DS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3692 Logo1_.exe 4896 575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sw-KE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themeless\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.2.2_2.2.27405.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\_platform_specific\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dummy\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hu-HU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe File created C:\Windows\Logo1_.exe 575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe 3692 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4392 wrote to memory of 4440 4392 575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe 85 PID 4392 wrote to memory of 4440 4392 575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe 85 PID 4392 wrote to memory of 4440 4392 575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe 85 PID 4392 wrote to memory of 3692 4392 575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe 86 PID 4392 wrote to memory of 3692 4392 575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe 86 PID 4392 wrote to memory of 3692 4392 575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe 86 PID 3692 wrote to memory of 4776 3692 Logo1_.exe 88 PID 3692 wrote to memory of 4776 3692 Logo1_.exe 88 PID 3692 wrote to memory of 4776 3692 Logo1_.exe 88 PID 4776 wrote to memory of 1548 4776 net.exe 90 PID 4776 wrote to memory of 1548 4776 net.exe 90 PID 4776 wrote to memory of 1548 4776 net.exe 90 PID 4440 wrote to memory of 4896 4440 cmd.exe 91 PID 4440 wrote to memory of 4896 4440 cmd.exe 91 PID 4440 wrote to memory of 4896 4440 cmd.exe 91 PID 3692 wrote to memory of 3416 3692 Logo1_.exe 56 PID 3692 wrote to memory of 3416 3692 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe"C:\Users\Admin\AppData\Local\Temp\575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a3808.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe"C:\Users\Admin\AppData\Local\Temp\575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe"4⤵
- Executes dropped EXE
PID:4896
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1548
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5852a651212d58cc0aa27058c7afe3c26
SHA1f3e130f40acd8458cb659b376d3b3475eb9030be
SHA256ca70c2e7758798b9b29b93488c35e461a863ad1bb7b0e09fa115935c3338dc15
SHA51201c0252a9f3e0b06cf6a4132e623aeed69adc9b661fca7911a613ed52f6e944753124030423d79ebb7b310a010983ff3e875dd0f989058e6c619f73691b7f60c
-
Filesize
570KB
MD53e588e1201474a5927159e525f7f5ef6
SHA189a8236abad02d19dddcba890e42482e994476a1
SHA256f6a7066b3b6333de177be684fedb5d280ae1d62d0cf644a14b0b3ff1c42ae4cf
SHA512c5813f8d7fb52fdad6df3a1de67b9ef6e1a84eda36ed2a9fd64e27fa2404dc09aefabda397a84ffc608ecb545b54e96f45a17937689f34ff20217a841d3032e9
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD53ebff8e5b1e20770152c4f7e4567abf2
SHA1fd5abd3d199013f63b68021699079773816178b6
SHA256d11aa68cd63983543859b12a32edde288bce8044d9f2e27b19cf97b3c8a5bcc5
SHA512107e455bb95c365c11ed0edd58b332c3c4e1a93ff7770b6a80fa7936d7e95542d68ba4d4081a344de786bbdc0f045388c3fc4b24f05c9842d0a06e99ab866e6b
-
C:\Users\Admin\AppData\Local\Temp\575e12db9e94adcc737d89e8f76c625d8aa7fbf236f850bbc45847588086a9dc.exe.exe
Filesize1.9MB
MD552176ef102c39d6912a5256535cf629b
SHA12cf33b2512df78ac047f0d117c6952478c4b057c
SHA2564750d81cae87f8e9a6e4daa76bfef5772d8c8b99de45396491ebafada78e5a34
SHA51276a268a5a8ae0170bb0c655d31872cf7e9f67395da37b691732d1e6a8db1c96c18c5a3019ee7decea8848a818642afee81ba0d7ec5a7cb1305454f13953d7347
-
Filesize
26KB
MD5073d37b425ac83ddebb5816919f7d353
SHA1f154a0f9e3c30903aca7056ebd6d837f3989db6d
SHA256e16c12380ba4ff0a472b08df28efdba5fd3de72a2c04dc141ad9792e3d7b902d
SHA512f57fe35ec2a67a68cb6601488def77b510f8a44cbadc42d6517bd7da4049aa0b7becb8c546953783a499fb91d3572a1fe28dca01e48184ffcd43206fc638bd47
-
Filesize
9B
MD57d02194d5f21d1288ee3e3f595122aba
SHA168e51fcc75148bf51da5ad67c7137b85946fc393
SHA256a4da2cd5e1bd5b7cc915b0572d2805cb074c16122fa7e5a41fbc1203aafc3416
SHA512b5aba933dbbe76d9c49da7e4bd9aa8449f164d1a6563feb65e795fd497f42a5c8cc317186adf817990a180e46499987a7403b68b0b089a38ccda0fc9f2dd6c1c