Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe
Resource
win10v2004-20240419-en
General
-
Target
9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe
-
Size
1.3MB
-
MD5
cc7aaca312222c595d5f4a3a9b6f192d
-
SHA1
cb0d26b9fd1ba13a77313298cff08fa737a1b094
-
SHA256
9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca
-
SHA512
07f4af9958ec0dc880829b758b8e168ddf4e4921c4fdb100137652d1f879b9a8a15c43417d4a301f738d7b08bb238b5d24166bbd40283d55e32af002060cd2fc
-
SSDEEP
24576:efkcVkJdyWm5QlmxR++iN95RoayqVSF1M+VHQE7Zrbe:efkcVkJdyrAL5RojIw1M+Rj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3384 Logo1_.exe 644 9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Weather.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\HelpAndFeedback\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ku_IQ\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\kn-IN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\subscription_intro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tt\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Crashpad\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\EBWebView\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\dotnet.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\RetailDemo\strings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ha-Latn-NG\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sw\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.185.29\MicrosoftEdgeUpdateCore.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe File created C:\Windows\Logo1_.exe 9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe 3384 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2180 wrote to memory of 4324 2180 9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe 83 PID 2180 wrote to memory of 4324 2180 9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe 83 PID 2180 wrote to memory of 4324 2180 9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe 83 PID 2180 wrote to memory of 3384 2180 9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe 84 PID 2180 wrote to memory of 3384 2180 9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe 84 PID 2180 wrote to memory of 3384 2180 9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe 84 PID 3384 wrote to memory of 2980 3384 Logo1_.exe 86 PID 3384 wrote to memory of 2980 3384 Logo1_.exe 86 PID 3384 wrote to memory of 2980 3384 Logo1_.exe 86 PID 2980 wrote to memory of 2820 2980 net.exe 88 PID 2980 wrote to memory of 2820 2980 net.exe 88 PID 2980 wrote to memory of 2820 2980 net.exe 88 PID 4324 wrote to memory of 644 4324 cmd.exe 89 PID 4324 wrote to memory of 644 4324 cmd.exe 89 PID 4324 wrote to memory of 644 4324 cmd.exe 89 PID 3384 wrote to memory of 3412 3384 Logo1_.exe 56 PID 3384 wrote to memory of 3412 3384 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe"C:\Users\Admin\AppData\Local\Temp\9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a44E8.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe"C:\Users\Admin\AppData\Local\Temp\9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe"4⤵
- Executes dropped EXE
PID:644
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2820
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD5e6b371e15c02fa6ccb842de8c90c676b
SHA1988c37ffd9f6ae9dd5a43ec75b7a4edccba65b09
SHA25671b8974c5064541565bbbf3f77d07475ef90084fd02f2bf7ea42fe50a8169e93
SHA51221eff79a35e439eda87aeafa4d48af524f89fb7febb8d00b3b72389297e12aef92000be601435297af8d1b247816b0ce19585ecf4d4648f3e568fdf3aebdcb3d
-
Filesize
573KB
MD5d4f52b5e548600d6f77ec2fc4377e071
SHA1543a1052f2432ecf61c949dd9526a5fb949571a0
SHA25624b3cce6cc9446ec53bb225b2ea7dce5feee9393c55e72ceed0eab00fe1ebcd0
SHA512941da9fe7d625e0bcf6e35022cf66ac7b8a4db61feff9f311c02fe2284ec4a3eb50f5d342799e164a90112f3d2fad494ef108d70e9be3c136bf4549f2cf9a482
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD5f2ad2f9e953da4b8ce5c6c5466404e8e
SHA14199d48621b97b02da68707263885e7e6bb0c426
SHA2563d7634c6358258ce94ba5792ba4846f4688f6c62c04e24a884a30cd5590baf7b
SHA51274cbd31460102e8734877520b3dc85778476b17b0fa2777c4320a3af50d50d3b39356cd73d5425b4ac57f51ed54442eb7605413e1e2ce0d58d371f28fb301faf
-
Filesize
722B
MD50b4be9ec2d9f182c83b74c83ebe74683
SHA18463c1b8eccd20e6bf7f932054543398704a9266
SHA2562693e6624c4549991145519d85bdc48dd1117dba48cfe2febd61de5b502273a9
SHA512e66c473a7c9dabb67690481f5323379d999920f8d7fab7904c81e9ad66fd681f6ed2f3e4a52ce51a913c8ddc27f9b8139180050de257dbb45fa4c721c3b92707
-
C:\Users\Admin\AppData\Local\Temp\9ad0994e12c7eaa1ea87b669c193e66e6afdc36935829e61216894dd2dc1baca.exe.exe
Filesize1.3MB
MD532a8874646fd9ff308cd7d550c9b8c3a
SHA1bb94615961d98df10f17eb0e69edbd6c860def80
SHA256018b89a03419e447793f0858244b7f8133ef16b13b224018166ffb0e3433eb95
SHA512d47e9dfe3b233e4a8e24ffb4dd9f1b7c2649cf597ff7981b7fd488d62a20debac320093829624758294697ba509923ae79b8d79e54d3acf67d1e3a5a554bad6f
-
Filesize
29KB
MD5613ebc2c6b3cd0a071abf2ce8f025c87
SHA1466db64217d98d6a149f2538bb7d6f569ce18cd7
SHA256c7120fe704982e0bf67d30a32e48ccb5f84d4d9702c193599b397eda84cd849e
SHA5123328a8ef51ae65a1ded3ad33b862c479919f30915d5f47f722622a390eb2486bb1a821c841381d1f39b09c6f06388114add299a4a280d1ed0ccdeefb5a31a530
-
Filesize
9B
MD573b8aef84e892e3f77d41747dce253db
SHA1d642a92c96e4ed570d998a73e42fc24fafe8caf9
SHA256a81f7465f537233bbd4b8fa9034e52a8ceffcdf97bf36244c4d404ebec14eb24
SHA5129b0690efee220355932375db333b5487c369ca9fdcf8497bcb5283d78d21fb4fefb7c06bbe533fb1f18fd3b32256a013090af6dd957b9d09cc373d0d5b89cf6d