Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 07:20
Static task
static1
Behavioral task
behavioral1
Sample
ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe
Resource
win7-20240221-en
General
-
Target
ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe
-
Size
264KB
-
MD5
8dcdd16a6ea39934e2345b7075aa3f27
-
SHA1
36e3e536bb16b8e5c9a3219bf7e394ed72cefe93
-
SHA256
ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9
-
SHA512
16e021244c4db1d69911d2fe50e958c1f725d08dd9e7b4f8d7f80bb26d3bd53d1ff7fb18e9dcb94b3382516bc80e0eff331c915619821e2ec12d2b131a43cf8e
-
SSDEEP
6144:W+azbRZvTgiC4bXqsTk90qC1AOb7eswf1Px++fD8PJ:W+azbv8itXqsTkiR7twRx+gD8PJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2584 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2116 Logo1_.exe 2756 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe -
Loads dropped DLL 1 IoCs
pid Process 2584 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Games\Hearts\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\applet\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Portal\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\Templates\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\it-IT\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe File created C:\Windows\Logo1_.exe ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe 2116 Logo1_.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2236 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 28 PID 1724 wrote to memory of 2236 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 28 PID 1724 wrote to memory of 2236 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 28 PID 1724 wrote to memory of 2236 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 28 PID 2236 wrote to memory of 1212 2236 net.exe 30 PID 2236 wrote to memory of 1212 2236 net.exe 30 PID 2236 wrote to memory of 1212 2236 net.exe 30 PID 2236 wrote to memory of 1212 2236 net.exe 30 PID 1724 wrote to memory of 2584 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 31 PID 1724 wrote to memory of 2584 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 31 PID 1724 wrote to memory of 2584 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 31 PID 1724 wrote to memory of 2584 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 31 PID 1724 wrote to memory of 2116 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 33 PID 1724 wrote to memory of 2116 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 33 PID 1724 wrote to memory of 2116 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 33 PID 1724 wrote to memory of 2116 1724 ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe 33 PID 2116 wrote to memory of 2732 2116 Logo1_.exe 34 PID 2116 wrote to memory of 2732 2116 Logo1_.exe 34 PID 2116 wrote to memory of 2732 2116 Logo1_.exe 34 PID 2116 wrote to memory of 2732 2116 Logo1_.exe 34 PID 2732 wrote to memory of 2600 2732 net.exe 36 PID 2732 wrote to memory of 2600 2732 net.exe 36 PID 2732 wrote to memory of 2600 2732 net.exe 36 PID 2732 wrote to memory of 2600 2732 net.exe 36 PID 2584 wrote to memory of 2756 2584 cmd.exe 37 PID 2584 wrote to memory of 2756 2584 cmd.exe 37 PID 2584 wrote to memory of 2756 2584 cmd.exe 37 PID 2584 wrote to memory of 2756 2584 cmd.exe 37 PID 2584 wrote to memory of 2756 2584 cmd.exe 37 PID 2584 wrote to memory of 2756 2584 cmd.exe 37 PID 2584 wrote to memory of 2756 2584 cmd.exe 37 PID 2116 wrote to memory of 2808 2116 Logo1_.exe 38 PID 2116 wrote to memory of 2808 2116 Logo1_.exe 38 PID 2116 wrote to memory of 2808 2116 Logo1_.exe 38 PID 2116 wrote to memory of 2808 2116 Logo1_.exe 38 PID 2808 wrote to memory of 2656 2808 net.exe 40 PID 2808 wrote to memory of 2656 2808 net.exe 40 PID 2808 wrote to memory of 2656 2808 net.exe 40 PID 2808 wrote to memory of 2656 2808 net.exe 40 PID 2116 wrote to memory of 1204 2116 Logo1_.exe 21 PID 2116 wrote to memory of 1204 2116 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe"C:\Users\Admin\AppData\Local\Temp\ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1212
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a16BC.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe"C:\Users\Admin\AppData\Local\Temp\ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe"4⤵
- Executes dropped EXE
PID:2756
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2600
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2656
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD579d4fd1cb70f3844796aa1ea18a238e2
SHA178d207a7de2aeb85eefc185d894b0b7626e1e1f3
SHA256ccaacc3965c1bdfce8cd1e934895a4563dddf082016e56846966c250bed87d5b
SHA5127a0167cbce49f09ea39e490862b8c371eacf8ce3d74d6a6054e7f0e1df4b307019f5adee03603fcb9d4db2b17841cbc9cf129e9480d70b20c266fe82b3979b33
-
Filesize
722B
MD5d75277ddf112eecafd119af5a923744c
SHA115fab825485f85de6ad1684d09023991e7dcb8dc
SHA256dd3cc8fc05d2910175c46b4f584b6f6ce9dddf895cb57fb9a3578ab64716d2b5
SHA5120d11a68db898c31c106543d8299987ea026a0fab740d16d96c973ae5d3d8fc0c7eb799c65188fd12c812727b37704a30ad7d4ae983e8ebabe551003e4e5aafbf
-
C:\Users\Admin\AppData\Local\Temp\ce471a29207d1640e021564b8fbc17028fed2a2a366418a88d8130562bb74ee9.exe.exe
Filesize224KB
MD5d4b257c01bbaa68d15d8368475a4e227
SHA1fafae083a882e163cfa8c77258baaab891c17df2
SHA256dd6dd981c7f1a6673dc8cc3a0fe1fc8a54e059a9fdb0545b0dc9258299c0c546
SHA512167494ecb32196e8e199d7d14a1c0498eee45ab8e8862e5441539fa569313bb602b9e979935c7cc5ba39300e54e8bdbdf2f502e4ea24b5e8339fd2c3685ca502
-
Filesize
39KB
MD5b358a6cac10ccc8c0ba6d33b809eb77a
SHA14b662ed65f5af865bf40925e0aacafc9a6e3a2cb
SHA256b4c9ed18a1f2124fcc393b4779ebd601b36eba3bc6acaa565c532bab3aec694d
SHA512a7d8b81673b74bafc0251a4a291b15774807612b566b7b5909369f964d08ce9e5671fab5ba5da0e1b479b4838d04d159ca7231da47f3b8d19b1d3b88ce6e85c1
-
Filesize
8B
MD535a8ee2041a708d5071bff39818311c3
SHA131114ee16a39b8ada4130a94c1c36ed74a563d2a
SHA256b2405b086204a9155a2dabf58717e53695089ece5d0af208cb960473ba350f8b
SHA512f17fa8c794a47b0134ac4d8e83010e8dce1a0f2ab74a400c571d6470737e386f4eb1351be6c5b153dc063c49d333b69ddf67871d2e0ffb3c02d243be0015f1f0