Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe
Resource
win10v2004-20240419-en
General
-
Target
4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe
-
Size
957KB
-
MD5
e692f9e98d96904a773ea60b5c3e3806
-
SHA1
3208a9e2ccfc26040bd4a464441493f4cfc7812e
-
SHA256
4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea
-
SHA512
72f2e74157f8de8b5ece01c714e19bb12bdd4878fbd00941b141d1fc0f5506fe42cf5067416c80cd118d6699f2029c8f98bf40aee418f75993c1540241e9a9e1
-
SSDEEP
12288:tp7RKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:tpEBpDRmi78gkPXlyo0G/jr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2992 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3008 Logo1_.exe 2468 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe -
Loads dropped DLL 2 IoCs
pid Process 2992 cmd.exe 2992 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Uninstall Information\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Filters\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMV12\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Desert\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DAO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\PublicAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe File created C:\Windows\Logo1_.exe 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2468 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2468 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe Token: 35 2468 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2992 2956 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe 28 PID 2956 wrote to memory of 2992 2956 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe 28 PID 2956 wrote to memory of 2992 2956 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe 28 PID 2956 wrote to memory of 2992 2956 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe 28 PID 2956 wrote to memory of 3008 2956 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe 29 PID 2956 wrote to memory of 3008 2956 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe 29 PID 2956 wrote to memory of 3008 2956 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe 29 PID 2956 wrote to memory of 3008 2956 4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe 29 PID 3008 wrote to memory of 1884 3008 Logo1_.exe 31 PID 3008 wrote to memory of 1884 3008 Logo1_.exe 31 PID 3008 wrote to memory of 1884 3008 Logo1_.exe 31 PID 3008 wrote to memory of 1884 3008 Logo1_.exe 31 PID 1884 wrote to memory of 2560 1884 net.exe 33 PID 1884 wrote to memory of 2560 1884 net.exe 33 PID 1884 wrote to memory of 2560 1884 net.exe 33 PID 1884 wrote to memory of 2560 1884 net.exe 33 PID 2992 wrote to memory of 2468 2992 cmd.exe 34 PID 2992 wrote to memory of 2468 2992 cmd.exe 34 PID 2992 wrote to memory of 2468 2992 cmd.exe 34 PID 2992 wrote to memory of 2468 2992 cmd.exe 34 PID 3008 wrote to memory of 1324 3008 Logo1_.exe 21 PID 3008 wrote to memory of 1324 3008 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe"C:\Users\Admin\AppData\Local\Temp\4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a9B84.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe"C:\Users\Admin\AppData\Local\Temp\4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2560
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5c43aaa64a0093a9d7fe63d45ced671a1
SHA189f76711d4c4a95a311117676063c0ef0b53f4b7
SHA256ff6361c4fc46980bac12c157161e07741c391d3bf742cd708e1f9404692e21b9
SHA51275d2360126924f4140a6ffe7787971106c4ce637ec336f1cf0dab626a39317235fc6f809f32b1dfdb4e76fed963516f10e1adbdb55033bbda9b308353c2c3a98
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD59d4d0f41b55299883f484c124ef1a6af
SHA1cbf971355e1a0e89bee7c72624f2856eec463baf
SHA256e7da4c5a0d4daa7c0ec81b1d7e115403a07e74bca8721a1da58d47c85c5a4a22
SHA5120ce72ae229d6838d32e47a968ef0e5b6c267599bddca76a2cd9da1c786f8fb9ac01d6a27ef753fa8f7e868224c7fba8c9bcc9197b3c8aeeb08d692663e0330d3
-
C:\Users\Admin\AppData\Local\Temp\4f2ad5eb21e746b53455d74d0ee167494951a3fa49c90d72f357c87708a652ea.exe.exe
Filesize930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
27KB
MD5c48ae1552b37d67e6693519ddeca982f
SHA11f20e6fec10fc35015336b03e2691174f1f53c47
SHA2562f245ae481d3c7fb18805139a1e95538c84a4783214adac41d5e22b1cc4ab89f
SHA512506b72a62311b1472fb05bc1ff7a8155b5e2fde665e0092eba9ae302d00cb893d8a95cc8d6063e57e64f201227145fba73931f60a3f9d8ebfaba707840158844
-
Filesize
8B
MD54b4dbd7e2fe4189c8136069a10e1698a
SHA1e4e6e1e80d1fe41d20456173c522d8e7affc4579
SHA256f00f66ba8f3341c7ae8e3c7741a1ff31e522c75580afa9793dcaee17488ccf5b
SHA5122be5b324ef5d951c5e66d692c26f813e0fdd76cb4ef01a9abf38e5f7837f649e0194f7f5c55b1cfd79a9d253031ace5b270fc50f6c11f1885e85f9a874380d8c